starting build "8ee545e5-9960-4e3b-adaa-6ffa784ee615" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 77fedef42789: Pulling fs layer Step #1: a46a0b8d3abf: Pulling fs layer Step #1: d9a668348f93: Pulling fs layer Step #1: 6f40f724b597: Pulling fs layer Step #1: e29c35d80dc6: Pulling fs layer Step #1: 36d27579174f: Pulling fs layer Step #1: 82cacf312824: Pulling fs layer Step #1: fb369fcf3f29: Pulling fs layer Step #1: 8698a95b0cf1: Pulling fs layer Step #1: fac21ee78449: Pulling fs layer Step #1: 68b14a439183: Pulling fs layer Step #1: a333d6a89401: Pulling fs layer Step #1: f92e588dcdb8: Pulling fs layer Step #1: 617b048e23a4: Pulling fs layer Step #1: d9a668348f93: Waiting Step #1: 6f40f724b597: Waiting Step #1: 274d50ed676b: Pulling fs layer Step #1: 69e7900851dc: Pulling fs layer Step #1: e29c35d80dc6: Waiting Step #1: a205f2600ab4: Pulling fs layer Step #1: 10c5c6f6ce92: Pulling fs layer Step #1: 36d27579174f: Waiting Step #1: 9f84a9e75930: Pulling fs layer Step #1: 7cdc13fb87de: Pulling fs layer Step #1: 846e69cde2d4: Pulling fs layer Step #1: 82cacf312824: Waiting Step #1: fb369fcf3f29: Waiting Step #1: 8698a95b0cf1: Waiting Step #1: fac21ee78449: Waiting Step #1: 479dcd71002b: Pulling fs layer Step #1: 68b14a439183: Waiting Step #1: 2b5984ee5027: Pulling fs layer Step #1: 07f4fea6eae1: Pulling fs layer Step #1: a333d6a89401: Waiting Step #1: 3297ed637813: Pulling fs layer Step #1: f92e588dcdb8: Waiting Step #1: 7aac19434694: Pulling fs layer Step #1: 617b048e23a4: Waiting Step #1: 697c70a1725c: Pulling fs layer Step #1: e79501790bd5: Pulling fs layer Step #1: c2201cf2d597: Pulling fs layer Step #1: 274d50ed676b: Waiting Step #1: 69e7900851dc: Waiting Step #1: a205f2600ab4: Waiting Step #1: 10c5c6f6ce92: Waiting Step #1: 479dcd71002b: Waiting Step #1: 9f84a9e75930: Waiting Step #1: 2b5984ee5027: Waiting Step #1: 7cdc13fb87de: Waiting Step #1: 07f4fea6eae1: Waiting Step #1: 846e69cde2d4: Waiting Step #1: 3297ed637813: Waiting Step #1: 7aac19434694: Waiting Step #1: 697c70a1725c: Waiting Step #1: c2201cf2d597: Waiting Step #1: e79501790bd5: Waiting Step #1: a46a0b8d3abf: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: d9a668348f93: Verifying Checksum Step #1: d9a668348f93: Download complete Step #1: 6f40f724b597: Verifying Checksum Step #1: 6f40f724b597: Download complete Step #1: e29c35d80dc6: Verifying Checksum Step #1: e29c35d80dc6: Download complete Step #1: 82cacf312824: Verifying Checksum Step #1: 82cacf312824: Download complete Step #1: fb369fcf3f29: Download complete Step #1: 77fedef42789: Verifying Checksum Step #1: 77fedef42789: Download complete Step #1: fac21ee78449: Verifying Checksum Step #1: fac21ee78449: Download complete Step #1: 68b14a439183: Verifying Checksum Step #1: 68b14a439183: Download complete Step #1: a333d6a89401: Verifying Checksum Step #1: a333d6a89401: Download complete Step #1: f92e588dcdb8: Verifying Checksum Step #1: f92e588dcdb8: Download complete Step #1: b549f31133a9: Pull complete Step #1: 617b048e23a4: Verifying Checksum Step #1: 617b048e23a4: Download complete Step #1: 274d50ed676b: Verifying Checksum Step #1: 274d50ed676b: Download complete Step #1: 69e7900851dc: Verifying Checksum Step #1: 69e7900851dc: Download complete Step #1: a205f2600ab4: Verifying Checksum Step #1: a205f2600ab4: Download complete Step #1: 10c5c6f6ce92: Verifying Checksum Step #1: 10c5c6f6ce92: Download complete Step #1: 8698a95b0cf1: Verifying Checksum Step #1: 8698a95b0cf1: Download complete Step #1: 9f84a9e75930: Verifying Checksum Step #1: 9f84a9e75930: Download complete Step #1: 7cdc13fb87de: Verifying Checksum Step #1: 7cdc13fb87de: Download complete Step #1: 846e69cde2d4: Verifying Checksum Step #1: 846e69cde2d4: Download complete Step #1: 479dcd71002b: Download complete Step #1: 2b5984ee5027: Download complete Step #1: 3297ed637813: Verifying Checksum Step #1: 3297ed637813: Download complete Step #1: 07f4fea6eae1: Verifying Checksum Step #1: 07f4fea6eae1: Download complete Step #1: 697c70a1725c: Verifying Checksum Step #1: 697c70a1725c: Download complete Step #1: 7aac19434694: Verifying Checksum Step #1: 7aac19434694: Download complete Step #1: e79501790bd5: Verifying Checksum Step #1: e79501790bd5: Download complete Step #1: c2201cf2d597: Verifying Checksum Step #1: c2201cf2d597: Download complete Step #1: 36d27579174f: Verifying Checksum Step #1: 36d27579174f: Download complete Step #1: 77fedef42789: Pull complete Step #1: a46a0b8d3abf: Pull complete Step #1: d9a668348f93: Pull complete Step #1: 6f40f724b597: Pull complete Step #1: e29c35d80dc6: Pull complete Step #1: 36d27579174f: Pull complete Step #1: 82cacf312824: Pull complete Step #1: fb369fcf3f29: Pull complete Step #1: 8698a95b0cf1: Pull complete Step #1: fac21ee78449: Pull complete Step #1: 68b14a439183: Pull complete Step #1: a333d6a89401: Pull complete Step #1: f92e588dcdb8: Pull complete Step #1: 617b048e23a4: Pull complete Step #1: 274d50ed676b: Pull complete Step #1: 69e7900851dc: Pull complete Step #1: a205f2600ab4: Pull complete Step #1: 10c5c6f6ce92: Pull complete Step #1: 9f84a9e75930: Pull complete Step #1: 7cdc13fb87de: Pull complete Step #1: 846e69cde2d4: Pull complete Step #1: 479dcd71002b: Pull complete Step #1: 2b5984ee5027: Pull complete Step #1: 07f4fea6eae1: Pull complete Step #1: 3297ed637813: Pull complete Step #1: 7aac19434694: Pull complete Step #1: 697c70a1725c: Pull complete Step #1: e79501790bd5: Pull complete Step #1: c2201cf2d597: Pull complete Step #1: Digest: sha256:9ebb21952916b41b8745ed188e35af1272e9affd4c75a79f2ac6681ceecd3faf Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> bc668b120d31 Step #1: Step 2/5 : RUN sed -i -e '/^#\s*deb-src.*\smain\s\+restricted/s/^#//' /etc/apt/sources.list && apt-get update && apt-get build-dep -y --no-install-recommends libelf-dev && apt-get install -y --no-install-recommends pkg-config && apt-get install -y --no-install-recommends libz-dev libz-dev:i386 Step #1: ---> Running in 9e8cf6d9cf8c Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Step #1: Get:2 http://security.ubuntu.com/ubuntu focal-security/restricted Sources [64.6 kB] Step #1: Hit:3 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:4 http://security.ubuntu.com/ubuntu focal-security/main Sources [379 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Get:6 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [878 kB] Step #1: Get:7 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [797 kB] Step #1: Get:8 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [3412 kB] Step #1: Get:9 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1179 kB] Step #1: Hit:10 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/restricted Sources [7198 B] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main Sources [1079 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal-updates/main Sources [728 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/restricted Sources [64.8 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/universe i386 Packages [960 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1475 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-backports/main Sources [10.9 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal-backports/universe Sources [11.6 kB] Step #1: Fetched 11.3 MB in 2s (6344 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Picking 'elfutils' as source package instead of 'libelf-dev' Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following NEW packages will be installed: Step #1: autoconf automake autopoint autotools-dev bison bsdmainutils debhelper Step #1: dh-autoreconf dh-strip-nondeterminism dwz file flex gawk gettext Step #1: gettext-base groff-base intltool-debian libarchive-zip-perl libbz2-dev Step #1: libcroco3 libdebhelper-perl libelf1 libfile-stripnondeterminism-perl Step #1: libglib2.0-0 libicu66 liblzma-dev libmagic-mgc libmagic1 libpipeline1 Step #1: libsigsegv2 libsub-override-perl libtool libuchardet0 libxml2 m4 man-db Step #1: po-debconf zlib1g-dev Step #1: 0 upgraded, 38 newly installed, 0 to remove and 7 not upgraded. Step #1: Need to get 18.9 MB of archives. Step #1: After this operation, 73.2 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 bsdmainutils amd64 11.1.2ubuntu3 [181 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libuchardet0 amd64 0.0.6-3build1 [65.2 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 groff-base amd64 1.22.4-4build1 [847 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libpipeline1 amd64 1.5.2-2build1 [27.7 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 man-db amd64 2.9.1-1 [1112 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 flex amd64 2.6.4-6.2 [317 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 gawk amd64 1:5.0.1+dfsg-1ubuntu0.1 [415 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libelf1 amd64 0.176-1.1ubuntu0.1 [44.2 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/main amd64 gettext-base amd64 0.19.8.1-10build1 [50.2 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal/main amd64 autopoint all 0.19.8.1-10build1 [412 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/main amd64 bison amd64 2:3.5.1+dfsg-1 [657 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal/main amd64 dh-autoreconf all 19 [16.1 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal/main amd64 libdebhelper-perl all 12.10ubuntu1 [62.1 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal/main amd64 libarchive-zip-perl all 1.67-2 [90.5 kB] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal/main amd64 libsub-override-perl all 0.09-2 [9532 B] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 libfile-stripnondeterminism-perl all 1.7.0-1 [15.9 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 dh-strip-nondeterminism all 1.7.0-1 [5228 B] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal/main amd64 dwz amd64 0.13-5 [151 kB] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal/main amd64 libcroco3 amd64 0.6.13-1 [82.5 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal/main amd64 gettext amd64 0.19.8.1-10build1 [895 kB] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal/main amd64 intltool-debian all 0.35.0+20060710.5 [24.9 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/main amd64 po-debconf all 1.0.21 [233 kB] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal/main amd64 debhelper all 12.10ubuntu1 [877 kB] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 libbz2-dev amd64 1.0.8-2 [30.2 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 liblzma-dev amd64 5.2.4-1ubuntu1.1 [147 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 18.9 MB in 5s (3511 kB/s) Step #1: Selecting previously unselected package bsdmainutils. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../0-bsdmainutils_11.1.2ubuntu3_amd64.deb ... Step #1: Unpacking bsdmainutils (11.1.2ubuntu3) ... Step #1: Selecting previously unselected package libuchardet0:amd64. Step #1: Preparing to unpack .../1-libuchardet0_0.0.6-3build1_amd64.deb ... Step #1: Unpacking libuchardet0:amd64 (0.0.6-3build1) ... Step #1: Selecting previously unselected package groff-base. Step #1: Preparing to unpack .../2-groff-base_1.22.4-4build1_amd64.deb ... Step #1: Unpacking groff-base (1.22.4-4build1) ... Step #1: Selecting previously unselected package libpipeline1:amd64. Step #1: Preparing to unpack .../3-libpipeline1_1.5.2-2build1_amd64.deb ... Step #1: Unpacking libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Selecting previously unselected package man-db. Step #1: Preparing to unpack .../4-man-db_2.9.1-1_amd64.deb ... Step #1: Unpacking man-db (2.9.1-1) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../5-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../6-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package flex. Step #1: Preparing to unpack .../7-flex_2.6.4-6.2_amd64.deb ... Step #1: Unpacking flex (2.6.4-6.2) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package gawk. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18103 files and directories currently installed.) Step #1: Preparing to unpack .../00-gawk_1%3a5.0.1+dfsg-1ubuntu0.1_amd64.deb ... Step #1: Unpacking gawk (1:5.0.1+dfsg-1ubuntu0.1) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libelf1:amd64. Step #1: Preparing to unpack .../04-libelf1_0.176-1.1ubuntu0.1_amd64.deb ... Step #1: Unpacking libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../05-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../06-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../07-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package gettext-base. Step #1: Preparing to unpack .../08-gettext-base_0.19.8.1-10build1_amd64.deb ... Step #1: Unpacking gettext-base (0.19.8.1-10build1) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../09-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../10-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../11-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package autopoint. Step #1: Preparing to unpack .../12-autopoint_0.19.8.1-10build1_all.deb ... Step #1: Unpacking autopoint (0.19.8.1-10build1) ... Step #1: Selecting previously unselected package bison. Step #1: Preparing to unpack .../13-bison_2%3a3.5.1+dfsg-1_amd64.deb ... Step #1: Unpacking bison (2:3.5.1+dfsg-1) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../14-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package dh-autoreconf. Step #1: Preparing to unpack .../15-dh-autoreconf_19_all.deb ... Step #1: Unpacking dh-autoreconf (19) ... Step #1: Selecting previously unselected package libdebhelper-perl. Step #1: Preparing to unpack .../16-libdebhelper-perl_12.10ubuntu1_all.deb ... Step #1: Unpacking libdebhelper-perl (12.10ubuntu1) ... Step #1: Selecting previously unselected package libarchive-zip-perl. Step #1: Preparing to unpack .../17-libarchive-zip-perl_1.67-2_all.deb ... Step #1: Unpacking libarchive-zip-perl (1.67-2) ... Step #1: Selecting previously unselected package libsub-override-perl. Step #1: Preparing to unpack .../18-libsub-override-perl_0.09-2_all.deb ... Step #1: Unpacking libsub-override-perl (0.09-2) ... Step #1: Selecting previously unselected package libfile-stripnondeterminism-perl. Step #1: Preparing to unpack .../19-libfile-stripnondeterminism-perl_1.7.0-1_all.deb ... Step #1: Unpacking libfile-stripnondeterminism-perl (1.7.0-1) ... Step #1: Selecting previously unselected package dh-strip-nondeterminism. Step #1: Preparing to unpack .../20-dh-strip-nondeterminism_1.7.0-1_all.deb ... Step #1: Unpacking dh-strip-nondeterminism (1.7.0-1) ... Step #1: Selecting previously unselected package dwz. Step #1: Preparing to unpack .../21-dwz_0.13-5_amd64.deb ... Step #1: Unpacking dwz (0.13-5) ... Step #1: Selecting previously unselected package libcroco3:amd64. Step #1: Preparing to unpack .../22-libcroco3_0.6.13-1_amd64.deb ... Step #1: Unpacking libcroco3:amd64 (0.6.13-1) ... Step #1: Selecting previously unselected package gettext. Step #1: Preparing to unpack .../23-gettext_0.19.8.1-10build1_amd64.deb ... Step #1: Unpacking gettext (0.19.8.1-10build1) ... Step #1: Selecting previously unselected package intltool-debian. Step #1: Preparing to unpack .../24-intltool-debian_0.35.0+20060710.5_all.deb ... Step #1: Unpacking intltool-debian (0.35.0+20060710.5) ... Step #1: Selecting previously unselected package po-debconf. Step #1: Preparing to unpack .../25-po-debconf_1.0.21_all.deb ... Step #1: Unpacking po-debconf (1.0.21) ... Step #1: Selecting previously unselected package debhelper. Step #1: Preparing to unpack .../26-debhelper_12.10ubuntu1_all.deb ... Step #1: Unpacking debhelper (12.10ubuntu1) ... Step #1: Selecting previously unselected package libbz2-dev:amd64. Step #1: Preparing to unpack .../27-libbz2-dev_1.0.8-2_amd64.deb ... Step #1: Unpacking libbz2-dev:amd64 (1.0.8-2) ... Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: Preparing to unpack .../28-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Selecting previously unselected package liblzma-dev:amd64. Step #1: Preparing to unpack .../29-liblzma-dev_5.2.4-1ubuntu1.1_amd64.deb ... Step #1: Unpacking liblzma-dev:amd64 (5.2.4-1ubuntu1.1) ... Step #1: Setting up libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up gawk (1:5.0.1+dfsg-1ubuntu0.1) ... Step #1: Setting up libarchive-zip-perl (1.67-2) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libdebhelper-perl (12.10ubuntu1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up gettext-base (0.19.8.1-10build1) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up bsdmainutils (11.1.2ubuntu3) ... Step #1: update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/write.1.gz because associated file /usr/share/man/man1/bsd-write.1.gz (of link group write) doesn't exist Step #1: update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/from.1.gz because associated file /usr/share/man/man1/bsd-from.1.gz (of link group from) doesn't exist Step #1: Setting up autopoint (0.19.8.1-10build1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up liblzma-dev:amd64 (5.2.4-1ubuntu1.1) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libuchardet0:amd64 (0.0.6-3build1) ... Step #1: Setting up bison (2:3.5.1+dfsg-1) ... Step #1: update-alternatives: using /usr/bin/bison.yacc to provide /usr/bin/yacc (yacc) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/yacc.1.gz because associated file /usr/share/man/man1/bison.yacc.1.gz (of link group yacc) doesn't exist Step #1: Setting up libsub-override-perl (0.09-2) ... Step #1: Setting up libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up libbz2-dev:amd64 (1.0.8-2) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libfile-stripnondeterminism-perl (1.7.0-1) ... Step #1: Setting up flex (2.6.4-6.2) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up libcroco3:amd64 (0.6.13-1) ... Step #1: Setting up dh-strip-nondeterminism (1.7.0-1) ... Step #1: Setting up dwz (0.13-5) ... Step #1: Setting up groff-base (1.22.4-4build1) ... Step #1: Setting up gettext (0.19.8.1-10build1) ... Step #1: Setting up man-db (2.9.1-1) ... Step #1: Building database of manual pages ... Step #1: Setting up intltool-debian (0.35.0+20060710.5) ... Step #1: Setting up po-debconf (1.0.21) ... Step #1: Setting up dh-autoreconf (19) ... Step #1: Setting up debhelper (12.10ubuntu1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following NEW packages will be installed: Step #1: pkg-config Step #1: 0 upgraded, 1 newly installed, 0 to remove and 7 not upgraded. Step #1: Need to get 45.5 kB of archives. Step #1: After this operation, 195 kB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 45.5 kB in 0s (97.3 kB/s) Step #1: Selecting previously unselected package pkg-config. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19647 files and directories currently installed.) Step #1: Preparing to unpack .../pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Processing triggers for man-db (2.9.1-1) ... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: zlib1g-dev is already the newest version (1:1.2.11.dfsg-2ubuntu1.5). Step #1: The following additional packages will be installed: Step #1: gcc-10-base:i386 libc6:i386 libc6-dev:i386 libcrypt-dev:i386 libcrypt1:i386 Step #1: libgcc-s1:i386 linux-libc-dev:i386 zlib1g:i386 Step #1: Suggested packages: Step #1: glibc-doc:i386 locales:i386 Step #1: Recommended packages: Step #1: libidn2-0:i386 Step #1: The following NEW packages will be installed: Step #1: gcc-10-base:i386 libc6:i386 libc6-dev:i386 libcrypt-dev:i386 libcrypt1:i386 Step #1: libgcc-s1:i386 linux-libc-dev:i386 zlib1g:i386 zlib1g-dev:i386 Step #1: 0 upgraded, 9 newly installed, 0 to remove and 7 not upgraded. Step #1: Need to get 6524 kB of archives. Step #1: After this operation, 35.7 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main i386 gcc-10-base i386 10.5.0-1ubuntu1~20.04 [20.8 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main i386 libgcc-s1 i386 10.5.0-1ubuntu1~20.04 [49.4 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main i386 libcrypt1 i386 1:4.4.10-10ubuntu4 [90.9 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main i386 libc6 i386 2.31-0ubuntu9.14 [2581 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main i386 zlib1g i386 1:1.2.11.dfsg-2ubuntu1.5 [57.0 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main i386 linux-libc-dev i386 5.4.0-172.190 [1131 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main i386 libcrypt-dev i386 1:4.4.10-10ubuntu4 [119 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main i386 libc6-dev i386 2.31-0ubuntu9.14 [2316 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main i386 zlib1g-dev i386 1:1.2.11.dfsg-2ubuntu1.5 [159 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 6524 kB in 1s (4668 kB/s) Step #1: Selecting previously unselected package gcc-10-base:i386. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19664 files and directories currently installed.) Step #1: Preparing to unpack .../0-gcc-10-base_10.5.0-1ubuntu1~20.04_i386.deb ... Step #1: Unpacking gcc-10-base:i386 (10.5.0-1ubuntu1~20.04) ... Step #1: Selecting previously unselected package libgcc-s1:i386. Step #1: Preparing to unpack .../1-libgcc-s1_10.5.0-1ubuntu1~20.04_i386.deb ... Step #1: Unpacking libgcc-s1:i386 (10.5.0-1ubuntu1~20.04) ... Step #1: Selecting previously unselected package libcrypt1:i386. Step #1: Preparing to unpack .../2-libcrypt1_1%3a4.4.10-10ubuntu4_i386.deb ... Step #1: Unpacking libcrypt1:i386 (1:4.4.10-10ubuntu4) ... Step #1: Selecting previously unselected package libc6:i386. Step #1: Preparing to unpack .../3-libc6_2.31-0ubuntu9.14_i386.deb ... Step #1: Unpacking libc6:i386 (2.31-0ubuntu9.14) ... Step #1: Replacing files in old package libc6-i386 (2.31-0ubuntu9.14) ... Step #1: Selecting previously unselected package zlib1g:i386. Step #1: Preparing to unpack .../4-zlib1g_1%3a1.2.11.dfsg-2ubuntu1.5_i386.deb ... Step #1: Unpacking zlib1g:i386 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Selecting previously unselected package linux-libc-dev:i386. Step #1: Preparing to unpack .../5-linux-libc-dev_5.4.0-172.190_i386.deb ... Step #1: Unpacking linux-libc-dev:i386 (5.4.0-172.190) ... Step #1: Selecting previously unselected package libcrypt-dev:i386. Step #1: Preparing to unpack .../6-libcrypt-dev_1%3a4.4.10-10ubuntu4_i386.deb ... Step #1: Unpacking libcrypt-dev:i386 (1:4.4.10-10ubuntu4) ... Step #1: Selecting previously unselected package libc6-dev:i386. Step #1: Preparing to unpack .../7-libc6-dev_2.31-0ubuntu9.14_i386.deb ... Step #1: Unpacking libc6-dev:i386 (2.31-0ubuntu9.14) ... Step #1: Selecting previously unselected package zlib1g-dev:i386. Step #1: Preparing to unpack .../8-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_i386.deb ... Step #1: Unpacking zlib1g-dev:i386 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up linux-libc-dev:i386 (5.4.0-172.190) ... Step #1: Setting up gcc-10-base:i386 (10.5.0-1ubuntu1~20.04) ... Step #1: Setting up libcrypt1:i386 (1:4.4.10-10ubuntu4) ... Step #1: Setting up libgcc-s1:i386 (10.5.0-1ubuntu1~20.04) ... Step #1: Setting up libc6:i386 (2.31-0ubuntu9.14) ... Step #1: Setting up libcrypt-dev:i386 (1:4.4.10-10ubuntu4) ... Step #1: Setting up libc6-dev:i386 (2.31-0ubuntu9.14) ... Step #1: Setting up zlib1g:i386 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up zlib1g-dev:i386 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #1: Processing triggers for man-db (2.9.1-1) ... Step #1: Removing intermediate container 9e8cf6d9cf8c Step #1: ---> 3872c256b726 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/libbpf/libbpf Step #1: ---> Running in ec9a0578e247 Step #1: Cloning into 'libbpf'... Step #1: Removing intermediate container ec9a0578e247 Step #1: ---> 644f3271afbe Step #1: Step 4/5 : WORKDIR libbpf Step #1: ---> Running in d38c3a10d9a0 Step #1: Removing intermediate container d38c3a10d9a0 Step #1: ---> cd3148c10fbf Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> 0728b0eb2c1a Step #1: Successfully built 0728b0eb2c1a Step #1: Successfully tagged gcr.io/oss-fuzz/libbpf:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/libbpf Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileAUq2aP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libbpf/.git Step #2 - "srcmap": + GIT_DIR=/src/libbpf Step #2 - "srcmap": + cd /src/libbpf Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/libbpf/libbpf Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=445486dcbf9ddd8b3ca799a98ace58d23cee31a1 Step #2 - "srcmap": + jq_inplace /tmp/fileAUq2aP '."/src/libbpf" = { type: "git", url: "https://github.com/libbpf/libbpf", rev: "445486dcbf9ddd8b3ca799a98ace58d23cee31a1" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filee7XgRc Step #2 - "srcmap": + cat /tmp/fileAUq2aP Step #2 - "srcmap": + jq '."/src/libbpf" = { type: "git", url: "https://github.com/libbpf/libbpf", rev: "445486dcbf9ddd8b3ca799a98ace58d23cee31a1" }' Step #2 - "srcmap": + mv /tmp/filee7XgRc /tmp/fileAUq2aP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileAUq2aP Step #2 - "srcmap": + rm /tmp/fileAUq2aP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/libbpf": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/libbpf/libbpf", Step #2 - "srcmap": "rev": "445486dcbf9ddd8b3ca799a98ace58d23cee31a1" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-afl-address-x86_64" Step #3 - "compile-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": Copying precompiled AFL++ Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": AFL++ target compilation setup: Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #3 - "compile-afl-address-x86_64": AFL_QUIET=1 Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": done. Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope Step #3 - "compile-afl-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #3 - "compile-afl-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": + ./scripts/build-fuzzers.sh Step #3 - "compile-afl-address-x86_64": + SANITIZER=address Step #3 - "compile-afl-address-x86_64": + flags='-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize=fuzzer-no-link' Step #3 - "compile-afl-address-x86_64": + export CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": + CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope ' Step #3 - "compile-afl-address-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope ' Step #3 - "compile-afl-address-x86_64": + export CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": + CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++' Step #3 - "compile-afl-address-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++' Step #3 - "compile-afl-address-x86_64": ++ dirname -- ./scripts/build-fuzzers.sh Step #3 - "compile-afl-address-x86_64": + cd ./scripts/.. Step #3 - "compile-afl-address-x86_64": + export OUT=/workspace/out/afl-address-x86_64 Step #3 - "compile-afl-address-x86_64": + OUT=/workspace/out/afl-address-x86_64 Step #3 - "compile-afl-address-x86_64": + mkdir -p /workspace/out/afl-address-x86_64 Step #3 - "compile-afl-address-x86_64": + export LIB_FUZZING_ENGINE=/usr/lib/libFuzzingEngine.a Step #3 - "compile-afl-address-x86_64": + LIB_FUZZING_ENGINE=/usr/lib/libFuzzingEngine.a Step #3 - "compile-afl-address-x86_64": + [[ address == memory ]] Step #3 - "compile-afl-address-x86_64": + [[ address == undefined ]] Step #3 - "compile-afl-address-x86_64": + rm -rf elfutils Step #3 - "compile-afl-address-x86_64": + git clone https://sourceware.org/git/elfutils.git Step #3 - "compile-afl-address-x86_64": Cloning into 'elfutils'... Step #3 - "compile-afl-address-x86_64": remote: Enumerating objects: 38615, done. Step #3 - "compile-afl-address-x86_64": remote: Counting objects: 0% (1/38615) remote: Counting objects: 1% (387/38615) remote: Counting objects: 2% (773/38615) remote: Counting objects: 3% (1159/38615) remote: Counting objects: 4% (1545/38615) remote: Counting objects: 5% (1931/38615) remote: Counting objects: 6% (2317/38615) remote: Counting objects: 7% (2704/38615) remote: Counting objects: 8% (3090/38615) remote: Counting objects: 9% (3476/38615) remote: Counting objects: 10% (3862/38615) remote: Counting objects: 11% (4248/38615) remote: Counting objects: 12% (4634/38615) remote: Counting objects: 13% (5020/38615) remote: Counting objects: 14% (5407/38615) remote: Counting objects: 15% (5793/38615) remote: Counting objects: 16% (6179/38615) remote: Counting objects: 17% (6565/38615) remote: Counting objects: 18% (6951/38615) remote: Counting objects: 19% (7337/38615) remote: Counting objects: 20% (7723/38615) remote: Counting objects: 21% (8110/38615) remote: Counting objects: 22% (8496/38615) remote: Counting objects: 23% (8882/38615) remote: Counting objects: 24% (9268/38615) remote: Counting objects: 25% (9654/38615) remote: Counting objects: 26% (10040/38615) remote: Counting objects: 27% (10427/38615) remote: Counting objects: 28% (10813/38615) remote: Counting objects: 29% (11199/38615) remote: Counting objects: 30% (11585/38615) remote: Counting objects: 31% (11971/38615) remote: Counting objects: 32% (12357/38615) remote: Counting objects: 33% (12743/38615) remote: Counting objects: 34% (13130/38615) remote: Counting objects: 35% (13516/38615) remote: Counting objects: 36% (13902/38615) remote: Counting objects: 37% (14288/38615) remote: Counting objects: 38% (14674/38615) remote: Counting objects: 39% (15060/38615) remote: Counting objects: 40% (15446/38615) remote: Counting objects: 41% (15833/38615) remote: Counting objects: 42% (16219/38615) remote: Counting objects: 43% (16605/38615) remote: Counting objects: 44% (16991/38615) remote: Counting objects: 45% (17377/38615) remote: Counting objects: 46% (17763/38615) remote: Counting objects: 47% (18150/38615) remote: Counting objects: 48% (18536/38615) remote: Counting objects: 49% (18922/38615) remote: Counting objects: 50% (19308/38615) remote: Counting objects: 51% (19694/38615) remote: Counting objects: 52% (20080/38615) remote: Counting objects: 53% (20466/38615) remote: Counting objects: 54% (20853/38615) remote: Counting objects: 55% (21239/38615) remote: Counting objects: 56% (21625/38615) remote: Counting objects: 57% (22011/38615) remote: Counting objects: 58% (22397/38615) remote: Counting objects: 59% (22783/38615) remote: Counting objects: 60% (23169/38615) remote: Counting objects: 61% (23556/38615) remote: Counting objects: 62% (23942/38615) remote: Counting objects: 63% (24328/38615) remote: Counting objects: 64% (24714/38615) remote: Counting objects: 65% (25100/38615) remote: Counting objects: 66% (25486/38615) remote: Counting objects: 67% (25873/38615) remote: Counting objects: 68% (26259/38615) remote: Counting objects: 69% (26645/38615) remote: Counting objects: 70% (27031/38615) remote: Counting objects: 71% (27417/38615) remote: Counting objects: 72% (27803/38615) remote: Counting objects: 73% (28189/38615) remote: Counting objects: 74% (28576/38615) remote: Counting objects: 75% (28962/38615) remote: Counting objects: 76% (29348/38615) remote: Counting objects: 77% (29734/38615) remote: Counting objects: 78% (30120/38615) remote: Counting objects: 79% (30506/38615) remote: Counting objects: 80% (30892/38615) remote: Counting objects: 81% (31279/38615) remote: Counting objects: 82% (31665/38615) remote: Counting objects: 83% (32051/38615) remote: Counting objects: 84% (32437/38615) remote: Counting objects: 85% (32823/38615) remote: Counting objects: 86% (33209/38615) remote: Counting objects: 87% (33596/38615) remote: Counting objects: 88% (33982/38615) remote: Counting objects: 89% (34368/38615) remote: Counting objects: 90% (34754/38615) remote: Counting objects: 91% (35140/38615) remote: Counting objects: 92% (35526/38615) remote: Counting objects: 93% (35912/38615) remote: Counting objects: 94% (36299/38615) remote: Counting objects: 95% (36685/38615) remote: Counting objects: 96% (37071/38615) remote: Counting objects: 97% (37457/38615) remote: Counting objects: 98% (37843/38615) remote: Counting objects: 99% (38229/38615) remote: Counting objects: 100% (38615/38615) remote: Counting objects: 100% (38615/38615), done. Step #3 - "compile-afl-address-x86_64": remote: Compressing objects: 0% (1/7338) remote: Compressing objects: 1% (74/7338) remote: Compressing objects: 2% (147/7338) remote: Compressing objects: 3% (221/7338) remote: Compressing objects: 4% (294/7338) remote: Compressing objects: 5% (367/7338) remote: Compressing objects: 6% (441/7338) remote: Compressing objects: 7% (514/7338) remote: Compressing objects: 8% (588/7338) remote: Compressing objects: 9% (661/7338) remote: Compressing objects: 10% (734/7338) remote: Compressing objects: 11% (808/7338) remote: Compressing objects: 12% (881/7338) remote: Compressing objects: 13% (954/7338) remote: Compressing objects: 14% (1028/7338) remote: Compressing objects: 15% (1101/7338) remote: Compressing objects: 16% (1175/7338) remote: Compressing objects: 17% (1248/7338) remote: Compressing objects: 18% (1321/7338) remote: Compressing objects: 19% (1395/7338) remote: Compressing objects: 20% (1468/7338) remote: Compressing objects: 21% (1541/7338) remote: Compressing objects: 22% (1615/7338) remote: Compressing objects: 23% (1688/7338) remote: Compressing objects: 24% (1762/7338) remote: Compressing objects: 25% (1835/7338) remote: Compressing objects: 26% (1908/7338) remote: Compressing objects: 27% (1982/7338) remote: Compressing objects: 28% (2055/7338) remote: Compressing objects: 29% (2129/7338) remote: Compressing objects: 30% (2202/7338) remote: Compressing objects: 31% (2275/7338) remote: Compressing objects: 32% (2349/7338) remote: Compressing objects: 33% (2422/7338) remote: Compressing objects: 34% (2495/7338) remote: Compressing objects: 35% (2569/7338) remote: Compressing objects: 36% (2642/7338) remote: Compressing objects: 37% (2716/7338) remote: Compressing objects: 38% (2789/7338) remote: Compressing objects: 39% (2862/7338) remote: Compressing objects: 40% (2936/7338) remote: Compressing objects: 41% (3009/7338) remote: Compressing objects: 42% (3082/7338) remote: Compressing objects: 43% (3156/7338) remote: Compressing objects: 44% (3229/7338) remote: Compressing objects: 45% (3303/7338) remote: Compressing objects: 46% (3376/7338) remote: Compressing objects: 47% (3449/7338) remote: Compressing objects: 48% (3523/7338) remote: Compressing objects: 49% (3596/7338) remote: Compressing objects: 50% (3669/7338) remote: Compressing objects: 51% (3743/7338) remote: Compressing objects: 52% (3816/7338) remote: Compressing objects: 53% (3890/7338) remote: Compressing objects: 54% (3963/7338) remote: Compressing objects: 55% (4036/7338) remote: Compressing objects: 56% (4110/7338) remote: Compressing objects: 57% (4183/7338) remote: Compressing objects: 58% (4257/7338) remote: Compressing objects: 59% (4330/7338) remote: Compressing objects: 60% (4403/7338) remote: Compressing objects: 61% (4477/7338) remote: Compressing objects: 62% (4550/7338) remote: Compressing objects: 63% (4623/7338) remote: Compressing objects: 64% (4697/7338) remote: Compressing objects: 65% (4770/7338) remote: Compressing objects: 66% (4844/7338) remote: Compressing objects: 67% (4917/7338) remote: Compressing objects: 68% (4990/7338) remote: Compressing objects: 69% (5064/7338) remote: Compressing objects: 70% (5137/7338) remote: Compressing objects: 71% (5210/7338) remote: Compressing objects: 72% (5284/7338) remote: Compressing objects: 73% (5357/7338) remote: Compressing objects: 74% (5431/7338) remote: Compressing objects: 75% (5504/7338) remote: Compressing objects: 76% (5577/7338) remote: Compressing objects: 77% (5651/7338) remote: Compressing objects: 78% (5724/7338) remote: Compressing objects: 79% (5798/7338) remote: Compressing objects: 80% (5871/7338) remote: Compressing objects: 81% (5944/7338) remote: Compressing objects: 82% (6018/7338) remote: Compressing objects: 83% (6091/7338) remote: Compressing objects: 84% (6164/7338) remote: Compressing objects: 85% (6238/7338) remote: Compressing objects: 86% (6311/7338) remote: Compressing objects: 87% (6385/7338) remote: Compressing objects: 88% (6458/7338) remote: Compressing objects: 89% (6531/7338) remote: Compressing objects: 90% (6605/7338) remote: Compressing objects: 91% (6678/7338) remote: Compressing objects: 92% (6751/7338) remote: Compressing objects: 93% (6825/7338) remote: Compressing objects: 94% (6898/7338) remote: Compressing objects: 95% (6972/7338) remote: Compressing objects: 96% (7045/7338) remote: Compressing objects: 97% (7118/7338) remote: Compressing objects: 98% (7192/7338) remote: Compressing objects: 99% (7265/7338) remote: Compressing objects: 100% (7338/7338) remote: Compressing objects: 100% (7338/7338), done. Step #3 - "compile-afl-address-x86_64": Receiving objects: 0% (1/38615) Receiving objects: 1% (387/38615) Receiving objects: 2% (773/38615) Receiving objects: 3% (1159/38615) Receiving objects: 4% (1545/38615) Receiving objects: 5% (1931/38615) Receiving objects: 6% (2317/38615) Receiving objects: 7% (2704/38615) Receiving objects: 8% (3090/38615) Receiving objects: 9% (3476/38615) Receiving objects: 10% (3862/38615) Receiving objects: 11% (4248/38615) Receiving objects: 12% (4634/38615) Receiving objects: 13% (5020/38615) Receiving objects: 14% (5407/38615) Receiving objects: 15% (5793/38615) Receiving objects: 16% (6179/38615) Receiving objects: 17% (6565/38615) Receiving objects: 18% (6951/38615) Receiving objects: 19% (7337/38615) Receiving objects: 20% (7723/38615) Receiving objects: 21% (8110/38615) Receiving objects: 22% (8496/38615) Receiving objects: 23% (8882/38615) Receiving objects: 24% (9268/38615) Receiving objects: 25% (9654/38615) Receiving objects: 26% (10040/38615) Receiving objects: 27% (10427/38615) Receiving objects: 28% (10813/38615) Receiving objects: 29% (11199/38615) Receiving objects: 30% (11585/38615) Receiving objects: 31% (11971/38615) Receiving objects: 32% (12357/38615) Receiving objects: 33% (12743/38615) Receiving objects: 34% (13130/38615) Receiving objects: 35% (13516/38615) Receiving objects: 36% (13902/38615) Receiving objects: 37% (14288/38615) Receiving objects: 38% (14674/38615) Receiving objects: 39% (15060/38615) Receiving objects: 40% (15446/38615) Receiving objects: 41% (15833/38615) Receiving objects: 42% (16219/38615) Receiving objects: 43% (16605/38615) Receiving objects: 44% (16991/38615) Receiving objects: 45% (17377/38615) Receiving objects: 46% (17763/38615) Receiving objects: 47% (18150/38615) Receiving objects: 48% (18536/38615) Receiving objects: 49% (18922/38615) Receiving objects: 50% (19308/38615) Receiving objects: 51% (19694/38615) Receiving objects: 52% (20080/38615) Receiving objects: 53% (20466/38615) Receiving objects: 54% (20853/38615) Receiving objects: 55% (21239/38615) Receiving objects: 56% (21625/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 57% (22011/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 58% (22397/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 59% (22783/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 60% (23169/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 61% (23556/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 62% (23942/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 63% (24328/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 64% (24714/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 65% (25100/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 66% (25486/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 67% (25873/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 68% (26259/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 69% (26645/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 70% (27031/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 71% (27417/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 72% (27803/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 73% (28189/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 74% (28576/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 75% (28962/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 76% (29348/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 77% (29734/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 78% (30120/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 79% (30506/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 80% (30892/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 81% (31279/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 82% (31665/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 83% (32051/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 84% (32437/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 85% (32823/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 86% (33209/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 87% (33596/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 88% (33982/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 89% (34368/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 90% (34754/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 91% (35140/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 92% (35526/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 93% (35912/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 94% (36299/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 95% (36685/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 96% (37071/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 97% (37457/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 98% (37843/38615), 11.29 MiB | 22.56 MiB/s remote: Total 38615 (delta 32217), reused 37479 (delta 31234), pack-reused 0 Step #3 - "compile-afl-address-x86_64": Receiving objects: 99% (38229/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 100% (38615/38615), 11.29 MiB | 22.56 MiB/s Receiving objects: 100% (38615/38615), 21.53 MiB | 26.85 MiB/s, done. Step #3 - "compile-afl-address-x86_64": Resolving deltas: 0% (0/32217) Resolving deltas: 1% (458/32217) Resolving deltas: 3% (993/32217) Resolving deltas: 4% (1384/32217) Resolving deltas: 5% (1638/32217) Resolving deltas: 6% (2078/32217) Resolving deltas: 7% (2314/32217) Resolving deltas: 8% (2645/32217) Resolving deltas: 9% (2901/32217) Resolving deltas: 10% (3222/32217) Resolving deltas: 11% (3579/32217) Resolving deltas: 12% (4023/32217) Resolving deltas: 13% (4195/32217) Resolving deltas: 14% (4543/32217) Resolving deltas: 15% (4842/32217) Resolving deltas: 16% (5233/32217) Resolving deltas: 17% (5743/32217) Resolving deltas: 18% (5815/32217) Resolving deltas: 19% (6250/32217) Resolving deltas: 20% (6457/32217) Resolving deltas: 21% (6829/32217) Resolving deltas: 22% (7303/32217) Resolving deltas: 23% (7470/32217) Resolving deltas: 25% (8370/32217) Resolving deltas: 26% (8500/32217) Resolving deltas: 27% (8783/32217) Resolving deltas: 29% (9542/32217) Resolving deltas: 30% (9722/32217) Resolving deltas: 31% (10006/32217) Resolving deltas: 32% (10333/32217) Resolving deltas: 33% (10814/32217) Resolving deltas: 34% (10973/32217) Resolving deltas: 35% (11277/32217) Resolving deltas: 36% (11647/32217) Resolving deltas: 37% (11935/32217) Resolving deltas: 38% (12465/32217) Resolving deltas: 39% (12633/32217) Resolving deltas: 40% (12889/32217) Resolving deltas: 41% (13250/32217) Resolving deltas: 42% (13590/32217) Resolving deltas: 43% (13879/32217) Resolving deltas: 44% (14193/32217) Resolving deltas: 45% (14709/32217) Resolving deltas: 46% (14842/32217) Resolving deltas: 47% (15217/32217) Resolving deltas: 48% (15595/32217) Resolving deltas: 49% (15787/32217) Resolving deltas: 50% (16183/32217) Resolving deltas: 51% (16484/32217) Resolving deltas: 52% (16753/32217) Resolving deltas: 53% (17108/32217) Resolving deltas: 54% (17410/32217) Resolving deltas: 55% (17726/32217) Resolving deltas: 56% (18147/32217) Resolving deltas: 57% (18488/32217) Resolving deltas: 58% (18721/32217) Resolving deltas: 59% (19031/32217) Resolving deltas: 60% (19340/32217) Resolving deltas: 61% (19656/32217) Resolving deltas: 62% (20012/32217) Resolving deltas: 63% (20316/32217) Resolving deltas: 64% (20661/32217) Resolving deltas: 65% (20949/32217) Resolving deltas: 66% (21284/32217) Resolving deltas: 67% (21687/32217) Resolving deltas: 68% (21956/32217) Resolving deltas: 69% (22536/32217) Resolving deltas: 70% (22620/32217) Resolving deltas: 71% (22978/32217) Resolving deltas: 72% (23232/32217) Resolving deltas: 73% (23540/32217) Resolving deltas: 74% (23870/32217) Resolving deltas: 75% (24402/32217) Resolving deltas: 77% (24881/32217) Resolving deltas: 78% (25238/32217) Resolving deltas: 80% (25979/32217) Resolving deltas: 81% (26120/32217) Resolving deltas: 82% (26419/32217) Resolving deltas: 83% (26745/32217) Resolving deltas: 84% (27116/32217) Resolving deltas: 85% (27385/32217) Resolving deltas: 86% (27709/32217) Resolving deltas: 87% (28055/32217) Resolving deltas: 88% (28352/32217) Resolving deltas: 89% (28846/32217) Resolving deltas: 90% (29021/32217) Resolving deltas: 91% (29338/32217) Resolving deltas: 92% (29676/32217) Resolving deltas: 93% (29988/32217) Resolving deltas: 93% (30088/32217) Resolving deltas: 94% (30292/32217) Resolving deltas: 95% (30637/32217) Resolving deltas: 96% (30939/32217) Resolving deltas: 97% (31254/32217) Resolving deltas: 98% (31612/32217) Resolving deltas: 99% (32005/32217) Resolving deltas: 100% (32217/32217) Resolving deltas: 100% (32217/32217), done. Step #3 - "compile-afl-address-x86_64": + cd elfutils Step #3 - "compile-afl-address-x86_64": + git checkout 67a187d4c1790058fc7fd218317851cb68bb087c Step #3 - "compile-afl-address-x86_64": Note: switching to '67a187d4c1790058fc7fd218317851cb68bb087c'. Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #3 - "compile-afl-address-x86_64": changes and commit them, and you can discard any commits you make in this Step #3 - "compile-afl-address-x86_64": state without impacting any branches by switching back to a branch. Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": If you want to create a new branch to retain commits you create, you may Step #3 - "compile-afl-address-x86_64": do so (now or later) by using -c with the switch command. Example: Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": git switch -c Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": Or undo this operation with: Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": git switch - Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": HEAD is now at 67a187d4 Prepare for 0.189 Step #3 - "compile-afl-address-x86_64": + git log --oneline -1 Step #3 - "compile-afl-address-x86_64": [?1h= 67a187d4 (HEAD, tag: elfutils-0.189) Prepare for 0.189 Step #3 - "compile-afl-address-x86_64": [?1l>+ sed -i 's/^\(NO_UNDEFINED=\).*/\1/' configure.ac Step #3 - "compile-afl-address-x86_64": + sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac Step #3 - "compile-afl-address-x86_64": + [[ address == undefined ]] Step #3 - "compile-afl-address-x86_64": + autoreconf -i -f Step #3 - "compile-afl-address-x86_64": autopoint: using AM_GNU_GETTEXT_REQUIRE_VERSION instead of AM_GNU_GETTEXT_VERSION Step #3 - "compile-afl-address-x86_64": Copying file ABOUT-NLS Step #3 - "compile-afl-address-x86_64": Copying file config/config.rpath Step #3 - "compile-afl-address-x86_64": Copying file m4/codeset.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/extern-inline.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/fcntl-o.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/gettext.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/glibc2.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/glibc21.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/iconv.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/intdiv0.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/intl.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/intldir.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/intlmacosx.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/intmax.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/inttypes-pri.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/inttypes_h.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/lcmessage.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/lib-ld.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/lib-link.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/lib-prefix.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/lock.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/longlong.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/nls.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/po.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/printf-posix.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/progtest.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/size_max.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/stdint_h.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/threadlib.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/uintmax_t.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/visibility.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/wchar_t.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/wint_t.m4 Step #3 - "compile-afl-address-x86_64": Copying file m4/xsize.m4 Step #3 - "compile-afl-address-x86_64": Copying file po/Makefile.in.in Step #3 - "compile-afl-address-x86_64": Copying file po/Makevars.template Step #3 - "compile-afl-address-x86_64": Copying file po/Rules-quot Step #3 - "compile-afl-address-x86_64": Copying file po/boldquot.sed Step #3 - "compile-afl-address-x86_64": Copying file po/en@boldquot.header Step #3 - "compile-afl-address-x86_64": Copying file po/en@quot.header Step #3 - "compile-afl-address-x86_64": Copying file po/insert-header.sin Step #3 - "compile-afl-address-x86_64": Copying file po/quot.sed Step #3 - "compile-afl-address-x86_64": Copying file po/remove-potcdate.sin Step #3 - "compile-afl-address-x86_64": configure.ac:97: installing 'config/ar-lib' Step #3 - "compile-afl-address-x86_64": configure.ac:91: installing 'config/compile' Step #3 - "compile-afl-address-x86_64": configure.ac:67: installing 'config/config.guess' Step #3 - "compile-afl-address-x86_64": configure.ac:67: installing 'config/config.sub' Step #3 - "compile-afl-address-x86_64": configure.ac:52: installing 'config/install-sh' Step #3 - "compile-afl-address-x86_64": configure.ac:52: installing 'config/missing' Step #3 - "compile-afl-address-x86_64": Makefile.am: installing './INSTALL' Step #3 - "compile-afl-address-x86_64": backends/Makefile.am: installing 'config/depcomp' Step #3 - "compile-afl-address-x86_64": configure.ac: installing 'config/ylwrap' Step #3 - "compile-afl-address-x86_64": parallel-tests: installing 'config/test-driver' Step #3 - "compile-afl-address-x86_64": + ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod --disable-demangler --without-bzlib --without-lzma --without-zstd CC=/src/aflplusplus/afl-clang-fast 'CFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope ' CXX=/src/aflplusplus/afl-clang-fast++ 'CXXFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++' 'LDFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope ' Step #3 - "compile-afl-address-x86_64": configure: No --program-prefix given, using "eu-" Step #3 - "compile-afl-address-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-afl-address-x86_64": checking whether build environment is sane... yes Step #3 - "compile-afl-address-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-afl-address-x86_64": checking for gawk... gawk Step #3 - "compile-afl-address-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-afl-address-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-afl-address-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #3 - "compile-afl-address-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-afl-address-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-afl-address-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-afl-address-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-afl-address-x86_64": checking for gcc... /src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": checking whether the C compiler works... yes Step #3 - "compile-afl-address-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-afl-address-x86_64": checking for suffix of executables... Step #3 - "compile-afl-address-x86_64": checking whether we are cross compiling... no Step #3 - "compile-afl-address-x86_64": checking for suffix of object files... o Step #3 - "compile-afl-address-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-afl-address-x86_64": checking whether /src/aflplusplus/afl-clang-fast accepts -g... yes Step #3 - "compile-afl-address-x86_64": checking for /src/aflplusplus/afl-clang-fast option to accept ISO C89... none needed Step #3 - "compile-afl-address-x86_64": checking whether /src/aflplusplus/afl-clang-fast understands -c and -o together... yes Step #3 - "compile-afl-address-x86_64": checking dependency style of /src/aflplusplus/afl-clang-fast... gcc3 Step #3 - "compile-afl-address-x86_64": checking for /src/aflplusplus/afl-clang-fast option to accept ISO C99... none needed Step #3 - "compile-afl-address-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-afl-address-x86_64": checking whether /src/aflplusplus/afl-clang-fast++ accepts -g... yes Step #3 - "compile-afl-address-x86_64": checking dependency style of /src/aflplusplus/afl-clang-fast++... gcc3 Step #3 - "compile-afl-address-x86_64": checking for ranlib... ranlib Step #3 - "compile-afl-address-x86_64": checking for bison... bison -y Step #3 - "compile-afl-address-x86_64": checking for flex... flex Step #3 - "compile-afl-address-x86_64": checking lex output file root... lex.yy Step #3 - "compile-afl-address-x86_64": checking lex library... none needed Step #3 - "compile-afl-address-x86_64": checking whether yytext is a pointer... no Step #3 - "compile-afl-address-x86_64": checking for ar... ar Step #3 - "compile-afl-address-x86_64": checking the archiver (ar) interface... ar Step #3 - "compile-afl-address-x86_64": checking for readelf... readelf Step #3 - "compile-afl-address-x86_64": checking for nm... nm Step #3 - "compile-afl-address-x86_64": checking whether gcc supports __attribute__((visibility()))... yes Step #3 - "compile-afl-address-x86_64": checking whether gcc supports __attribute__((gcc_struct))... no Step #3 - "compile-afl-address-x86_64": checking whether gcc supports -fPIC... yes Step #3 - "compile-afl-address-x86_64": checking whether gcc supports -fPIE... yes Step #3 - "compile-afl-address-x86_64": checking whether gcc supports ... yes Step #3 - "compile-afl-address-x86_64": checking whether the compiler generates build-ids... no Step #3 - "compile-afl-address-x86_64": configure: WARNING: compiler doesn't generate build-id by default Step #3 - "compile-afl-address-x86_64": checking whether gcc supports -Wl,-z,relro... yes Step #3 - "compile-afl-address-x86_64": checking for __thread support... yes Step #3 - "compile-afl-address-x86_64": checking whether gcc provides stdatomic.h... yes Step #3 - "compile-afl-address-x86_64": checking for special C compiler options needed for large files... no Step #3 - "compile-afl-address-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #3 - "compile-afl-address-x86_64": checking whether fts.h is bad when included (with LFS)... no Step #3 - "compile-afl-address-x86_64": checking whether to add -D_FORTIFY_SOURCE=2 or =3 to CFLAGS... yes -D_FORTIFY_SOURCE=3 Step #3 - "compile-afl-address-x86_64": checking for library containing gzdirect... -lz Step #3 - "compile-afl-address-x86_64": checking whether memrchr is declared... yes Step #3 - "compile-afl-address-x86_64": checking whether rawmemchr is declared... yes Step #3 - "compile-afl-address-x86_64": checking whether powerof2 is declared... yes Step #3 - "compile-afl-address-x86_64": checking whether mempcpy is declared... yes Step #3 - "compile-afl-address-x86_64": checking whether reallocarray is declared... yes Step #3 - "compile-afl-address-x86_64": checking for process_vm_readv... yes Step #3 - "compile-afl-address-x86_64": checking for mremap... yes Step #3 - "compile-afl-address-x86_64": checking how to run the C preprocessor... /src/aflplusplus/afl-clang-fast -E Step #3 - "compile-afl-address-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-afl-address-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-afl-address-x86_64": checking for ANSI C header files... yes Step #3 - "compile-afl-address-x86_64": checking for sys/types.h... yes Step #3 - "compile-afl-address-x86_64": checking for sys/stat.h... yes Step #3 - "compile-afl-address-x86_64": checking for stdlib.h... yes Step #3 - "compile-afl-address-x86_64": checking for string.h... yes Step #3 - "compile-afl-address-x86_64": checking for memory.h... yes Step #3 - "compile-afl-address-x86_64": checking for strings.h... yes Step #3 - "compile-afl-address-x86_64": checking for inttypes.h... yes Step #3 - "compile-afl-address-x86_64": checking for stdint.h... yes Step #3 - "compile-afl-address-x86_64": checking for unistd.h... yes Step #3 - "compile-afl-address-x86_64": checking error.h usability... yes Step #3 - "compile-afl-address-x86_64": checking error.h presence... yes Step #3 - "compile-afl-address-x86_64": checking for error.h... yes Step #3 - "compile-afl-address-x86_64": checking err.h usability... yes Step #3 - "compile-afl-address-x86_64": checking err.h presence... yes Step #3 - "compile-afl-address-x86_64": checking for err.h... yes Step #3 - "compile-afl-address-x86_64": checking sched.h usability... yes Step #3 - "compile-afl-address-x86_64": checking sched.h presence... yes Step #3 - "compile-afl-address-x86_64": checking for sched.h... yes Step #3 - "compile-afl-address-x86_64": checking for sched_getaffinity... yes Step #3 - "compile-afl-address-x86_64": checking sys/resource.h usability... yes Step #3 - "compile-afl-address-x86_64": checking sys/resource.h presence... yes Step #3 - "compile-afl-address-x86_64": checking for sys/resource.h... yes Step #3 - "compile-afl-address-x86_64": checking for getrlimit... yes Step #3 - "compile-afl-address-x86_64": checking whether strerror_r is declared... yes Step #3 - "compile-afl-address-x86_64": checking for strerror_r... yes Step #3 - "compile-afl-address-x86_64": checking whether strerror_r returns char *... yes Step #3 - "compile-afl-address-x86_64": checking whether symbol versioning is supported... yes Step #3 - "compile-afl-address-x86_64": checking whether gcc accepts -Wstack-usage... no Step #3 - "compile-afl-address-x86_64": checking whether gcc has a sane -Wlogical-op... no Step #3 - "compile-afl-address-x86_64": checking whether gcc accepts -Wduplicated-cond... no Step #3 - "compile-afl-address-x86_64": checking whether gcc accepts -Wnull-dereference... yes Step #3 - "compile-afl-address-x86_64": checking whether gcc accepts -Wimplicit-fallthrough... yes Step #3 - "compile-afl-address-x86_64": checking whether the compiler accepts -Wimplicit-fallthrough=5... no Step #3 - "compile-afl-address-x86_64": checking whether the compiler accepts -Wtrampolines... no Step #3 - "compile-afl-address-x86_64": checking whether the compiler accepts -Wno-packed-not-aligned... no Step #3 - "compile-afl-address-x86_64": checking whether the compiler accepts -Wuse-after-free=3... no Step #3 - "compile-afl-address-x86_64": checking whether the compiler accepts -fno-addrsig... yes Step #3 - "compile-afl-address-x86_64": checking for library containing argp_parse... none required Step #3 - "compile-afl-address-x86_64": checking for library containing fts_close... none required Step #3 - "compile-afl-address-x86_64": checking for library containing _obstack_free... none required Step #3 - "compile-afl-address-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-afl-address-x86_64": checking whether NLS is requested... yes Step #3 - "compile-afl-address-x86_64": checking for msgfmt... /usr/bin/msgfmt Step #3 - "compile-afl-address-x86_64": checking for gmsgfmt... /usr/bin/msgfmt Step #3 - "compile-afl-address-x86_64": checking for xgettext... /usr/bin/xgettext Step #3 - "compile-afl-address-x86_64": checking for msgmerge... /usr/bin/msgmerge Step #3 - "compile-afl-address-x86_64": checking for ld used by /src/aflplusplus/afl-clang-fast... /usr/bin/ld Step #3 - "compile-afl-address-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-afl-address-x86_64": checking for shared library run path origin... done Step #3 - "compile-afl-address-x86_64": checking for CFPreferencesCopyAppValue... no Step #3 - "compile-afl-address-x86_64": checking for CFLocaleCopyCurrent... no Step #3 - "compile-afl-address-x86_64": checking for GNU gettext in libc... yes Step #3 - "compile-afl-address-x86_64": checking whether to use NLS... yes Step #3 - "compile-afl-address-x86_64": checking where the gettext function comes from... libc Step #3 - "compile-afl-address-x86_64": checking size of long... 8 Step #3 - "compile-afl-address-x86_64": checking for struct user_regs_struct... yes Step #3 - "compile-afl-address-x86_64": checking /src/aflplusplus/afl-clang-fast option for 32-bit word size... -m32 Step #3 - "compile-afl-address-x86_64": checking for 64-bit host... yes Step #3 - "compile-afl-address-x86_64": checking whether /src/aflplusplus/afl-clang-fast -m32 makes executables we can run... yes Step #3 - "compile-afl-address-x86_64": checking for flex... yes Step #3 - "compile-afl-address-x86_64": checking for bison... yes Step #3 - "compile-afl-address-x86_64": checking for gawk... yes Step #3 - "compile-afl-address-x86_64": checking for bunzip2... yes Step #3 - "compile-afl-address-x86_64": checking for zstd... no Step #3 - "compile-afl-address-x86_64": checking whether /src/aflplusplus/afl-clang-fast++ supports C++11 features with -std=c++11... yes Step #3 - "compile-afl-address-x86_64": checking for pthread_setname_np in -lpthread... yes Step #3 - "compile-afl-address-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-afl-address-x86_64": configure: creating ./config.status Step #3 - "compile-afl-address-x86_64": config.status: creating config/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating elfutils.spec Step #3 - "compile-afl-address-x86_64": config.status: creating debuginfod/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating debuginfod/debuginfod.h Step #3 - "compile-afl-address-x86_64": config.status: creating doc/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating lib/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libelf/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libebl/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libdwelf/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libdw/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libdwfl/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libcpu/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating libasm/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating backends/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating src/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating po/Makefile.in Step #3 - "compile-afl-address-x86_64": config.status: creating tests/Makefile Step #3 - "compile-afl-address-x86_64": config.status: creating config/libelf.pc Step #3 - "compile-afl-address-x86_64": config.status: creating config/libdw.pc Step #3 - "compile-afl-address-x86_64": config.status: creating config/libdebuginfod.pc Step #3 - "compile-afl-address-x86_64": config.status: creating version.h Step #3 - "compile-afl-address-x86_64": config.status: creating config/profile.sh Step #3 - "compile-afl-address-x86_64": config.status: creating config/profile.csh Step #3 - "compile-afl-address-x86_64": config.status: creating config.h Step #3 - "compile-afl-address-x86_64": config.status: executing depfiles commands Step #3 - "compile-afl-address-x86_64": config.status: executing po-directories commands Step #3 - "compile-afl-address-x86_64": config.status: creating po/POTFILES Step #3 - "compile-afl-address-x86_64": config.status: creating po/Makefile Step #3 - "compile-afl-address-x86_64": configure: Step #3 - "compile-afl-address-x86_64": ===================================================================== Step #3 - "compile-afl-address-x86_64": elfutils: 0.189 (eu_version: 189) Step #3 - "compile-afl-address-x86_64": ===================================================================== Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": Prefix : /usr/local Step #3 - "compile-afl-address-x86_64": Program prefix ("eu-" recommended) : eu- Step #3 - "compile-afl-address-x86_64": Source code location : . Step #3 - "compile-afl-address-x86_64": Maintainer mode : yes Step #3 - "compile-afl-address-x86_64": build arch : x86_64-pc-linux-gnu Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": CFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig Step #3 - "compile-afl-address-x86_64": CXXFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": RECOMMENDED FEATURES (should all be yes) Step #3 - "compile-afl-address-x86_64": gzip support : yes Step #3 - "compile-afl-address-x86_64": bzip2 support : no Step #3 - "compile-afl-address-x86_64": lzma/xz support : no Step #3 - "compile-afl-address-x86_64": zstd support : no Step #3 - "compile-afl-address-x86_64": zstd compression support : no Step #3 - "compile-afl-address-x86_64": libstdc++ demangle support : no Step #3 - "compile-afl-address-x86_64": File textrel check : yes Step #3 - "compile-afl-address-x86_64": Symbol versioning : yes Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": NOT RECOMMENDED FEATURES (should all be no) Step #3 - "compile-afl-address-x86_64": Experimental thread safety : no Step #3 - "compile-afl-address-x86_64": install elf.h : no Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": OTHER FEATURES Step #3 - "compile-afl-address-x86_64": Deterministic archives by default : false Step #3 - "compile-afl-address-x86_64": Native language support : yes Step #3 - "compile-afl-address-x86_64": Extra Valgrind annotations : no Step #3 - "compile-afl-address-x86_64": libdebuginfod client support : no Step #3 - "compile-afl-address-x86_64": Debuginfod server support : no Step #3 - "compile-afl-address-x86_64": Default DEBUGINFOD_URLS : Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": EXTRA TEST FEATURES (used with make check) Step #3 - "compile-afl-address-x86_64": have bunzip2 installed (required) : yes Step #3 - "compile-afl-address-x86_64": have zstd installed : no Step #3 - "compile-afl-address-x86_64": C++11 : yes Step #3 - "compile-afl-address-x86_64": debug branch prediction : no Step #3 - "compile-afl-address-x86_64": gprof support : no Step #3 - "compile-afl-address-x86_64": gcov support : no Step #3 - "compile-afl-address-x86_64": run all tests under valgrind : no Step #3 - "compile-afl-address-x86_64": gcc undefined behaviour sanitizer : no Step #3 - "compile-afl-address-x86_64": gcc address sanitizer : no Step #3 - "compile-afl-address-x86_64": clang memory sanitizer : no Step #3 - "compile-afl-address-x86_64": use rpath in tests : no Step #3 - "compile-afl-address-x86_64": test biarch : yes Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": ++ nproc Step #3 - "compile-afl-address-x86_64": + make -C config -j32 V=1 Step #3 - "compile-afl-address-x86_64": make: Entering directory '/src/libbpf/elfutils/config' Step #3 - "compile-afl-address-x86_64": make: Nothing to be done for 'all'. Step #3 - "compile-afl-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/config' Step #3 - "compile-afl-address-x86_64": ++ nproc Step #3 - "compile-afl-address-x86_64": + make -C lib -j32 V=1 Step #3 - "compile-afl-address-x86_64": make: Entering directory '/src/libbpf/elfutils/lib' Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT xasprintf.o -MD -MP -MF .deps/xasprintf.Tpo -c -o xasprintf.o xasprintf.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT xstrdup.o -MD -MP -MF .deps/xstrdup.Tpo -c -o xstrdup.o xstrdup.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT xstrndup.o -MD -MP -MF .deps/xstrndup.Tpo -c -o xstrndup.o xstrndup.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT xmalloc.o -MD -MP -MF .deps/xmalloc.Tpo -c -o xmalloc.o xmalloc.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT next_prime.o -MD -MP -MF .deps/next_prime.Tpo -c -o next_prime.o next_prime.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT crc32.o -MD -MP -MF .deps/crc32.Tpo -c -o crc32.o crc32.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT crc32_file.o -MD -MP -MF .deps/crc32_file.Tpo -c -o crc32_file.o crc32_file.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT color.o -MD -MP -MF .deps/color.Tpo -c -o color.o color.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT error.o -MD -MP -MF .deps/error.Tpo -c -o error.o error.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT printversion.o -MD -MP -MF .deps/printversion.Tpo -c -o printversion.o printversion.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/error.Tpo .deps/error.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/xstrdup.Tpo .deps/xstrdup.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/next_prime.Tpo .deps/next_prime.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/printversion.Tpo .deps/printversion.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/xstrndup.Tpo .deps/xstrndup.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/crc32.Tpo .deps/crc32.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/xmalloc.Tpo .deps/xmalloc.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/xasprintf.Tpo .deps/xasprintf.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/crc32_file.Tpo .deps/crc32_file.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/color.Tpo .deps/color.Po Step #3 - "compile-afl-address-x86_64": rm -f libeu.a Step #3 - "compile-afl-address-x86_64": ar cr libeu.a xasprintf.o xstrdup.o xstrndup.o xmalloc.o next_prime.o crc32.o crc32_file.o color.o error.o printversion.o Step #3 - "compile-afl-address-x86_64": ranlib libeu.a Step #3 - "compile-afl-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/lib' Step #3 - "compile-afl-address-x86_64": ++ nproc Step #3 - "compile-afl-address-x86_64": + make -C libelf -j32 V=1 Step #3 - "compile-afl-address-x86_64": make: Entering directory '/src/libbpf/elfutils/libelf' Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_version.o -MD -MP -MF .deps/elf_version.Tpo -c -o elf_version.o elf_version.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_hash.o -MD -MP -MF .deps/elf_hash.Tpo -c -o elf_hash.o elf_hash.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_error.o -MD -MP -MF .deps/elf_error.Tpo -c -o elf_error.o elf_error.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_fill.o -MD -MP -MF .deps/elf_fill.Tpo -c -o elf_fill.o elf_fill.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_begin.o -MD -MP -MF .deps/elf_begin.Tpo -c -o elf_begin.o elf_begin.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_next.o -MD -MP -MF .deps/elf_next.Tpo -c -o elf_next.o elf_next.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_rand.o -MD -MP -MF .deps/elf_rand.Tpo -c -o elf_rand.o elf_rand.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_end.o -MD -MP -MF .deps/elf_end.Tpo -c -o elf_end.o elf_end.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_kind.o -MD -MP -MF .deps/elf_kind.Tpo -c -o elf_kind.o elf_kind.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getclass.o -MD -MP -MF .deps/gelf_getclass.Tpo -c -o gelf_getclass.o gelf_getclass.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getbase.o -MD -MP -MF .deps/elf_getbase.Tpo -c -o elf_getbase.o elf_getbase.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getident.o -MD -MP -MF .deps/elf_getident.Tpo -c -o elf_getident.o elf_getident.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_fsize.o -MD -MP -MF .deps/elf32_fsize.Tpo -c -o elf32_fsize.o elf32_fsize.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_fsize.o -MD -MP -MF .deps/elf64_fsize.Tpo -c -o elf64_fsize.o elf64_fsize.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_fsize.o -MD -MP -MF .deps/gelf_fsize.Tpo -c -o gelf_fsize.o gelf_fsize.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_xlatetof.o -MD -MP -MF .deps/elf32_xlatetof.Tpo -c -o elf32_xlatetof.o elf32_xlatetof.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_xlatetom.o -MD -MP -MF .deps/elf32_xlatetom.Tpo -c -o elf32_xlatetom.o elf32_xlatetom.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_xlatetof.o -MD -MP -MF .deps/elf64_xlatetof.Tpo -c -o elf64_xlatetof.o elf64_xlatetof.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_xlatetom.o -MD -MP -MF .deps/elf64_xlatetom.Tpo -c -o elf64_xlatetom.o elf64_xlatetom.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_xlate.o -MD -MP -MF .deps/gelf_xlate.Tpo -c -o gelf_xlate.o gelf_xlate.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_getehdr.o -MD -MP -MF .deps/elf32_getehdr.Tpo -c -o elf32_getehdr.o elf32_getehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_getehdr.o -MD -MP -MF .deps/elf64_getehdr.Tpo -c -o elf64_getehdr.o elf64_getehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getehdr.o -MD -MP -MF .deps/gelf_getehdr.Tpo -c -o gelf_getehdr.o gelf_getehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_newehdr.o -MD -MP -MF .deps/elf32_newehdr.Tpo -c -o elf32_newehdr.o elf32_newehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_newehdr.o -MD -MP -MF .deps/elf64_newehdr.Tpo -c -o elf64_newehdr.o elf64_newehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_newehdr.o -MD -MP -MF .deps/gelf_newehdr.Tpo -c -o gelf_newehdr.o gelf_newehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_ehdr.o -MD -MP -MF .deps/gelf_update_ehdr.Tpo -c -o gelf_update_ehdr.o gelf_update_ehdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_getphdr.o -MD -MP -MF .deps/elf32_getphdr.Tpo -c -o elf32_getphdr.o elf32_getphdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_getphdr.o -MD -MP -MF .deps/elf64_getphdr.Tpo -c -o elf64_getphdr.o elf64_getphdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getphdr.o -MD -MP -MF .deps/gelf_getphdr.Tpo -c -o gelf_getphdr.o gelf_getphdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_newphdr.o -MD -MP -MF .deps/elf32_newphdr.Tpo -c -o elf32_newphdr.o elf32_newphdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_newphdr.o -MD -MP -MF .deps/elf64_newphdr.Tpo -c -o elf64_newphdr.o elf64_newphdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_version.Tpo .deps/elf_version.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_fill.Tpo .deps/elf_fill.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_newphdr.o -MD -MP -MF .deps/gelf_newphdr.Tpo -c -o gelf_newphdr.o gelf_newphdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_kind.Tpo .deps/elf_kind.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getbase.Tpo .deps/elf_getbase.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_phdr.o -MD -MP -MF .deps/gelf_update_phdr.Tpo -c -o gelf_update_phdr.o gelf_update_phdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getclass.Tpo .deps/gelf_getclass.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_rand.Tpo .deps/elf_rand.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getident.Tpo .deps/elf_getident.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_fsize.Tpo .deps/elf32_fsize.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_fsize.Tpo .deps/elf64_fsize.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getarhdr.o -MD -MP -MF .deps/elf_getarhdr.Tpo -c -o elf_getarhdr.o elf_getarhdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getarsym.o -MD -MP -MF .deps/elf_getarsym.Tpo -c -o elf_getarsym.o elf_getarsym.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_hash.Tpo .deps/elf_hash.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_rawfile.o -MD -MP -MF .deps/elf_rawfile.Tpo -c -o elf_rawfile.o elf_rawfile.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_next.Tpo .deps/elf_next.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_readall.o -MD -MP -MF .deps/elf_readall.Tpo -c -o elf_readall.o elf_readall.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_cntl.o -MD -MP -MF .deps/elf_cntl.Tpo -c -o elf_cntl.o elf_cntl.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_newehdr.Tpo .deps/gelf_newehdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getscn.o -MD -MP -MF .deps/elf_getscn.Tpo -c -o elf_getscn.o elf_getscn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_nextscn.o -MD -MP -MF .deps/elf_nextscn.Tpo -c -o elf_nextscn.o elf_nextscn.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_fsize.Tpo .deps/gelf_fsize.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_error.Tpo .deps/elf_error.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_ndxscn.o -MD -MP -MF .deps/elf_ndxscn.Tpo -c -o elf_ndxscn.o elf_ndxscn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_newscn.o -MD -MP -MF .deps/elf_newscn.Tpo -c -o elf_newscn.o elf_newscn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_getshdr.o -MD -MP -MF .deps/elf32_getshdr.Tpo -c -o elf32_getshdr.o elf32_getshdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_xlatetof.Tpo .deps/elf32_xlatetof.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_xlatetof.Tpo .deps/elf64_xlatetof.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_getshdr.o -MD -MP -MF .deps/elf64_getshdr.Tpo -c -o elf64_getshdr.o elf64_getshdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_getehdr.Tpo .deps/elf32_getehdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getshdr.o -MD -MP -MF .deps/gelf_getshdr.Tpo -c -o gelf_getshdr.o gelf_getshdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_xlatetom.Tpo .deps/elf32_xlatetom.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_xlatetom.Tpo .deps/elf64_xlatetom.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_getehdr.Tpo .deps/elf64_getehdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_newehdr.Tpo .deps/elf32_newehdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_newehdr.Tpo .deps/elf64_newehdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_shdr.o -MD -MP -MF .deps/gelf_update_shdr.Tpo -c -o gelf_update_shdr.o gelf_update_shdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_strptr.o -MD -MP -MF .deps/elf_strptr.Tpo -c -o elf_strptr.o elf_strptr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_rawdata.o -MD -MP -MF .deps/elf_rawdata.Tpo -c -o elf_rawdata.o elf_rawdata.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getdata.o -MD -MP -MF .deps/elf_getdata.Tpo -c -o elf_getdata.o elf_getdata.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_newdata.o -MD -MP -MF .deps/elf_newdata.Tpo -c -o elf_newdata.o elf_newdata.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getdata_rawchunk.o -MD -MP -MF .deps/elf_getdata_rawchunk.Tpo -c -o elf_getdata_rawchunk.o elf_getdata_rawchunk.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_flagelf.o -MD -MP -MF .deps/elf_flagelf.Tpo -c -o elf_flagelf.o elf_flagelf.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_flagehdr.o -MD -MP -MF .deps/elf_flagehdr.Tpo -c -o elf_flagehdr.o elf_flagehdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getehdr.Tpo .deps/gelf_getehdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_flagphdr.o -MD -MP -MF .deps/elf_flagphdr.Tpo -c -o elf_flagphdr.o elf_flagphdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_ehdr.Tpo .deps/gelf_update_ehdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_flagscn.o -MD -MP -MF .deps/elf_flagscn.Tpo -c -o elf_flagscn.o elf_flagscn.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getphdr.Tpo .deps/gelf_getphdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_flagshdr.o -MD -MP -MF .deps/elf_flagshdr.Tpo -c -o elf_flagshdr.o elf_flagshdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_newphdr.Tpo .deps/elf32_newphdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_flagdata.o -MD -MP -MF .deps/elf_flagdata.Tpo -c -o elf_flagdata.o elf_flagdata.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_newphdr.Tpo .deps/elf64_newphdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_memory.o -MD -MP -MF .deps/elf_memory.Tpo -c -o elf_memory.o elf_memory.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_end.Tpo .deps/elf_end.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_newphdr.Tpo .deps/gelf_newphdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_update.o -MD -MP -MF .deps/elf_update.Tpo -c -o elf_update.o elf_update.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_updatenull.o -MD -MP -MF .deps/elf32_updatenull.Tpo -c -o elf32_updatenull.o elf32_updatenull.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_ndxscn.Tpo .deps/elf_ndxscn.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getarhdr.Tpo .deps/elf_getarhdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_rawfile.Tpo .deps/elf_rawfile.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_cntl.Tpo .deps/elf_cntl.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_updatenull.o -MD -MP -MF .deps/elf64_updatenull.Tpo -c -o elf64_updatenull.o elf64_updatenull.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_updatefile.o -MD -MP -MF .deps/elf32_updatefile.Tpo -c -o elf32_updatefile.o elf32_updatefile.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_updatefile.o -MD -MP -MF .deps/elf64_updatefile.Tpo -c -o elf64_updatefile.o elf64_updatefile.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getsym.o -MD -MP -MF .deps/gelf_getsym.Tpo -c -o gelf_getsym.o gelf_getsym.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_nextscn.Tpo .deps/elf_nextscn.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_sym.o -MD -MP -MF .deps/gelf_update_sym.Tpo -c -o gelf_update_sym.o gelf_update_sym.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getscn.Tpo .deps/elf_getscn.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_flagehdr.Tpo .deps/elf_flagehdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getversym.o -MD -MP -MF .deps/gelf_getversym.Tpo -c -o gelf_getversym.o gelf_getversym.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_flagelf.Tpo .deps/elf_flagelf.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getverneed.o -MD -MP -MF .deps/gelf_getverneed.Tpo -c -o gelf_getverneed.o gelf_getverneed.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getvernaux.o -MD -MP -MF .deps/gelf_getvernaux.Tpo -c -o gelf_getvernaux.o gelf_getvernaux.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_rawdata.Tpo .deps/elf_rawdata.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_getphdr.Tpo .deps/elf32_getphdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_getphdr.Tpo .deps/elf64_getphdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_phdr.Tpo .deps/gelf_update_phdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_newscn.Tpo .deps/elf_newscn.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getshdr.Tpo .deps/gelf_getshdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_newdata.Tpo .deps/elf_newdata.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_shdr.Tpo .deps/gelf_update_shdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_flagphdr.Tpo .deps/elf_flagphdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_flagscn.Tpo .deps/elf_flagscn.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getverdef.o -MD -MP -MF .deps/gelf_getverdef.Tpo -c -o gelf_getverdef.o gelf_getverdef.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_flagshdr.Tpo .deps/elf_flagshdr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getverdaux.o -MD -MP -MF .deps/gelf_getverdaux.Tpo -c -o gelf_getverdaux.o gelf_getverdaux.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getrel.o -MD -MP -MF .deps/gelf_getrel.Tpo -c -o gelf_getrel.o gelf_getrel.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getrela.o -MD -MP -MF .deps/gelf_getrela.Tpo -c -o gelf_getrela.o gelf_getrela.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_rel.o -MD -MP -MF .deps/gelf_update_rel.Tpo -c -o gelf_update_rel.o gelf_update_rel.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_rela.o -MD -MP -MF .deps/gelf_update_rela.Tpo -c -o gelf_update_rela.o gelf_update_rela.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getdyn.o -MD -MP -MF .deps/gelf_getdyn.Tpo -c -o gelf_getdyn.o gelf_getdyn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_dyn.o -MD -MP -MF .deps/gelf_update_dyn.Tpo -c -o gelf_update_dyn.o gelf_update_dyn.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_memory.Tpo .deps/elf_memory.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getmove.o -MD -MP -MF .deps/gelf_getmove.Tpo -c -o gelf_getmove.o gelf_getmove.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_move.o -MD -MP -MF .deps/gelf_update_move.Tpo -c -o gelf_update_move.o gelf_update_move.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getsyminfo.o -MD -MP -MF .deps/gelf_getsyminfo.Tpo -c -o gelf_getsyminfo.o gelf_getsyminfo.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_syminfo.o -MD -MP -MF .deps/gelf_update_syminfo.Tpo -c -o gelf_update_syminfo.o gelf_update_syminfo.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_flagdata.Tpo .deps/elf_flagdata.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_readall.Tpo .deps/elf_readall.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getauxv.o -MD -MP -MF .deps/gelf_getauxv.Tpo -c -o gelf_getauxv.o gelf_getauxv.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_auxv.o -MD -MP -MF .deps/gelf_update_auxv.Tpo -c -o gelf_update_auxv.o gelf_update_auxv.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getdata_rawchunk.Tpo .deps/elf_getdata_rawchunk.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_strptr.Tpo .deps/elf_strptr.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getnote.o -MD -MP -MF .deps/gelf_getnote.Tpo -c -o gelf_getnote.o gelf_getnote.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_xlatetof.o -MD -MP -MF .deps/gelf_xlatetof.Tpo -c -o gelf_xlatetof.o gelf_xlatetof.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getversym.Tpo .deps/gelf_getversym.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_xlatetom.o -MD -MP -MF .deps/gelf_xlatetom.Tpo -c -o gelf_xlatetom.o gelf_xlatetom.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getsym.Tpo .deps/gelf_getsym.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT nlist.o -MD -MP -MF .deps/nlist.Tpo -c -o nlist.o nlist.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getvernaux.Tpo .deps/gelf_getvernaux.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getverneed.Tpo .deps/gelf_getverneed.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_sym.Tpo .deps/gelf_update_sym.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getsymshndx.o -MD -MP -MF .deps/gelf_getsymshndx.Tpo -c -o gelf_getsymshndx.o gelf_getsymshndx.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getarsym.Tpo .deps/elf_getarsym.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_symshndx.o -MD -MP -MF .deps/gelf_update_symshndx.Tpo -c -o gelf_update_symshndx.o gelf_update_symshndx.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_versym.o -MD -MP -MF .deps/gelf_update_versym.Tpo -c -o gelf_update_versym.o gelf_update_versym.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getrel.Tpo .deps/gelf_getrel.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_move.Tpo .deps/gelf_update_move.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_verneed.o -MD -MP -MF .deps/gelf_update_verneed.Tpo -c -o gelf_update_verneed.o gelf_update_verneed.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getverdef.Tpo .deps/gelf_getverdef.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_vernaux.o -MD -MP -MF .deps/gelf_update_vernaux.Tpo -c -o gelf_update_vernaux.o gelf_update_vernaux.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_verdef.o -MD -MP -MF .deps/gelf_update_verdef.Tpo -c -o gelf_update_verdef.o gelf_update_verdef.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getverdaux.Tpo .deps/gelf_getverdaux.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getmove.Tpo .deps/gelf_getmove.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_verdaux.o -MD -MP -MF .deps/gelf_update_verdaux.Tpo -c -o gelf_update_verdaux.o gelf_update_verdaux.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_rel.Tpo .deps/gelf_update_rel.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getsyminfo.Tpo .deps/gelf_getsyminfo.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getphdrnum.o -MD -MP -MF .deps/elf_getphdrnum.Tpo -c -o elf_getphdrnum.o elf_getphdrnum.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getrela.Tpo .deps/gelf_getrela.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getshdrnum.o -MD -MP -MF .deps/elf_getshdrnum.Tpo -c -o elf_getshdrnum.o elf_getshdrnum.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_syminfo.Tpo .deps/gelf_update_syminfo.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getshdrstrndx.o -MD -MP -MF .deps/elf_getshdrstrndx.Tpo -c -o elf_getshdrstrndx.o elf_getshdrstrndx.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_dyn.Tpo .deps/gelf_update_dyn.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_checksum.o -MD -MP -MF .deps/gelf_checksum.Tpo -c -o gelf_checksum.o gelf_checksum.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_checksum.o -MD -MP -MF .deps/elf32_checksum.Tpo -c -o elf32_checksum.o elf32_checksum.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_checksum.o -MD -MP -MF .deps/elf64_checksum.Tpo -c -o elf64_checksum.o elf64_checksum.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT libelf_crc32.o -MD -MP -MF .deps/libelf_crc32.Tpo -c -o libelf_crc32.o libelf_crc32.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_getshdr.Tpo .deps/elf64_getshdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getdyn.Tpo .deps/gelf_getdyn.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_rela.Tpo .deps/gelf_update_rela.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT libelf_next_prime.o -MD -MP -MF .deps/libelf_next_prime.Tpo -c -o libelf_next_prime.o libelf_next_prime.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_clone.o -MD -MP -MF .deps/elf_clone.Tpo -c -o elf_clone.o elf_clone.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getauxv.Tpo .deps/gelf_getauxv.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getlib.o -MD -MP -MF .deps/gelf_getlib.Tpo -c -o gelf_getlib.o gelf_getlib.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_update_lib.o -MD -MP -MF .deps/gelf_update_lib.Tpo -c -o gelf_update_lib.o gelf_update_lib.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_getshdr.Tpo .deps/elf32_getshdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_update.Tpo .deps/elf_update.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_auxv.Tpo .deps/gelf_update_auxv.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_xlatetof.Tpo .deps/gelf_xlatetof.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_offscn.o -MD -MP -MF .deps/elf32_offscn.Tpo -c -o elf32_offscn.o elf32_offscn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_offscn.o -MD -MP -MF .deps/elf64_offscn.Tpo -c -o elf64_offscn.o elf64_offscn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_offscn.o -MD -MP -MF .deps/gelf_offscn.Tpo -c -o gelf_offscn.o gelf_offscn.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_getaroff.o -MD -MP -MF .deps/elf_getaroff.Tpo -c -o elf_getaroff.o elf_getaroff.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_xlatetom.Tpo .deps/gelf_xlatetom.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/libelf_next_prime.Tpo .deps/libelf_next_prime.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getnote.Tpo .deps/gelf_getnote.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_gnu_hash.o -MD -MP -MF .deps/elf_gnu_hash.Tpo -c -o elf_gnu_hash.o elf_gnu_hash.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_scnshndx.o -MD -MP -MF .deps/elf_scnshndx.Tpo -c -o elf_scnshndx.o elf_scnshndx.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf32_getchdr.o -MD -MP -MF .deps/elf32_getchdr.Tpo -c -o elf32_getchdr.o elf32_getchdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getdata.Tpo .deps/elf_getdata.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf64_getchdr.o -MD -MP -MF .deps/elf64_getchdr.Tpo -c -o elf64_getchdr.o elf64_getchdr.c Step #3 - "compile-afl-address-x86_64": mv -f .deps/libelf_crc32.Tpo .deps/libelf_crc32.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_versym.Tpo .deps/gelf_update_versym.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_verneed.Tpo .deps/gelf_update_verneed.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_vernaux.Tpo .deps/gelf_update_vernaux.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_verdef.Tpo .deps/gelf_update_verdef.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_verdaux.Tpo .deps/gelf_update_verdaux.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getshdrnum.Tpo .deps/elf_getshdrnum.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getsymshndx.Tpo .deps/gelf_getsymshndx.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_checksum.Tpo .deps/gelf_checksum.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_symshndx.Tpo .deps/gelf_update_symshndx.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getlib.Tpo .deps/gelf_getlib.Po Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT gelf_getchdr.o -MD -MP -MF .deps/gelf_getchdr.Tpo -c -o gelf_getchdr.o gelf_getchdr.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_compress.o -MD -MP -MF .deps/elf_compress.Tpo -c -o elf_compress.o elf_compress.c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -MT elf_compress_gnu.o -MD -MP -MF .deps/elf_compress_gnu.Tpo -c -o elf_compress_gnu.o elf_compress_gnu.c Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_version.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_version.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_version.Tpo" `test -f 'elf_version.c' || echo './'`elf_version.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_version.Tpo" >> ".deps/elf_version.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_version.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_version.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_hash.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_hash.Tpo" `test -f 'elf_hash.c' || echo './'`elf_hash.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_hash.Tpo" >> ".deps/elf_hash.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_hash.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_hash.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_error.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_error.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_error.Tpo" `test -f 'elf_error.c' || echo './'`elf_error.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_error.Tpo" >> ".deps/elf_error.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_error.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_error.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_fill.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_fill.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_fill.Tpo" `test -f 'elf_fill.c' || echo './'`elf_fill.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_fill.Tpo" >> ".deps/elf_fill.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_fill.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_fill.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_next.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_next.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_next.Tpo" `test -f 'elf_next.c' || echo './'`elf_next.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_next.Tpo" >> ".deps/elf_next.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_next.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_next.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_rand.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rand.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_rand.Tpo" `test -f 'elf_rand.c' || echo './'`elf_rand.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_rand.Tpo" >> ".deps/elf_rand.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_rand.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_rand.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_end.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_end.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_end.Tpo" `test -f 'elf_end.c' || echo './'`elf_end.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_end.Tpo" >> ".deps/elf_end.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_end.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_end.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_kind.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_kind.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_kind.Tpo" `test -f 'elf_kind.c' || echo './'`elf_kind.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_kind.Tpo" >> ".deps/elf_kind.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_kind.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_kind.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_clone.Tpo .deps/elf_clone.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getclass.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getclass.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getclass.Tpo" `test -f 'gelf_getclass.c' || echo './'`gelf_getclass.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getclass.Tpo" >> ".deps/gelf_getclass.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getclass.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getclass.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_offscn.Tpo .deps/gelf_offscn.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getbase.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getbase.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getbase.Tpo" `test -f 'elf_getbase.c' || echo './'`elf_getbase.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getbase.Tpo" >> ".deps/elf_getbase.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getbase.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getbase.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_update_lib.Tpo .deps/gelf_update_lib.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getident.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getident.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getident.Tpo" `test -f 'elf_getident.c' || echo './'`elf_getident.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getident.Tpo" >> ".deps/elf_getident.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getident.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getident.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_checksum.Tpo .deps/elf32_checksum.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_fsize.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_fsize.Tpo" `test -f 'elf32_fsize.c' || echo './'`elf32_fsize.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_fsize.Tpo" >> ".deps/elf32_fsize.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_fsize.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_fsize.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getphdrnum.Tpo .deps/elf_getphdrnum.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_checksum.Tpo .deps/elf64_checksum.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_offscn.Tpo .deps/elf64_offscn.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_fsize.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_fsize.Tpo" `test -f 'elf64_fsize.c' || echo './'`elf64_fsize.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_fsize.Tpo" >> ".deps/elf64_fsize.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_fsize.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_fsize.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_fsize.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_fsize.Tpo" `test -f 'gelf_fsize.c' || echo './'`gelf_fsize.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_fsize.Tpo" >> ".deps/gelf_fsize.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_fsize.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_fsize.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetof.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_xlatetof.Tpo" `test -f 'elf32_xlatetof.c' || echo './'`elf32_xlatetof.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_xlatetof.Tpo" >> ".deps/elf32_xlatetof.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_xlatetof.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_xlatetof.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_offscn.Tpo .deps/elf32_offscn.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getaroff.Tpo .deps/elf_getaroff.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_getchdr.Tpo .deps/elf32_getchdr.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetom.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_xlatetom.Tpo" `test -f 'elf32_xlatetom.c' || echo './'`elf32_xlatetom.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_xlatetom.Tpo" >> ".deps/elf32_xlatetom.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_xlatetom.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_xlatetom.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_scnshndx.Tpo .deps/elf_scnshndx.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetof.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_xlatetof.Tpo" `test -f 'elf64_xlatetof.c' || echo './'`elf64_xlatetof.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_xlatetof.Tpo" >> ".deps/elf64_xlatetof.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_xlatetof.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_xlatetof.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_gnu_hash.Tpo .deps/elf_gnu_hash.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetom.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_xlatetom.Tpo" `test -f 'elf64_xlatetom.c' || echo './'`elf64_xlatetom.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_xlatetom.Tpo" >> ".deps/elf64_xlatetom.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_xlatetom.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_xlatetom.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_getehdr.Tpo" `test -f 'elf32_getehdr.c' || echo './'`elf32_getehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_getehdr.Tpo" >> ".deps/elf32_getehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_getehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_getehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_getehdr.Tpo" `test -f 'elf64_getehdr.c' || echo './'`elf64_getehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_getehdr.Tpo" >> ".deps/elf64_getehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_getehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_getehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_getchdr.Tpo .deps/elf64_getchdr.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/nlist.Tpo .deps/nlist.Po Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_getshdrstrndx.Tpo .deps/elf_getshdrstrndx.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getehdr.Tpo" `test -f 'gelf_getehdr.c' || echo './'`gelf_getehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getehdr.Tpo" >> ".deps/gelf_getehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_newehdr.Tpo" `test -f 'elf32_newehdr.c' || echo './'`elf32_newehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_newehdr.Tpo" >> ".deps/elf32_newehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_newehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_newehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_newehdr.Tpo" `test -f 'elf64_newehdr.c' || echo './'`elf64_newehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_newehdr.Tpo" >> ".deps/elf64_newehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_newehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_newehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_newehdr.Tpo" `test -f 'gelf_newehdr.c' || echo './'`gelf_newehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_newehdr.Tpo" >> ".deps/gelf_newehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_newehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_newehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_ehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_ehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_ehdr.Tpo" `test -f 'gelf_update_ehdr.c' || echo './'`gelf_update_ehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_ehdr.Tpo" >> ".deps/gelf_update_ehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_ehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_ehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_getchdr.Tpo .deps/gelf_getchdr.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_getphdr.Tpo" `test -f 'elf32_getphdr.c' || echo './'`elf32_getphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_getphdr.Tpo" >> ".deps/elf32_getphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_getphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_getphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_getphdr.Tpo" `test -f 'elf64_getphdr.c' || echo './'`elf64_getphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_getphdr.Tpo" >> ".deps/elf64_getphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_getphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_getphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getphdr.Tpo" `test -f 'gelf_getphdr.c' || echo './'`gelf_getphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getphdr.Tpo" >> ".deps/gelf_getphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_newphdr.Tpo" `test -f 'elf32_newphdr.c' || echo './'`elf32_newphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_newphdr.Tpo" >> ".deps/elf32_newphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_newphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_newphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_newphdr.Tpo" `test -f 'elf64_newphdr.c' || echo './'`elf64_newphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_newphdr.Tpo" >> ".deps/elf64_newphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_newphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_newphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_newphdr.Tpo" `test -f 'gelf_newphdr.c' || echo './'`gelf_newphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_newphdr.Tpo" >> ".deps/gelf_newphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_newphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_newphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_phdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_phdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_phdr.Tpo" `test -f 'gelf_update_phdr.c' || echo './'`gelf_update_phdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_phdr.Tpo" >> ".deps/gelf_update_phdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_phdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_phdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getarhdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarhdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getarhdr.Tpo" `test -f 'elf_getarhdr.c' || echo './'`elf_getarhdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getarhdr.Tpo" >> ".deps/elf_getarhdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getarhdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getarhdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getarsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarsym.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getarsym.Tpo" `test -f 'elf_getarsym.c' || echo './'`elf_getarsym.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getarsym.Tpo" >> ".deps/elf_getarsym.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getarsym.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getarsym.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_rawfile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawfile.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_rawfile.Tpo" `test -f 'elf_rawfile.c' || echo './'`elf_rawfile.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_rawfile.Tpo" >> ".deps/elf_rawfile.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_rawfile.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_rawfile.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_readall.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_readall.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_readall.Tpo" `test -f 'elf_readall.c' || echo './'`elf_readall.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_readall.Tpo" >> ".deps/elf_readall.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_readall.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_readall.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_cntl.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_cntl.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_cntl.Tpo" `test -f 'elf_cntl.c' || echo './'`elf_cntl.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_cntl.Tpo" >> ".deps/elf_cntl.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_cntl.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_cntl.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getscn.Tpo" `test -f 'elf_getscn.c' || echo './'`elf_getscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getscn.Tpo" >> ".deps/elf_getscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_nextscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_nextscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_nextscn.Tpo" `test -f 'elf_nextscn.c' || echo './'`elf_nextscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_nextscn.Tpo" >> ".deps/elf_nextscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_nextscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_nextscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_ndxscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_ndxscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_ndxscn.Tpo" `test -f 'elf_ndxscn.c' || echo './'`elf_ndxscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_ndxscn.Tpo" >> ".deps/elf_ndxscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_ndxscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_ndxscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_newscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_newscn.Tpo" `test -f 'elf_newscn.c' || echo './'`elf_newscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_newscn.Tpo" >> ".deps/elf_newscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_newscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_newscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getshdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_getshdr.Tpo" `test -f 'elf32_getshdr.c' || echo './'`elf32_getshdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_getshdr.Tpo" >> ".deps/elf32_getshdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_getshdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_getshdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_compress_gnu.Tpo .deps/elf_compress_gnu.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getshdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_getshdr.Tpo" `test -f 'elf64_getshdr.c' || echo './'`elf64_getshdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_getshdr.Tpo" >> ".deps/elf64_getshdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_getshdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_getshdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getshdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getshdr.Tpo" `test -f 'gelf_getshdr.c' || echo './'`gelf_getshdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getshdr.Tpo" >> ".deps/gelf_getshdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getshdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getshdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_updatenull.Tpo .deps/elf64_updatenull.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_shdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_shdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_shdr.Tpo" `test -f 'gelf_update_shdr.c' || echo './'`gelf_update_shdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_shdr.Tpo" >> ".deps/gelf_update_shdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_shdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_shdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_strptr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_strptr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_strptr.Tpo" `test -f 'elf_strptr.c' || echo './'`elf_strptr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_strptr.Tpo" >> ".deps/elf_strptr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_strptr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_strptr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_rawdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawdata.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_rawdata.Tpo" `test -f 'elf_rawdata.c' || echo './'`elf_rawdata.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_rawdata.Tpo" >> ".deps/elf_rawdata.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_rawdata.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_rawdata.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getdata.Tpo" `test -f 'elf_getdata.c' || echo './'`elf_getdata.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getdata.Tpo" >> ".deps/elf_getdata.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getdata.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getdata.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_updatenull.Tpo .deps/elf32_updatenull.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_newdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newdata.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_newdata.Tpo" `test -f 'elf_newdata.c' || echo './'`elf_newdata.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_newdata.Tpo" >> ".deps/elf_newdata.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_newdata.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_newdata.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getdata_rawchunk.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata_rawchunk.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getdata_rawchunk.Tpo" `test -f 'elf_getdata_rawchunk.c' || echo './'`elf_getdata_rawchunk.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getdata_rawchunk.Tpo" >> ".deps/elf_getdata_rawchunk.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getdata_rawchunk.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getdata_rawchunk.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_flagelf.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagelf.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_flagelf.Tpo" `test -f 'elf_flagelf.c' || echo './'`elf_flagelf.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_flagelf.Tpo" >> ".deps/elf_flagelf.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_flagelf.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_flagelf.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_flagehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagehdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_flagehdr.Tpo" `test -f 'elf_flagehdr.c' || echo './'`elf_flagehdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_flagehdr.Tpo" >> ".deps/elf_flagehdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_flagehdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_flagehdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_flagphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagphdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_flagphdr.Tpo" `test -f 'elf_flagphdr.c' || echo './'`elf_flagphdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_flagphdr.Tpo" >> ".deps/elf_flagphdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_flagphdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_flagphdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_flagscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_flagscn.Tpo" `test -f 'elf_flagscn.c' || echo './'`elf_flagscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_flagscn.Tpo" >> ".deps/elf_flagscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_flagscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_flagscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_flagshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagshdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_flagshdr.Tpo" `test -f 'elf_flagshdr.c' || echo './'`elf_flagshdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_flagshdr.Tpo" >> ".deps/elf_flagshdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_flagshdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_flagshdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_flagdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagdata.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_flagdata.Tpo" `test -f 'elf_flagdata.c' || echo './'`elf_flagdata.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_flagdata.Tpo" >> ".deps/elf_flagdata.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_flagdata.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_flagdata.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_memory.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_memory.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_memory.Tpo" `test -f 'elf_memory.c' || echo './'`elf_memory.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_memory.Tpo" >> ".deps/elf_memory.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_memory.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_memory.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_update.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_update.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_update.Tpo" `test -f 'elf_update.c' || echo './'`elf_update.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_update.Tpo" >> ".deps/elf_update.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_update.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_update.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatenull.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_updatenull.Tpo" `test -f 'elf32_updatenull.c' || echo './'`elf32_updatenull.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_updatenull.Tpo" >> ".deps/elf32_updatenull.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_updatenull.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_updatenull.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatenull.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_updatenull.Tpo" `test -f 'elf64_updatenull.c' || echo './'`elf64_updatenull.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_updatenull.Tpo" >> ".deps/elf64_updatenull.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_updatenull.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_updatenull.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsym.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getsym.Tpo" `test -f 'gelf_getsym.c' || echo './'`gelf_getsym.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getsym.Tpo" >> ".deps/gelf_getsym.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getsym.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getsym.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_sym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_sym.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_sym.Tpo" `test -f 'gelf_update_sym.c' || echo './'`gelf_update_sym.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_sym.Tpo" >> ".deps/gelf_update_sym.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_sym.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_sym.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getversym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getversym.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getversym.Tpo" `test -f 'gelf_getversym.c' || echo './'`gelf_getversym.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getversym.Tpo" >> ".deps/gelf_getversym.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getversym.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getversym.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getverneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverneed.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getverneed.Tpo" `test -f 'gelf_getverneed.c' || echo './'`gelf_getverneed.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getverneed.Tpo" >> ".deps/gelf_getverneed.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getverneed.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getverneed.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getvernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getvernaux.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getvernaux.Tpo" `test -f 'gelf_getvernaux.c' || echo './'`gelf_getvernaux.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getvernaux.Tpo" >> ".deps/gelf_getvernaux.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getvernaux.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getvernaux.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getverdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdef.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getverdef.Tpo" `test -f 'gelf_getverdef.c' || echo './'`gelf_getverdef.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getverdef.Tpo" >> ".deps/gelf_getverdef.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getverdef.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getverdef.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getverdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdaux.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getverdaux.Tpo" `test -f 'gelf_getverdaux.c' || echo './'`gelf_getverdaux.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getverdaux.Tpo" >> ".deps/gelf_getverdaux.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getverdaux.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getverdaux.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getrel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrel.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getrel.Tpo" `test -f 'gelf_getrel.c' || echo './'`gelf_getrel.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getrel.Tpo" >> ".deps/gelf_getrel.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getrel.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getrel.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getrela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrela.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getrela.Tpo" `test -f 'gelf_getrela.c' || echo './'`gelf_getrela.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getrela.Tpo" >> ".deps/gelf_getrela.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getrela.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getrela.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_rel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rel.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_rel.Tpo" `test -f 'gelf_update_rel.c' || echo './'`gelf_update_rel.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_rel.Tpo" >> ".deps/gelf_update_rel.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_rel.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_rel.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_rela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rela.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_rela.Tpo" `test -f 'gelf_update_rela.c' || echo './'`gelf_update_rela.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_rela.Tpo" >> ".deps/gelf_update_rela.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_rela.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_rela.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getdyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getdyn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getdyn.Tpo" `test -f 'gelf_getdyn.c' || echo './'`gelf_getdyn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getdyn.Tpo" >> ".deps/gelf_getdyn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getdyn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getdyn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_dyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_dyn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_dyn.Tpo" `test -f 'gelf_update_dyn.c' || echo './'`gelf_update_dyn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_dyn.Tpo" >> ".deps/gelf_update_dyn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_dyn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_dyn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getmove.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getmove.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getmove.Tpo" `test -f 'gelf_getmove.c' || echo './'`gelf_getmove.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getmove.Tpo" >> ".deps/gelf_getmove.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getmove.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getmove.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_move.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_move.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_move.Tpo" `test -f 'gelf_update_move.c' || echo './'`gelf_update_move.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_move.Tpo" >> ".deps/gelf_update_move.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_move.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_move.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getsyminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsyminfo.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getsyminfo.Tpo" `test -f 'gelf_getsyminfo.c' || echo './'`gelf_getsyminfo.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getsyminfo.Tpo" >> ".deps/gelf_getsyminfo.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getsyminfo.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getsyminfo.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_syminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_syminfo.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_syminfo.Tpo" `test -f 'gelf_update_syminfo.c' || echo './'`gelf_update_syminfo.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_syminfo.Tpo" >> ".deps/gelf_update_syminfo.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_syminfo.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_syminfo.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_compress.Tpo .deps/elf_compress.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getauxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getauxv.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getauxv.Tpo" `test -f 'gelf_getauxv.c' || echo './'`gelf_getauxv.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getauxv.Tpo" >> ".deps/gelf_getauxv.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getauxv.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getauxv.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_auxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_auxv.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_auxv.Tpo" `test -f 'gelf_update_auxv.c' || echo './'`gelf_update_auxv.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_auxv.Tpo" >> ".deps/gelf_update_auxv.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_auxv.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_auxv.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getnote.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getnote.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getnote.Tpo" `test -f 'gelf_getnote.c' || echo './'`gelf_getnote.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getnote.Tpo" >> ".deps/gelf_getnote.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getnote.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getnote.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetof.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_xlatetof.Tpo" `test -f 'gelf_xlatetof.c' || echo './'`gelf_xlatetof.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_xlatetof.Tpo" >> ".deps/gelf_xlatetof.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_xlatetof.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_xlatetof.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetom.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_xlatetom.Tpo" `test -f 'gelf_xlatetom.c' || echo './'`gelf_xlatetom.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_xlatetom.Tpo" >> ".deps/gelf_xlatetom.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_xlatetom.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_xlatetom.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o nlist.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT nlist.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/nlist.Tpo" `test -f 'nlist.c' || echo './'`nlist.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/nlist.Tpo" >> ".deps/nlist.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/nlist.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/nlist.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getsymshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsymshndx.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getsymshndx.Tpo" `test -f 'gelf_getsymshndx.c' || echo './'`gelf_getsymshndx.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getsymshndx.Tpo" >> ".deps/gelf_getsymshndx.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getsymshndx.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getsymshndx.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_symshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_symshndx.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_symshndx.Tpo" `test -f 'gelf_update_symshndx.c' || echo './'`gelf_update_symshndx.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_symshndx.Tpo" >> ".deps/gelf_update_symshndx.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_symshndx.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_symshndx.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_versym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_versym.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_versym.Tpo" `test -f 'gelf_update_versym.c' || echo './'`gelf_update_versym.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_versym.Tpo" >> ".deps/gelf_update_versym.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_versym.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_versym.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_verneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verneed.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_verneed.Tpo" `test -f 'gelf_update_verneed.c' || echo './'`gelf_update_verneed.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_verneed.Tpo" >> ".deps/gelf_update_verneed.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_verneed.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_verneed.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_vernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_vernaux.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_vernaux.Tpo" `test -f 'gelf_update_vernaux.c' || echo './'`gelf_update_vernaux.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_vernaux.Tpo" >> ".deps/gelf_update_vernaux.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_vernaux.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_vernaux.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_verdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdef.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_verdef.Tpo" `test -f 'gelf_update_verdef.c' || echo './'`gelf_update_verdef.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_verdef.Tpo" >> ".deps/gelf_update_verdef.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_verdef.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_verdef.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_verdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdaux.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_verdaux.Tpo" `test -f 'gelf_update_verdaux.c' || echo './'`gelf_update_verdaux.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_verdaux.Tpo" >> ".deps/gelf_update_verdaux.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_verdaux.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_verdaux.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getphdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getphdrnum.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getphdrnum.Tpo" `test -f 'elf_getphdrnum.c' || echo './'`elf_getphdrnum.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getphdrnum.Tpo" >> ".deps/elf_getphdrnum.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getphdrnum.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getphdrnum.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getshdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrnum.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getshdrnum.Tpo" `test -f 'elf_getshdrnum.c' || echo './'`elf_getshdrnum.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getshdrnum.Tpo" >> ".deps/elf_getshdrnum.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getshdrnum.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getshdrnum.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getshdrstrndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrstrndx.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getshdrstrndx.Tpo" `test -f 'elf_getshdrstrndx.c' || echo './'`elf_getshdrstrndx.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getshdrstrndx.Tpo" >> ".deps/elf_getshdrstrndx.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getshdrstrndx.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getshdrstrndx.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_checksum.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_checksum.Tpo" `test -f 'gelf_checksum.c' || echo './'`gelf_checksum.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_checksum.Tpo" >> ".deps/gelf_checksum.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_checksum.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_checksum.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_checksum.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_checksum.Tpo" `test -f 'elf32_checksum.c' || echo './'`elf32_checksum.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_checksum.Tpo" >> ".deps/elf32_checksum.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_checksum.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_checksum.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_checksum.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_checksum.Tpo" `test -f 'elf64_checksum.c' || echo './'`elf64_checksum.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_checksum.Tpo" >> ".deps/elf64_checksum.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_checksum.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_checksum.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o libelf_crc32.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_crc32.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/libelf_crc32.Tpo" `test -f 'libelf_crc32.c' || echo './'`libelf_crc32.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/libelf_crc32.Tpo" >> ".deps/libelf_crc32.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/libelf_crc32.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/libelf_crc32.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o libelf_next_prime.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_next_prime.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/libelf_next_prime.Tpo" `test -f 'libelf_next_prime.c' || echo './'`libelf_next_prime.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/libelf_next_prime.Tpo" >> ".deps/libelf_next_prime.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/libelf_next_prime.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/libelf_next_prime.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_clone.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_clone.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_clone.Tpo" `test -f 'elf_clone.c' || echo './'`elf_clone.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_clone.Tpo" >> ".deps/elf_clone.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_clone.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_clone.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getlib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getlib.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getlib.Tpo" `test -f 'gelf_getlib.c' || echo './'`gelf_getlib.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getlib.Tpo" >> ".deps/gelf_getlib.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getlib.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getlib.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_update_lib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_lib.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_update_lib.Tpo" `test -f 'gelf_update_lib.c' || echo './'`gelf_update_lib.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_update_lib.Tpo" >> ".deps/gelf_update_lib.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_update_lib.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_update_lib.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_offscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_offscn.Tpo" `test -f 'elf32_offscn.c' || echo './'`elf32_offscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_offscn.Tpo" >> ".deps/elf32_offscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_offscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_offscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf_begin.Tpo .deps/elf_begin.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_offscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_offscn.Tpo" `test -f 'elf64_offscn.c' || echo './'`elf64_offscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_offscn.Tpo" >> ".deps/elf64_offscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_offscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_offscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_offscn.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_offscn.Tpo" `test -f 'gelf_offscn.c' || echo './'`gelf_offscn.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_offscn.Tpo" >> ".deps/gelf_offscn.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_offscn.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_offscn.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_getaroff.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getaroff.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_getaroff.Tpo" `test -f 'elf_getaroff.c' || echo './'`elf_getaroff.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_getaroff.Tpo" >> ".deps/elf_getaroff.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_getaroff.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_getaroff.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_gnu_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_gnu_hash.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_gnu_hash.Tpo" `test -f 'elf_gnu_hash.c' || echo './'`elf_gnu_hash.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_gnu_hash.Tpo" >> ".deps/elf_gnu_hash.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_gnu_hash.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_gnu_hash.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_scnshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_scnshndx.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_scnshndx.Tpo" `test -f 'elf_scnshndx.c' || echo './'`elf_scnshndx.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_scnshndx.Tpo" >> ".deps/elf_scnshndx.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_scnshndx.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_scnshndx.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getchdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_getchdr.Tpo" `test -f 'elf32_getchdr.c' || echo './'`elf32_getchdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_getchdr.Tpo" >> ".deps/elf32_getchdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_getchdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_getchdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getchdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_getchdr.Tpo" `test -f 'elf64_getchdr.c' || echo './'`elf64_getchdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_getchdr.Tpo" >> ".deps/elf64_getchdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_getchdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_getchdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getchdr.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_getchdr.Tpo" `test -f 'gelf_getchdr.c' || echo './'`gelf_getchdr.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_getchdr.Tpo" >> ".deps/gelf_getchdr.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_getchdr.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_getchdr.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_compress.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_compress.Tpo" `test -f 'elf_compress.c' || echo './'`elf_compress.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_compress.Tpo" >> ".deps/elf_compress.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_compress.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_compress.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_compress_gnu.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress_gnu.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_compress_gnu.Tpo" `test -f 'elf_compress_gnu.c' || echo './'`elf_compress_gnu.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_compress_gnu.Tpo" >> ".deps/elf_compress_gnu.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_compress_gnu.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_compress_gnu.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf_begin.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_begin.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf_begin.Tpo" `test -f 'elf_begin.c' || echo './'`elf_begin.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf_begin.Tpo" >> ".deps/elf_begin.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf_begin.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf_begin.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf64_updatefile.Tpo .deps/elf64_updatefile.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf64_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatefile.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf64_updatefile.Tpo" `test -f 'elf64_updatefile.c' || echo './'`elf64_updatefile.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf64_updatefile.Tpo" >> ".deps/elf64_updatefile.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf64_updatefile.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf64_updatefile.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/elf32_updatefile.Tpo .deps/elf32_updatefile.Po Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o elf32_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatefile.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/elf32_updatefile.Tpo" `test -f 'elf32_updatefile.c' || echo './'`elf32_updatefile.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/elf32_updatefile.Tpo" >> ".deps/elf32_updatefile.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/elf32_updatefile.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/elf32_updatefile.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": mv -f .deps/gelf_xlate.Tpo .deps/gelf_xlate.Po Step #3 - "compile-afl-address-x86_64": rm -f libelf.a Step #3 - "compile-afl-address-x86_64": if /src/aflplusplus/afl-clang-fast -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -c -o gelf_xlate.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlate.os -MD -MP \ Step #3 - "compile-afl-address-x86_64": -MF ".deps/gelf_xlate.Tpo" `test -f 'gelf_xlate.c' || echo './'`gelf_xlate.c; \ Step #3 - "compile-afl-address-x86_64": then cat ".deps/gelf_xlate.Tpo" >> ".deps/gelf_xlate.Po"; \ Step #3 - "compile-afl-address-x86_64": rm -f ".deps/gelf_xlate.Tpo"; \ Step #3 - "compile-afl-address-x86_64": else rm -f ".deps/gelf_xlate.Tpo"; exit 1; \ Step #3 - "compile-afl-address-x86_64": fi Step #3 - "compile-afl-address-x86_64": ar cr libelf.a elf_version.o elf_hash.o elf_error.o elf_fill.o elf_begin.o elf_next.o elf_rand.o elf_end.o elf_kind.o gelf_getclass.o elf_getbase.o elf_getident.o elf32_fsize.o elf64_fsize.o gelf_fsize.o elf32_xlatetof.o elf32_xlatetom.o elf64_xlatetof.o elf64_xlatetom.o gelf_xlate.o elf32_getehdr.o elf64_getehdr.o gelf_getehdr.o elf32_newehdr.o elf64_newehdr.o gelf_newehdr.o gelf_update_ehdr.o elf32_getphdr.o elf64_getphdr.o gelf_getphdr.o elf32_newphdr.o elf64_newphdr.o gelf_newphdr.o gelf_update_phdr.o elf_getarhdr.o elf_getarsym.o elf_rawfile.o elf_readall.o elf_cntl.o elf_getscn.o elf_nextscn.o elf_ndxscn.o elf_newscn.o elf32_getshdr.o elf64_getshdr.o gelf_getshdr.o gelf_update_shdr.o elf_strptr.o elf_rawdata.o elf_getdata.o elf_newdata.o elf_getdata_rawchunk.o elf_flagelf.o elf_flagehdr.o elf_flagphdr.o elf_flagscn.o elf_flagshdr.o elf_flagdata.o elf_memory.o elf_update.o elf32_updatenull.o elf64_updatenull.o elf32_updatefile.o elf64_updatefile.o gelf_getsym.o gelf_update_sym.o gelf_getversym.o gelf_getverneed.o gelf_getvernaux.o gelf_getverdef.o gelf_getverdaux.o gelf_getrel.o gelf_getrela.o gelf_update_rel.o gelf_update_rela.o gelf_getdyn.o gelf_update_dyn.o gelf_getmove.o gelf_update_move.o gelf_getsyminfo.o gelf_update_syminfo.o gelf_getauxv.o gelf_update_auxv.o gelf_getnote.o gelf_xlatetof.o gelf_xlatetom.o nlist.o gelf_getsymshndx.o gelf_update_symshndx.o gelf_update_versym.o gelf_update_verneed.o gelf_update_vernaux.o gelf_update_verdef.o gelf_update_verdaux.o elf_getphdrnum.o elf_getshdrnum.o elf_getshdrstrndx.o gelf_checksum.o elf32_checksum.o elf64_checksum.o libelf_crc32.o libelf_next_prime.o elf_clone.o gelf_getlib.o gelf_update_lib.o elf32_offscn.o elf64_offscn.o gelf_offscn.o elf_getaroff.o elf_gnu_hash.o elf_scnshndx.o elf32_getchdr.o elf64_getchdr.o gelf_getchdr.o elf_compress.o elf_compress_gnu.o Step #3 - "compile-afl-address-x86_64": ranlib libelf.a Step #3 - "compile-afl-address-x86_64": rm -f libelf_pic.a Step #3 - "compile-afl-address-x86_64": ar cr libelf_pic.a elf_version.os elf_hash.os elf_error.os elf_fill.os elf_begin.os elf_next.os elf_rand.os elf_end.os elf_kind.os gelf_getclass.os elf_getbase.os elf_getident.os elf32_fsize.os elf64_fsize.os gelf_fsize.os elf32_xlatetof.os elf32_xlatetom.os elf64_xlatetof.os elf64_xlatetom.os gelf_xlate.os elf32_getehdr.os elf64_getehdr.os gelf_getehdr.os elf32_newehdr.os elf64_newehdr.os gelf_newehdr.os gelf_update_ehdr.os elf32_getphdr.os elf64_getphdr.os gelf_getphdr.os elf32_newphdr.os elf64_newphdr.os gelf_newphdr.os gelf_update_phdr.os elf_getarhdr.os elf_getarsym.os elf_rawfile.os elf_readall.os elf_cntl.os elf_getscn.os elf_nextscn.os elf_ndxscn.os elf_newscn.os elf32_getshdr.os elf64_getshdr.os gelf_getshdr.os gelf_update_shdr.os elf_strptr.os elf_rawdata.os elf_getdata.os elf_newdata.os elf_getdata_rawchunk.os elf_flagelf.os elf_flagehdr.os elf_flagphdr.os elf_flagscn.os elf_flagshdr.os elf_flagdata.os elf_memory.os elf_update.os elf32_updatenull.os elf64_updatenull.os elf32_updatefile.os elf64_updatefile.os gelf_getsym.os gelf_update_sym.os gelf_getversym.os gelf_getverneed.os gelf_getvernaux.os gelf_getverdef.os gelf_getverdaux.os gelf_getrel.os gelf_getrela.os gelf_update_rel.os gelf_update_rela.os gelf_getdyn.os gelf_update_dyn.os gelf_getmove.os gelf_update_move.os gelf_getsyminfo.os gelf_update_syminfo.os gelf_getauxv.os gelf_update_auxv.os gelf_getnote.os gelf_xlatetof.os gelf_xlatetom.os nlist.os gelf_getsymshndx.os gelf_update_symshndx.os gelf_update_versym.os gelf_update_verneed.os gelf_update_vernaux.os gelf_update_verdef.os gelf_update_verdaux.os elf_getphdrnum.os elf_getshdrnum.os elf_getshdrstrndx.os gelf_checksum.os elf32_checksum.os elf64_checksum.os libelf_crc32.os libelf_next_prime.os elf_clone.os gelf_getlib.os gelf_update_lib.os elf32_offscn.os elf64_offscn.os gelf_offscn.os elf_getaroff.os elf_gnu_hash.os elf_scnshndx.os elf32_getchdr.os elf64_getchdr.os gelf_getchdr.os elf_compress.os elf_compress_gnu.os Step #3 - "compile-afl-address-x86_64": ranlib libelf_pic.a Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fno-addrsig -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -Wl,--build-id -o libelf.so -shared -Wl,-z,relro -o libelf.so \ Step #3 - "compile-afl-address-x86_64": -Wl,--soname,libelf.so.1 \ Step #3 - "compile-afl-address-x86_64": -Wl,--version-script,libelf.map \ Step #3 - "compile-afl-address-x86_64": \ Step #3 - "compile-afl-address-x86_64": -Wl,--whole-archive libelf_pic.a -Wl,--no-whole-archive \ Step #3 - "compile-afl-address-x86_64": ../lib/libeu.a -lz Step #3 - "compile-afl-address-x86_64": ln -fs libelf.so libelf.so.1 Step #3 - "compile-afl-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/libelf' Step #3 - "compile-afl-address-x86_64": + make -C src BUILD_STATIC_ONLY=y V=1 clean Step #3 - "compile-afl-address-x86_64": make: Entering directory '/src/libbpf/src' Step #3 - "compile-afl-address-x86_64": Package libelf was not found in the pkg-config search path. Step #3 - "compile-afl-address-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #3 - "compile-afl-address-x86_64": to the PKG_CONFIG_PATH environment variable Step #3 - "compile-afl-address-x86_64": No package 'libelf' found Step #3 - "compile-afl-address-x86_64": rm -rf *.o *.a *.so *.so.* *.pc ./sharedobjs ./staticobjs Step #3 - "compile-afl-address-x86_64": make: Leaving directory '/src/libbpf/src' Step #3 - "compile-afl-address-x86_64": ++ nproc Step #3 - "compile-afl-address-x86_64": ++ pwd Step #3 - "compile-afl-address-x86_64": + make -C src -j32 'CFLAGS=-I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope ' BUILD_STATIC_ONLY=y V=1 Step #3 - "compile-afl-address-x86_64": make: Entering directory '/src/libbpf/src' Step #3 - "compile-afl-address-x86_64": Package libelf was not found in the pkg-config search path. Step #3 - "compile-afl-address-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #3 - "compile-afl-address-x86_64": to the PKG_CONFIG_PATH environment variable Step #3 - "compile-afl-address-x86_64": No package 'libelf' found Step #3 - "compile-afl-address-x86_64": mkdir -p staticobjs Step #3 - "compile-afl-address-x86_64": sed -e "s|@PREFIX@|/usr|" \ Step #3 - "compile-afl-address-x86_64": -e "s|@LIBDIR@|$\{prefix\}/lib64|" \ Step #3 - "compile-afl-address-x86_64": -e "s|@VERSION@|1.4.0|" \ Step #3 - "compile-afl-address-x86_64": < libbpf.pc.template > libbpf.pc Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf.c -o staticobjs/bpf.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf.c -o staticobjs/btf.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf.c -o staticobjs/libbpf.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_errno.c -o staticobjs/libbpf_errno.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c netlink.c -o staticobjs/netlink.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c nlattr.c -o staticobjs/nlattr.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c str_error.c -o staticobjs/str_error.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_probes.c -o staticobjs/libbpf_probes.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf_prog_linfo.c -o staticobjs/bpf_prog_linfo.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf_dump.c -o staticobjs/btf_dump.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c hashmap.c -o staticobjs/hashmap.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c ringbuf.c -o staticobjs/ringbuf.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c strset.c -o staticobjs/strset.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c linker.c -o staticobjs/linker.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c gen_loader.c -o staticobjs/gen_loader.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c relo_core.c -o staticobjs/relo_core.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c usdt.c -o staticobjs/usdt.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c zip.c -o staticobjs/zip.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c elf.c -o staticobjs/elf.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c features.c -o staticobjs/features.o Step #3 - "compile-afl-address-x86_64": ar rcs libbpf.a staticobjs/bpf.o staticobjs/btf.o staticobjs/libbpf.o staticobjs/libbpf_errno.o staticobjs/netlink.o staticobjs/nlattr.o staticobjs/str_error.o staticobjs/libbpf_probes.o staticobjs/bpf_prog_linfo.o staticobjs/btf_dump.o staticobjs/hashmap.o staticobjs/ringbuf.o staticobjs/strset.o staticobjs/linker.o staticobjs/gen_loader.o staticobjs/relo_core.o staticobjs/usdt.o staticobjs/zip.o staticobjs/elf.o staticobjs/features.o Step #3 - "compile-afl-address-x86_64": make: Leaving directory '/src/libbpf/src' Step #3 - "compile-afl-address-x86_64": + /src/aflplusplus/afl-clang-fast -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o Step #3 - "compile-afl-address-x86_64": ++ pwd Step #3 - "compile-afl-address-x86_64": + /src/aflplusplus/afl-clang-fast++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ /usr/lib/libFuzzingEngine.a bpf-object-fuzzer.o src/libbpf.a /src/libbpf/elfutils/libelf/libelf.a -l:libz.a -o /workspace/out/afl-address-x86_64/bpf-object-fuzzer Step #3 - "compile-afl-address-x86_64": + cp fuzz/bpf-object-fuzzer_seed_corpus.zip /workspace/out/afl-address-x86_64 Finished Step #3 - "compile-afl-address-x86_64" Starting Step #4 - "build-check-afl-address-x86_64" Step #4 - "build-check-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-afl-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-afl-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-afl-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-afl-address-x86_64": 77fedef42789: Already exists Step #4 - "build-check-afl-address-x86_64": a46a0b8d3abf: Already exists Step #4 - "build-check-afl-address-x86_64": 2eff42337ef1: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 5fe335f0a107: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 71ec68b9e839: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 02e0277e47bf: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 3a481577d847: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": dae4d37f64b1: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 2d2f2d7a1b67: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": d6feceded77b: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": c212a817cc33: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 28566da519a3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 7ecc98ac7332: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 25bfc694e164: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 02f8efad8f50: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": f3782083e707: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 7ecc98ac7332: Waiting Step #4 - "build-check-afl-address-x86_64": 28566da519a3: Waiting Step #4 - "build-check-afl-address-x86_64": 3a481577d847: Waiting Step #4 - "build-check-afl-address-x86_64": 25bfc694e164: Waiting Step #4 - "build-check-afl-address-x86_64": 02f8efad8f50: Waiting Step #4 - "build-check-afl-address-x86_64": f3782083e707: Waiting Step #4 - "build-check-afl-address-x86_64": dae4d37f64b1: Waiting Step #4 - "build-check-afl-address-x86_64": 2d2f2d7a1b67: Waiting Step #4 - "build-check-afl-address-x86_64": d6feceded77b: Waiting Step #4 - "build-check-afl-address-x86_64": c212a817cc33: Waiting Step #4 - "build-check-afl-address-x86_64": 02e0277e47bf: Waiting Step #4 - "build-check-afl-address-x86_64": 71ec68b9e839: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 71ec68b9e839: Download complete Step #4 - "build-check-afl-address-x86_64": 5fe335f0a107: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 5fe335f0a107: Download complete Step #4 - "build-check-afl-address-x86_64": 2eff42337ef1: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 2eff42337ef1: Download complete Step #4 - "build-check-afl-address-x86_64": dae4d37f64b1: Download complete Step #4 - "build-check-afl-address-x86_64": 3a481577d847: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 3a481577d847: Download complete Step #4 - "build-check-afl-address-x86_64": 2eff42337ef1: Pull complete Step #4 - "build-check-afl-address-x86_64": 2d2f2d7a1b67: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 2d2f2d7a1b67: Download complete Step #4 - "build-check-afl-address-x86_64": c212a817cc33: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": c212a817cc33: Download complete Step #4 - "build-check-afl-address-x86_64": 5fe335f0a107: Pull complete Step #4 - "build-check-afl-address-x86_64": d6feceded77b: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": d6feceded77b: Download complete Step #4 - "build-check-afl-address-x86_64": 71ec68b9e839: Pull complete Step #4 - "build-check-afl-address-x86_64": 02e0277e47bf: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 02e0277e47bf: Download complete Step #4 - "build-check-afl-address-x86_64": 7ecc98ac7332: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 7ecc98ac7332: Download complete Step #4 - "build-check-afl-address-x86_64": 25bfc694e164: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 25bfc694e164: Download complete Step #4 - "build-check-afl-address-x86_64": f3782083e707: Download complete Step #4 - "build-check-afl-address-x86_64": 28566da519a3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 28566da519a3: Download complete Step #4 - "build-check-afl-address-x86_64": 02f8efad8f50: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 02f8efad8f50: Download complete Step #4 - "build-check-afl-address-x86_64": 02e0277e47bf: Pull complete Step #4 - "build-check-afl-address-x86_64": 3a481577d847: Pull complete Step #4 - "build-check-afl-address-x86_64": dae4d37f64b1: Pull complete Step #4 - "build-check-afl-address-x86_64": 2d2f2d7a1b67: Pull complete Step #4 - "build-check-afl-address-x86_64": d6feceded77b: Pull complete Step #4 - "build-check-afl-address-x86_64": c212a817cc33: Pull complete Step #4 - "build-check-afl-address-x86_64": 28566da519a3: Pull complete Step #4 - "build-check-afl-address-x86_64": 7ecc98ac7332: Pull complete Step #4 - "build-check-afl-address-x86_64": 25bfc694e164: Pull complete Step #4 - "build-check-afl-address-x86_64": 02f8efad8f50: Pull complete Step #4 - "build-check-afl-address-x86_64": f3782083e707: Pull complete Step #4 - "build-check-afl-address-x86_64": Digest: sha256:0054ff4da55e728cb56c43d55eeb64b52601ae9028016f458ac3de83fd977b0a Step #4 - "build-check-afl-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5eadvhnw/bpf-object-fuzzer Finished Step #4 - "build-check-afl-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/libbpf Step #6: adding: SanitizerCoveragePCGUARD.so (deflated 70%) Step #6: adding: afl-addseeds (deflated 56%) Step #6: adding: afl-analyze (deflated 54%) Step #6: adding: afl-as (deflated 63%) Step #6: adding: afl-c++ (deflated 55%) Step #6: adding: afl-cc (deflated 55%) Step #6: adding: afl-clang (deflated 55%) Step #6: adding: afl-clang++ (deflated 55%) Step #6: adding: afl-clang-fast (deflated 55%) Step #6: adding: afl-clang-fast++ (deflated 55%) Step #6: adding: afl-clang-lto (deflated 55%) Step #6: adding: afl-clang-lto++ (deflated 55%) Step #6: adding: afl-cmin (deflated 70%) Step #6: adding: afl-cmin.bash (deflated 65%) Step #6: adding: afl-compiler-rt-32.o (deflated 55%) Step #6: adding: afl-compiler-rt-64.o (deflated 67%) Step #6: adding: afl-compiler-rt.o (deflated 67%) Step #6: adding: afl-fuzz (deflated 55%) Step #6: adding: afl-g++ (deflated 55%) Step #6: adding: afl-gcc (deflated 55%) Step #6: adding: afl-gotcpu (deflated 63%) Step #6: adding: afl-ld-lto (deflated 63%) Step #6: adding: afl-llvm-dict2file.so (deflated 68%) Step #6: adding: afl-llvm-lto-instrumentlist.so (deflated 70%) Step #6: adding: afl-llvm-pass.so (deflated 68%) Step #6: adding: afl-lto (deflated 55%) Step #6: adding: afl-lto++ (deflated 55%) Step #6: adding: afl-persistent-config (deflated 60%) Step #6: adding: afl-plot (deflated 65%) Step #6: adding: afl-showmap (deflated 54%) Step #6: adding: afl-system-config (deflated 63%) Step #6: adding: afl-tmin (deflated 53%) Step #6: adding: afl-whatsup (deflated 69%) Step #6: adding: afl-wine-trace (deflated 70%) Step #6: adding: afl_options.txt (deflated 20%) Step #6: adding: bpf-object-fuzzer (deflated 62%) Step #6: adding: bpf-object-fuzzer_seed_corpus.zip (stored 0%) Step #6: adding: cmplog-instructions-pass.so (deflated 69%) Step #6: adding: cmplog-routines-pass.so (deflated 69%) Step #6: adding: cmplog-switches-pass.so (deflated 69%) Step #6: adding: compare-transform-pass.so (deflated 69%) Step #6: adding: dynamic_list.txt (deflated 76%) Step #6: adding: libAFLDriver.a (deflated 63%) Step #6: adding: libAFLQemuDriver.a (deflated 64%) Step #6: adding: llvm-symbolizer (deflated 64%) Step #6: adding: split-compares-pass.so (deflated 68%) Step #6: adding: split-switches-pass.so (deflated 69%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 0062f774e994: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 147 0 0 100 147 0 701 --:--:-- --:--:-- --:--:-- 703 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 8244k 0 0 100 8244k 0 26.1M --:--:-- --:--:-- --:--:-- 26.1M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 18 0 0 100 18 0 61 --:--:-- --:--:-- --:--:-- 61 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: Step #10: ***** NOTICE ***** Step #10: Step #10: Supported `curl` versions can be found in the various images available at Step #10: https://console.cloud.google.com/launcher/details/google/ubuntu1604. Step #10: Step #10: ***** END OF NOTICE ***** Step #10: Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 155 --:--:-- --:--:-- --:--:-- 157 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/libbpf Finished Step #11 Starting Step #12 - "compile-honggfuzz-address-x86_64" Step #12 - "compile-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": Skipping compilation; using precompiled honggfuzz Step #12 - "compile-honggfuzz-address-x86_64": done. Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": CC=clang Step #12 - "compile-honggfuzz-address-x86_64": CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp Step #12 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #12 - "compile-honggfuzz-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": + ./scripts/build-fuzzers.sh Step #12 - "compile-honggfuzz-address-x86_64": + SANITIZER=address Step #12 - "compile-honggfuzz-address-x86_64": + flags='-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize=fuzzer-no-link' Step #12 - "compile-honggfuzz-address-x86_64": + export CC=clang Step #12 - "compile-honggfuzz-address-x86_64": + CC=clang Step #12 - "compile-honggfuzz-address-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp' Step #12 - "compile-honggfuzz-address-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp' Step #12 - "compile-honggfuzz-address-x86_64": + export CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": + CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++' Step #12 - "compile-honggfuzz-address-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++' Step #12 - "compile-honggfuzz-address-x86_64": ++ dirname -- ./scripts/build-fuzzers.sh Step #12 - "compile-honggfuzz-address-x86_64": + cd ./scripts/.. Step #12 - "compile-honggfuzz-address-x86_64": + export OUT=/workspace/out/honggfuzz-address-x86_64 Step #12 - "compile-honggfuzz-address-x86_64": + OUT=/workspace/out/honggfuzz-address-x86_64 Step #12 - "compile-honggfuzz-address-x86_64": + mkdir -p /workspace/out/honggfuzz-address-x86_64 Step #12 - "compile-honggfuzz-address-x86_64": + export LIB_FUZZING_ENGINE=/usr/lib/libFuzzingEngine.a Step #12 - "compile-honggfuzz-address-x86_64": + LIB_FUZZING_ENGINE=/usr/lib/libFuzzingEngine.a Step #12 - "compile-honggfuzz-address-x86_64": + [[ address == memory ]] Step #12 - "compile-honggfuzz-address-x86_64": + [[ address == undefined ]] Step #12 - "compile-honggfuzz-address-x86_64": + rm -rf elfutils Step #12 - "compile-honggfuzz-address-x86_64": + git clone https://sourceware.org/git/elfutils.git Step #12 - "compile-honggfuzz-address-x86_64": Cloning into 'elfutils'... Step #12 - "compile-honggfuzz-address-x86_64": remote: Enumerating objects: 38615, done. Step #12 - "compile-honggfuzz-address-x86_64": remote: Counting objects: 0% (1/38615) remote: Counting objects: 1% (387/38615) remote: Counting objects: 2% (773/38615) remote: Counting objects: 3% (1159/38615) remote: Counting objects: 4% (1545/38615) remote: Counting objects: 5% (1931/38615) remote: Counting objects: 6% (2317/38615) remote: Counting objects: 7% (2704/38615) remote: Counting objects: 8% (3090/38615) remote: Counting objects: 9% (3476/38615) remote: Counting objects: 10% (3862/38615) remote: Counting objects: 11% (4248/38615) remote: Counting objects: 12% (4634/38615) remote: Counting objects: 13% (5020/38615) remote: Counting objects: 14% (5407/38615) remote: Counting objects: 15% (5793/38615) remote: Counting objects: 16% (6179/38615) remote: Counting objects: 17% (6565/38615) remote: Counting objects: 18% (6951/38615) remote: Counting objects: 19% (7337/38615) remote: Counting objects: 20% (7723/38615) remote: Counting objects: 21% (8110/38615) remote: Counting objects: 22% (8496/38615) remote: Counting objects: 23% (8882/38615) remote: Counting objects: 24% (9268/38615) remote: Counting objects: 25% (9654/38615) remote: Counting objects: 26% (10040/38615) remote: Counting objects: 27% (10427/38615) remote: Counting objects: 28% (10813/38615) remote: Counting objects: 29% (11199/38615) remote: Counting objects: 30% (11585/38615) remote: Counting objects: 31% (11971/38615) remote: Counting objects: 32% (12357/38615) remote: Counting objects: 33% (12743/38615) remote: Counting objects: 34% (13130/38615) remote: Counting objects: 35% (13516/38615) remote: Counting objects: 36% (13902/38615) remote: Counting objects: 37% (14288/38615) remote: Counting objects: 38% (14674/38615) remote: Counting objects: 39% (15060/38615) remote: Counting objects: 40% (15446/38615) remote: Counting objects: 41% (15833/38615) remote: Counting objects: 42% (16219/38615) remote: Counting objects: 43% (16605/38615) remote: Counting objects: 44% (16991/38615) remote: Counting objects: 45% (17377/38615) remote: Counting objects: 46% (17763/38615) remote: Counting objects: 47% (18150/38615) remote: Counting objects: 48% (18536/38615) remote: Counting objects: 49% (18922/38615) remote: Counting objects: 50% (19308/38615) remote: Counting objects: 51% (19694/38615) remote: Counting objects: 52% (20080/38615) remote: Counting objects: 53% (20466/38615) remote: Counting objects: 54% (20853/38615) remote: Counting objects: 55% (21239/38615) remote: Counting objects: 56% (21625/38615) remote: Counting objects: 57% (22011/38615) remote: Counting objects: 58% (22397/38615) remote: Counting objects: 59% (22783/38615) remote: Counting objects: 60% (23169/38615) remote: Counting objects: 61% (23556/38615) remote: Counting objects: 62% (23942/38615) remote: Counting objects: 63% (24328/38615) remote: Counting objects: 64% (24714/38615) remote: Counting objects: 65% (25100/38615) remote: Counting objects: 66% (25486/38615) remote: Counting objects: 67% (25873/38615) remote: Counting objects: 68% (26259/38615) remote: Counting objects: 69% (26645/38615) remote: Counting objects: 70% (27031/38615) remote: Counting objects: 71% (27417/38615) remote: Counting objects: 72% (27803/38615) remote: Counting objects: 73% (28189/38615) remote: Counting objects: 74% (28576/38615) remote: Counting objects: 75% (28962/38615) remote: Counting objects: 76% (29348/38615) remote: Counting objects: 77% (29734/38615) remote: Counting objects: 78% (30120/38615) remote: Counting objects: 79% (30506/38615) remote: Counting objects: 80% (30892/38615) remote: Counting objects: 81% (31279/38615) remote: Counting objects: 82% (31665/38615) remote: Counting objects: 83% (32051/38615) remote: Counting objects: 84% (32437/38615) remote: Counting objects: 85% (32823/38615) remote: Counting objects: 86% (33209/38615) remote: Counting objects: 87% (33596/38615) remote: Counting objects: 88% (33982/38615) remote: Counting objects: 89% (34368/38615) remote: Counting objects: 90% (34754/38615) remote: Counting objects: 91% (35140/38615) remote: Counting objects: 92% (35526/38615) remote: Counting objects: 93% (35912/38615) remote: Counting objects: 94% (36299/38615) remote: Counting objects: 95% (36685/38615) remote: Counting objects: 96% (37071/38615) remote: Counting objects: 97% (37457/38615) remote: Counting objects: 98% (37843/38615) remote: Counting objects: 99% (38229/38615) remote: Counting objects: 100% (38615/38615) remote: Counting objects: 100% (38615/38615), done. Step #12 - "compile-honggfuzz-address-x86_64": remote: Compressing objects: 0% (1/7338) remote: Compressing objects: 1% (74/7338) remote: Compressing objects: 2% (147/7338) remote: Compressing objects: 3% (221/7338) remote: Compressing objects: 4% (294/7338) remote: Compressing objects: 5% (367/7338) remote: Compressing objects: 6% (441/7338) remote: Compressing objects: 7% (514/7338) remote: Compressing objects: 8% (588/7338) remote: Compressing objects: 9% (661/7338) remote: Compressing objects: 10% (734/7338) remote: Compressing objects: 11% (808/7338) remote: Compressing objects: 12% (881/7338) remote: Compressing objects: 13% (954/7338) remote: Compressing objects: 14% (1028/7338) remote: Compressing objects: 15% (1101/7338) remote: Compressing objects: 16% (1175/7338) remote: Compressing objects: 17% (1248/7338) remote: Compressing objects: 18% (1321/7338) remote: Compressing objects: 19% (1395/7338) remote: Compressing objects: 20% (1468/7338) remote: Compressing objects: 21% (1541/7338) remote: Compressing objects: 22% (1615/7338) remote: Compressing objects: 23% (1688/7338) remote: Compressing objects: 24% (1762/7338) remote: Compressing objects: 25% (1835/7338) remote: Compressing objects: 26% (1908/7338) remote: Compressing objects: 27% (1982/7338) remote: Compressing objects: 28% (2055/7338) remote: Compressing objects: 29% (2129/7338) remote: Compressing objects: 30% (2202/7338) remote: Compressing objects: 31% (2275/7338) remote: Compressing objects: 32% (2349/7338) remote: Compressing objects: 33% (2422/7338) remote: Compressing objects: 34% (2495/7338) remote: Compressing objects: 35% (2569/7338) remote: Compressing objects: 36% (2642/7338) remote: Compressing objects: 37% (2716/7338) remote: Compressing objects: 38% (2789/7338) remote: Compressing objects: 39% (2862/7338) remote: Compressing objects: 40% (2936/7338) remote: Compressing objects: 41% (3009/7338) remote: Compressing objects: 42% (3082/7338) remote: Compressing objects: 43% (3156/7338) remote: Compressing objects: 44% (3229/7338) remote: Compressing objects: 45% (3303/7338) remote: Compressing objects: 46% (3376/7338) remote: Compressing objects: 47% (3449/7338) remote: Compressing objects: 48% (3523/7338) remote: Compressing objects: 49% (3596/7338) remote: Compressing objects: 50% (3669/7338) remote: Compressing objects: 51% (3743/7338) remote: Compressing objects: 52% (3816/7338) remote: Compressing objects: 53% (3890/7338) remote: Compressing objects: 54% (3963/7338) remote: Compressing objects: 55% (4036/7338) remote: Compressing objects: 56% (4110/7338) remote: Compressing objects: 57% (4183/7338) remote: Compressing objects: 58% (4257/7338) remote: Compressing objects: 59% (4330/7338) remote: Compressing objects: 60% (4403/7338) remote: Compressing objects: 61% (4477/7338) remote: Compressing objects: 62% (4550/7338) remote: Compressing objects: 63% (4623/7338) remote: Compressing objects: 64% (4697/7338) remote: Compressing objects: 65% (4770/7338) remote: Compressing objects: 66% (4844/7338) remote: Compressing objects: 67% (4917/7338) remote: Compressing objects: 68% (4990/7338) remote: Compressing objects: 69% (5064/7338) remote: Compressing objects: 70% (5137/7338) remote: Compressing objects: 71% (5210/7338) remote: Compressing objects: 72% (5284/7338) remote: Compressing objects: 73% (5357/7338) remote: Compressing objects: 74% (5431/7338) remote: Compressing objects: 75% (5504/7338) remote: Compressing objects: 76% (5577/7338) remote: Compressing objects: 77% (5651/7338) remote: Compressing objects: 78% (5724/7338) remote: Compressing objects: 79% (5798/7338) remote: Compressing objects: 80% (5871/7338) remote: Compressing objects: 81% (5944/7338) remote: Compressing objects: 82% (6018/7338) remote: Compressing objects: 83% (6091/7338) remote: Compressing objects: 84% (6164/7338) remote: Compressing objects: 85% (6238/7338) remote: Compressing objects: 86% (6311/7338) remote: Compressing objects: 87% (6385/7338) remote: Compressing objects: 88% (6458/7338) remote: Compressing objects: 89% (6531/7338) remote: Compressing objects: 90% (6605/7338) remote: Compressing objects: 91% (6678/7338) remote: Compressing objects: 92% (6751/7338) remote: Compressing objects: 93% (6825/7338) remote: Compressing objects: 94% (6898/7338) remote: Compressing objects: 95% (6972/7338) remote: Compressing objects: 96% (7045/7338) remote: Compressing objects: 97% (7118/7338) remote: Compressing objects: 98% (7192/7338) remote: Compressing objects: 99% (7265/7338) remote: Compressing objects: 100% (7338/7338) remote: Compressing objects: 100% (7338/7338), done. Step #12 - "compile-honggfuzz-address-x86_64": Receiving objects: 0% (1/38615) Receiving objects: 1% (387/38615) Receiving objects: 2% (773/38615) Receiving objects: 3% (1159/38615) Receiving objects: 4% (1545/38615) Receiving objects: 5% (1931/38615) Receiving objects: 6% (2317/38615) Receiving objects: 7% (2704/38615) Receiving objects: 8% (3090/38615) Receiving objects: 9% (3476/38615) Receiving objects: 10% (3862/38615) Receiving objects: 11% (4248/38615) Receiving objects: 12% (4634/38615) Receiving objects: 13% (5020/38615) Receiving objects: 14% (5407/38615) Receiving objects: 15% (5793/38615) Receiving objects: 16% (6179/38615) Receiving objects: 17% (6565/38615) Receiving objects: 18% (6951/38615) Receiving objects: 19% (7337/38615) Receiving objects: 20% (7723/38615) Receiving objects: 21% (8110/38615) Receiving objects: 22% (8496/38615) Receiving objects: 23% (8882/38615) Receiving objects: 24% (9268/38615) Receiving objects: 25% (9654/38615) Receiving objects: 26% (10040/38615) Receiving objects: 27% (10427/38615) Receiving objects: 28% (10813/38615) Receiving objects: 29% (11199/38615) Receiving objects: 30% (11585/38615) Receiving objects: 31% (11971/38615) Receiving objects: 32% (12357/38615) Receiving objects: 33% (12743/38615) Receiving objects: 34% (13130/38615) Receiving objects: 35% (13516/38615) Receiving objects: 36% (13902/38615) Receiving objects: 37% (14288/38615) Receiving objects: 38% (14674/38615) Receiving objects: 39% (15060/38615) Receiving objects: 40% (15446/38615) Receiving objects: 41% (15833/38615) Receiving objects: 42% (16219/38615) Receiving objects: 43% (16605/38615) Receiving objects: 44% (16991/38615) Receiving objects: 45% (17377/38615) Receiving objects: 46% (17763/38615) Receiving objects: 47% (18150/38615) Receiving objects: 48% (18536/38615) Receiving objects: 49% (18922/38615) Receiving objects: 50% (19308/38615) Receiving objects: 51% (19694/38615) Receiving objects: 52% (20080/38615) Receiving objects: 53% (20466/38615) Receiving objects: 54% (20853/38615) Receiving objects: 55% (21239/38615) Receiving objects: 56% (21625/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 57% (22011/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 58% (22397/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 59% (22783/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 60% (23169/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 61% (23556/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 62% (23942/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 63% (24328/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 64% (24714/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 65% (25100/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 66% (25486/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 67% (25873/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 68% (26259/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 69% (26645/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 70% (27031/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 71% (27417/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 72% (27803/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 73% (28189/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 74% (28576/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 75% (28962/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 76% (29348/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 77% (29734/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 78% (30120/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 79% (30506/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 80% (30892/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 81% (31279/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 82% (31665/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 83% (32051/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 84% (32437/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 85% (32823/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 86% (33209/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 87% (33596/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 88% (33982/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 89% (34368/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 90% (34754/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 91% (35140/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 92% (35526/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 93% (35912/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 94% (36299/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 95% (36685/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 96% (37071/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 97% (37457/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 98% (37843/38615), 10.05 MiB | 20.13 MiB/s remote: Total 38615 (delta 32217), reused 37479 (delta 31234), pack-reused 0 Step #12 - "compile-honggfuzz-address-x86_64": Receiving objects: 99% (38229/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 100% (38615/38615), 10.05 MiB | 20.13 MiB/s Receiving objects: 100% (38615/38615), 21.53 MiB | 29.12 MiB/s, done. Step #12 - "compile-honggfuzz-address-x86_64": Resolving deltas: 0% (0/32217) Resolving deltas: 1% (437/32217) Resolving deltas: 2% (951/32217) Resolving deltas: 3% (1096/32217) Resolving deltas: 4% (1349/32217) Resolving deltas: 5% (1702/32217) Resolving deltas: 6% (2055/32217) Resolving deltas: 7% (2258/32217) Resolving deltas: 8% (2615/32217) Resolving deltas: 9% (2932/32217) Resolving deltas: 10% (3331/32217) Resolving deltas: 11% (3547/32217) Resolving deltas: 12% (3934/32217) Resolving deltas: 13% (4228/32217) Resolving deltas: 14% (4613/32217) Resolving deltas: 15% (5120/32217) Resolving deltas: 17% (5644/32217) Resolving deltas: 18% (5807/32217) Resolving deltas: 19% (6198/32217) Resolving deltas: 20% (6498/32217) Resolving deltas: 23% (7521/32217) Resolving deltas: 24% (7755/32217) Resolving deltas: 26% (8443/32217) Resolving deltas: 27% (8702/32217) Resolving deltas: 28% (9195/32217) Resolving deltas: 29% (9521/32217) Resolving deltas: 30% (9961/32217) Resolving deltas: 31% (10036/32217) Resolving deltas: 32% (10355/32217) Resolving deltas: 33% (10768/32217) Resolving deltas: 34% (10975/32217) Resolving deltas: 35% (11340/32217) Resolving deltas: 36% (11642/32217) Resolving deltas: 37% (11982/32217) Resolving deltas: 39% (12644/32217) Resolving deltas: 40% (12958/32217) Resolving deltas: 41% (13225/32217) Resolving deltas: 42% (13559/32217) Resolving deltas: 43% (13871/32217) Resolving deltas: 44% (14176/32217) Resolving deltas: 45% (14775/32217) Resolving deltas: 46% (14820/32217) Resolving deltas: 47% (15197/32217) Resolving deltas: 48% (15621/32217) Resolving deltas: 49% (15795/32217) Resolving deltas: 50% (16178/32217) Resolving deltas: 51% (16446/32217) Resolving deltas: 52% (16762/32217) Resolving deltas: 53% (17112/32217) Resolving deltas: 54% (17415/32217) Resolving deltas: 55% (17724/32217) Resolving deltas: 56% (18147/32217) Resolving deltas: 57% (18488/32217) Resolving deltas: 58% (18724/32217) Resolving deltas: 59% (19030/32217) Resolving deltas: 60% (19332/32217) Resolving deltas: 61% (19659/32217) Resolving deltas: 62% (20022/32217) Resolving deltas: 63% (20315/32217) Resolving deltas: 64% (20656/32217) Resolving deltas: 65% (20943/32217) Resolving deltas: 66% (21271/32217) Resolving deltas: 67% (21659/32217) Resolving deltas: 68% (21930/32217) Resolving deltas: 69% (22523/32217) Resolving deltas: 70% (22607/32217) Resolving deltas: 71% (22918/32217) Resolving deltas: 72% (23292/32217) Resolving deltas: 73% (23539/32217) Resolving deltas: 74% (23877/32217) Resolving deltas: 75% (24416/32217) Resolving deltas: 77% (24899/32217) Resolving deltas: 78% (25250/32217) Resolving deltas: 80% (25921/32217) Resolving deltas: 81% (26367/32217) Resolving deltas: 82% (26455/32217) Resolving deltas: 83% (26760/32217) Resolving deltas: 84% (27069/32217) Resolving deltas: 85% (27393/32217) Resolving deltas: 86% (27709/32217) Resolving deltas: 87% (28053/32217) Resolving deltas: 88% (28357/32217) Resolving deltas: 89% (28845/32217) Resolving deltas: 90% (29019/32217) Resolving deltas: 91% (29331/32217) Resolving deltas: 92% (29666/32217) Resolving deltas: 93% (29996/32217) Resolving deltas: 94% (30294/32217) Resolving deltas: 94% (30516/32217) Resolving deltas: 95% (30647/32217) Resolving deltas: 96% (30934/32217) Resolving deltas: 97% (31260/32217) Resolving deltas: 98% (31608/32217) Resolving deltas: 99% (31998/32217) Resolving deltas: 100% (32217/32217) Resolving deltas: 100% (32217/32217), done. Step #12 - "compile-honggfuzz-address-x86_64": + cd elfutils Step #12 - "compile-honggfuzz-address-x86_64": + git checkout 67a187d4c1790058fc7fd218317851cb68bb087c Step #12 - "compile-honggfuzz-address-x86_64": Note: switching to '67a187d4c1790058fc7fd218317851cb68bb087c'. Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #12 - "compile-honggfuzz-address-x86_64": changes and commit them, and you can discard any commits you make in this Step #12 - "compile-honggfuzz-address-x86_64": state without impacting any branches by switching back to a branch. Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": If you want to create a new branch to retain commits you create, you may Step #12 - "compile-honggfuzz-address-x86_64": do so (now or later) by using -c with the switch command. Example: Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": git switch -c Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": Or undo this operation with: Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": git switch - Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": HEAD is now at 67a187d4 Prepare for 0.189 Step #12 - "compile-honggfuzz-address-x86_64": + git log --oneline -1 Step #12 - "compile-honggfuzz-address-x86_64": [?1h= 67a187d4 (HEAD, tag: elfutils-0.189) Prepare for 0.189 Step #12 - "compile-honggfuzz-address-x86_64": [?1l>+ sed -i 's/^\(NO_UNDEFINED=\).*/\1/' configure.ac Step #12 - "compile-honggfuzz-address-x86_64": + sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac Step #12 - "compile-honggfuzz-address-x86_64": + [[ address == undefined ]] Step #12 - "compile-honggfuzz-address-x86_64": + autoreconf -i -f Step #12 - "compile-honggfuzz-address-x86_64": autopoint: using AM_GNU_GETTEXT_REQUIRE_VERSION instead of AM_GNU_GETTEXT_VERSION Step #12 - "compile-honggfuzz-address-x86_64": Copying file ABOUT-NLS Step #12 - "compile-honggfuzz-address-x86_64": Copying file config/config.rpath Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/codeset.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/extern-inline.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/fcntl-o.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/gettext.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/glibc2.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/glibc21.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/iconv.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/intdiv0.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/intl.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/intldir.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/intlmacosx.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/intmax.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/inttypes-pri.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/inttypes_h.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/lcmessage.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/lib-ld.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/lib-link.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/lib-prefix.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/lock.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/longlong.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/nls.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/po.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/printf-posix.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/progtest.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/size_max.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/stdint_h.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/threadlib.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/uintmax_t.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/visibility.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/wchar_t.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/wint_t.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file m4/xsize.m4 Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/Makefile.in.in Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/Makevars.template Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/Rules-quot Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/boldquot.sed Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/en@boldquot.header Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/en@quot.header Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/insert-header.sin Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/quot.sed Step #12 - "compile-honggfuzz-address-x86_64": Copying file po/remove-potcdate.sin Step #12 - "compile-honggfuzz-address-x86_64": configure.ac:97: installing 'config/ar-lib' Step #12 - "compile-honggfuzz-address-x86_64": configure.ac:91: installing 'config/compile' Step #12 - "compile-honggfuzz-address-x86_64": configure.ac:67: installing 'config/config.guess' Step #12 - "compile-honggfuzz-address-x86_64": configure.ac:67: installing 'config/config.sub' Step #12 - "compile-honggfuzz-address-x86_64": configure.ac:52: installing 'config/install-sh' Step #12 - "compile-honggfuzz-address-x86_64": configure.ac:52: installing 'config/missing' Step #12 - "compile-honggfuzz-address-x86_64": Makefile.am: installing './INSTALL' Step #12 - "compile-honggfuzz-address-x86_64": backends/Makefile.am: installing 'config/depcomp' Step #12 - "compile-honggfuzz-address-x86_64": configure.ac: installing 'config/ylwrap' Step #12 - "compile-honggfuzz-address-x86_64": parallel-tests: installing 'config/test-driver' Step #12 - "compile-honggfuzz-address-x86_64": + ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod --disable-demangler --without-bzlib --without-lzma --without-zstd CC=clang 'CFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp' CXX=clang++ 'CXXFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++' 'LDFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp' Step #12 - "compile-honggfuzz-address-x86_64": configure: No --program-prefix given, using "eu-" Step #12 - "compile-honggfuzz-address-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #12 - "compile-honggfuzz-address-x86_64": checking whether build environment is sane... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #12 - "compile-honggfuzz-address-x86_64": checking for gawk... gawk Step #12 - "compile-honggfuzz-address-x86_64": checking whether make sets $(MAKE)... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether make supports nested variables... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether make supports nested variables... (cached) yes Step #12 - "compile-honggfuzz-address-x86_64": checking build system type... x86_64-pc-linux-gnu Step #12 - "compile-honggfuzz-address-x86_64": checking host system type... x86_64-pc-linux-gnu Step #12 - "compile-honggfuzz-address-x86_64": checking whether make supports the include directive... yes (GNU style) Step #12 - "compile-honggfuzz-address-x86_64": checking for gcc... clang Step #12 - "compile-honggfuzz-address-x86_64": checking whether the C compiler works... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for C compiler default output file name... a.out Step #12 - "compile-honggfuzz-address-x86_64": checking for suffix of executables... Step #12 - "compile-honggfuzz-address-x86_64": checking whether we are cross compiling... no Step #12 - "compile-honggfuzz-address-x86_64": checking for suffix of object files... o Step #12 - "compile-honggfuzz-address-x86_64": checking whether we are using the GNU C compiler... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether clang accepts -g... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for clang option to accept ISO C89... none needed Step #12 - "compile-honggfuzz-address-x86_64": checking whether clang understands -c and -o together... yes Step #12 - "compile-honggfuzz-address-x86_64": checking dependency style of clang... gcc3 Step #12 - "compile-honggfuzz-address-x86_64": checking for clang option to accept ISO C99... none needed Step #12 - "compile-honggfuzz-address-x86_64": checking whether we are using the GNU C++ compiler... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether clang++ accepts -g... yes Step #12 - "compile-honggfuzz-address-x86_64": checking dependency style of clang++... gcc3 Step #12 - "compile-honggfuzz-address-x86_64": checking for ranlib... ranlib Step #12 - "compile-honggfuzz-address-x86_64": checking for bison... bison -y Step #12 - "compile-honggfuzz-address-x86_64": checking for flex... flex Step #12 - "compile-honggfuzz-address-x86_64": checking lex output file root... lex.yy Step #12 - "compile-honggfuzz-address-x86_64": checking lex library... none needed Step #12 - "compile-honggfuzz-address-x86_64": checking whether yytext is a pointer... no Step #12 - "compile-honggfuzz-address-x86_64": checking for ar... ar Step #12 - "compile-honggfuzz-address-x86_64": checking the archiver (ar) interface... ar Step #12 - "compile-honggfuzz-address-x86_64": checking for readelf... readelf Step #12 - "compile-honggfuzz-address-x86_64": checking for nm... nm Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc supports __attribute__((visibility()))... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc supports __attribute__((gcc_struct))... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc supports -fPIC... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc supports -fPIE... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc supports ... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether the compiler generates build-ids... no Step #12 - "compile-honggfuzz-address-x86_64": configure: WARNING: compiler doesn't generate build-id by default Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc supports -Wl,-z,relro... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for __thread support... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc provides stdatomic.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for special C compiler options needed for large files... no Step #12 - "compile-honggfuzz-address-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether fts.h is bad when included (with LFS)... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether to add -D_FORTIFY_SOURCE=2 or =3 to CFLAGS... yes -D_FORTIFY_SOURCE=3 Step #12 - "compile-honggfuzz-address-x86_64": checking for library containing gzdirect... -lz Step #12 - "compile-honggfuzz-address-x86_64": checking whether memrchr is declared... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether rawmemchr is declared... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether powerof2 is declared... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether mempcpy is declared... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether reallocarray is declared... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for process_vm_readv... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for mremap... yes Step #12 - "compile-honggfuzz-address-x86_64": checking how to run the C preprocessor... clang -E Step #12 - "compile-honggfuzz-address-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #12 - "compile-honggfuzz-address-x86_64": checking for egrep... /usr/bin/grep -E Step #12 - "compile-honggfuzz-address-x86_64": checking for ANSI C header files... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for sys/types.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for sys/stat.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for stdlib.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for string.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for memory.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for strings.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for inttypes.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for stdint.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for unistd.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking error.h usability... yes Step #12 - "compile-honggfuzz-address-x86_64": checking error.h presence... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for error.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking err.h usability... yes Step #12 - "compile-honggfuzz-address-x86_64": checking err.h presence... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for err.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking sched.h usability... yes Step #12 - "compile-honggfuzz-address-x86_64": checking sched.h presence... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for sched.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for sched_getaffinity... yes Step #12 - "compile-honggfuzz-address-x86_64": checking sys/resource.h usability... yes Step #12 - "compile-honggfuzz-address-x86_64": checking sys/resource.h presence... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for sys/resource.h... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for getrlimit... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether strerror_r is declared... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for strerror_r... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether strerror_r returns char *... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether symbol versioning is supported... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc accepts -Wstack-usage... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc has a sane -Wlogical-op... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc accepts -Wduplicated-cond... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc accepts -Wnull-dereference... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether gcc accepts -Wimplicit-fallthrough... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether the compiler accepts -Wimplicit-fallthrough=5... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether the compiler accepts -Wtrampolines... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether the compiler accepts -Wno-packed-not-aligned... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether the compiler accepts -Wuse-after-free=3... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether the compiler accepts -fno-addrsig... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for library containing argp_parse... none required Step #12 - "compile-honggfuzz-address-x86_64": checking for library containing fts_close... none required Step #12 - "compile-honggfuzz-address-x86_64": checking for library containing _obstack_free... none required Step #12 - "compile-honggfuzz-address-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #12 - "compile-honggfuzz-address-x86_64": checking whether NLS is requested... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for msgfmt... /usr/bin/msgfmt Step #12 - "compile-honggfuzz-address-x86_64": checking for gmsgfmt... /usr/bin/msgfmt Step #12 - "compile-honggfuzz-address-x86_64": checking for xgettext... /usr/bin/xgettext Step #12 - "compile-honggfuzz-address-x86_64": checking for msgmerge... /usr/bin/msgmerge Step #12 - "compile-honggfuzz-address-x86_64": checking for ld used by clang... /usr/bin/ld Step #12 - "compile-honggfuzz-address-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for shared library run path origin... done Step #12 - "compile-honggfuzz-address-x86_64": checking for CFPreferencesCopyAppValue... no Step #12 - "compile-honggfuzz-address-x86_64": checking for CFLocaleCopyCurrent... no Step #12 - "compile-honggfuzz-address-x86_64": checking for GNU gettext in libc... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether to use NLS... yes Step #12 - "compile-honggfuzz-address-x86_64": checking where the gettext function comes from... libc Step #12 - "compile-honggfuzz-address-x86_64": checking size of long... 8 Step #12 - "compile-honggfuzz-address-x86_64": checking for struct user_regs_struct... yes Step #12 - "compile-honggfuzz-address-x86_64": checking clang option for 32-bit word size... -m32 Step #12 - "compile-honggfuzz-address-x86_64": checking for 64-bit host... yes Step #12 - "compile-honggfuzz-address-x86_64": checking whether clang -m32 makes executables we can run... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for flex... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for bison... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for gawk... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for bunzip2... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for zstd... no Step #12 - "compile-honggfuzz-address-x86_64": checking whether clang++ supports C++11 features with -std=c++11... yes Step #12 - "compile-honggfuzz-address-x86_64": checking for pthread_setname_np in -lpthread... yes Step #12 - "compile-honggfuzz-address-x86_64": checking that generated files are newer than configure... done Step #12 - "compile-honggfuzz-address-x86_64": configure: creating ./config.status Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating elfutils.spec Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating debuginfod/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating debuginfod/debuginfod.h Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating doc/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating lib/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libelf/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libebl/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libdwelf/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libdw/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libdwfl/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libcpu/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating libasm/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating backends/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating src/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating po/Makefile.in Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating tests/Makefile Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config/libelf.pc Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config/libdw.pc Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config/libdebuginfod.pc Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating version.h Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config/profile.sh Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config/profile.csh Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating config.h Step #12 - "compile-honggfuzz-address-x86_64": config.status: executing depfiles commands Step #12 - "compile-honggfuzz-address-x86_64": config.status: executing po-directories commands Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating po/POTFILES Step #12 - "compile-honggfuzz-address-x86_64": config.status: creating po/Makefile Step #12 - "compile-honggfuzz-address-x86_64": configure: Step #12 - "compile-honggfuzz-address-x86_64": ===================================================================== Step #12 - "compile-honggfuzz-address-x86_64": elfutils: 0.189 (eu_version: 189) Step #12 - "compile-honggfuzz-address-x86_64": ===================================================================== Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": Prefix : /usr/local Step #12 - "compile-honggfuzz-address-x86_64": Program prefix ("eu-" recommended) : eu- Step #12 - "compile-honggfuzz-address-x86_64": Source code location : . Step #12 - "compile-honggfuzz-address-x86_64": Maintainer mode : yes Step #12 - "compile-honggfuzz-address-x86_64": build arch : x86_64-pc-linux-gnu Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": CFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig Step #12 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": RECOMMENDED FEATURES (should all be yes) Step #12 - "compile-honggfuzz-address-x86_64": gzip support : yes Step #12 - "compile-honggfuzz-address-x86_64": bzip2 support : no Step #12 - "compile-honggfuzz-address-x86_64": lzma/xz support : no Step #12 - "compile-honggfuzz-address-x86_64": zstd support : no Step #12 - "compile-honggfuzz-address-x86_64": zstd compression support : no Step #12 - "compile-honggfuzz-address-x86_64": libstdc++ demangle support : no Step #12 - "compile-honggfuzz-address-x86_64": File textrel check : yes Step #12 - "compile-honggfuzz-address-x86_64": Symbol versioning : yes Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": NOT RECOMMENDED FEATURES (should all be no) Step #12 - "compile-honggfuzz-address-x86_64": Experimental thread safety : no Step #12 - "compile-honggfuzz-address-x86_64": install elf.h : no Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": OTHER FEATURES Step #12 - "compile-honggfuzz-address-x86_64": Deterministic archives by default : false Step #12 - "compile-honggfuzz-address-x86_64": Native language support : yes Step #12 - "compile-honggfuzz-address-x86_64": Extra Valgrind annotations : no Step #12 - "compile-honggfuzz-address-x86_64": libdebuginfod client support : no Step #12 - "compile-honggfuzz-address-x86_64": Debuginfod server support : no Step #12 - "compile-honggfuzz-address-x86_64": Default DEBUGINFOD_URLS : Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": EXTRA TEST FEATURES (used with make check) Step #12 - "compile-honggfuzz-address-x86_64": have bunzip2 installed (required) : yes Step #12 - "compile-honggfuzz-address-x86_64": have zstd installed : no Step #12 - "compile-honggfuzz-address-x86_64": C++11 : yes Step #12 - "compile-honggfuzz-address-x86_64": debug branch prediction : no Step #12 - "compile-honggfuzz-address-x86_64": gprof support : no Step #12 - "compile-honggfuzz-address-x86_64": gcov support : no Step #12 - "compile-honggfuzz-address-x86_64": run all tests under valgrind : no Step #12 - "compile-honggfuzz-address-x86_64": gcc undefined behaviour sanitizer : no Step #12 - "compile-honggfuzz-address-x86_64": gcc address sanitizer : no Step #12 - "compile-honggfuzz-address-x86_64": clang memory sanitizer : no Step #12 - "compile-honggfuzz-address-x86_64": use rpath in tests : no Step #12 - "compile-honggfuzz-address-x86_64": test biarch : yes Step #12 - "compile-honggfuzz-address-x86_64": Step #12 - "compile-honggfuzz-address-x86_64": ++ nproc Step #12 - "compile-honggfuzz-address-x86_64": + make -C config -j32 V=1 Step #12 - "compile-honggfuzz-address-x86_64": make: Entering directory '/src/libbpf/elfutils/config' Step #12 - "compile-honggfuzz-address-x86_64": make: Nothing to be done for 'all'. Step #12 - "compile-honggfuzz-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/config' Step #12 - "compile-honggfuzz-address-x86_64": ++ nproc Step #12 - "compile-honggfuzz-address-x86_64": + make -C lib -j32 V=1 Step #12 - "compile-honggfuzz-address-x86_64": make: Entering directory '/src/libbpf/elfutils/lib' Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT xasprintf.o -MD -MP -MF .deps/xasprintf.Tpo -c -o xasprintf.o xasprintf.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT xstrdup.o -MD -MP -MF .deps/xstrdup.Tpo -c -o xstrdup.o xstrdup.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT xstrndup.o -MD -MP -MF .deps/xstrndup.Tpo -c -o xstrndup.o xstrndup.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT xmalloc.o -MD -MP -MF .deps/xmalloc.Tpo -c -o xmalloc.o xmalloc.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT next_prime.o -MD -MP -MF .deps/next_prime.Tpo -c -o next_prime.o next_prime.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT crc32.o -MD -MP -MF .deps/crc32.Tpo -c -o crc32.o crc32.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT crc32_file.o -MD -MP -MF .deps/crc32_file.Tpo -c -o crc32_file.o crc32_file.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT color.o -MD -MP -MF .deps/color.Tpo -c -o color.o color.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT error.o -MD -MP -MF .deps/error.Tpo -c -o error.o error.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT printversion.o -MD -MP -MF .deps/printversion.Tpo -c -o printversion.o printversion.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/error.Tpo .deps/error.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/next_prime.Tpo .deps/next_prime.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/xstrdup.Tpo .deps/xstrdup.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/printversion.Tpo .deps/printversion.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/xstrndup.Tpo .deps/xstrndup.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/xmalloc.Tpo .deps/xmalloc.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/crc32.Tpo .deps/crc32.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/xasprintf.Tpo .deps/xasprintf.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/crc32_file.Tpo .deps/crc32_file.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/color.Tpo .deps/color.Po Step #12 - "compile-honggfuzz-address-x86_64": rm -f libeu.a Step #12 - "compile-honggfuzz-address-x86_64": ar cr libeu.a xasprintf.o xstrdup.o xstrndup.o xmalloc.o next_prime.o crc32.o crc32_file.o color.o error.o printversion.o Step #12 - "compile-honggfuzz-address-x86_64": ranlib libeu.a Step #12 - "compile-honggfuzz-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/lib' Step #12 - "compile-honggfuzz-address-x86_64": ++ nproc Step #12 - "compile-honggfuzz-address-x86_64": + make -C libelf -j32 V=1 Step #12 - "compile-honggfuzz-address-x86_64": make: Entering directory '/src/libbpf/elfutils/libelf' Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_version.o -MD -MP -MF .deps/elf_version.Tpo -c -o elf_version.o elf_version.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_hash.o -MD -MP -MF .deps/elf_hash.Tpo -c -o elf_hash.o elf_hash.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_error.o -MD -MP -MF .deps/elf_error.Tpo -c -o elf_error.o elf_error.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_fill.o -MD -MP -MF .deps/elf_fill.Tpo -c -o elf_fill.o elf_fill.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_begin.o -MD -MP -MF .deps/elf_begin.Tpo -c -o elf_begin.o elf_begin.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_next.o -MD -MP -MF .deps/elf_next.Tpo -c -o elf_next.o elf_next.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_rand.o -MD -MP -MF .deps/elf_rand.Tpo -c -o elf_rand.o elf_rand.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_end.o -MD -MP -MF .deps/elf_end.Tpo -c -o elf_end.o elf_end.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_kind.o -MD -MP -MF .deps/elf_kind.Tpo -c -o elf_kind.o elf_kind.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getclass.o -MD -MP -MF .deps/gelf_getclass.Tpo -c -o gelf_getclass.o gelf_getclass.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getbase.o -MD -MP -MF .deps/elf_getbase.Tpo -c -o elf_getbase.o elf_getbase.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getident.o -MD -MP -MF .deps/elf_getident.Tpo -c -o elf_getident.o elf_getident.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_fsize.o -MD -MP -MF .deps/elf32_fsize.Tpo -c -o elf32_fsize.o elf32_fsize.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_fsize.o -MD -MP -MF .deps/elf64_fsize.Tpo -c -o elf64_fsize.o elf64_fsize.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_fsize.o -MD -MP -MF .deps/gelf_fsize.Tpo -c -o gelf_fsize.o gelf_fsize.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_xlatetof.o -MD -MP -MF .deps/elf32_xlatetof.Tpo -c -o elf32_xlatetof.o elf32_xlatetof.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_xlatetom.o -MD -MP -MF .deps/elf32_xlatetom.Tpo -c -o elf32_xlatetom.o elf32_xlatetom.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_xlatetof.o -MD -MP -MF .deps/elf64_xlatetof.Tpo -c -o elf64_xlatetof.o elf64_xlatetof.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_xlatetom.o -MD -MP -MF .deps/elf64_xlatetom.Tpo -c -o elf64_xlatetom.o elf64_xlatetom.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_xlate.o -MD -MP -MF .deps/gelf_xlate.Tpo -c -o gelf_xlate.o gelf_xlate.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_getehdr.o -MD -MP -MF .deps/elf32_getehdr.Tpo -c -o elf32_getehdr.o elf32_getehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_getehdr.o -MD -MP -MF .deps/elf64_getehdr.Tpo -c -o elf64_getehdr.o elf64_getehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getehdr.o -MD -MP -MF .deps/gelf_getehdr.Tpo -c -o gelf_getehdr.o gelf_getehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_newehdr.o -MD -MP -MF .deps/elf32_newehdr.Tpo -c -o elf32_newehdr.o elf32_newehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_newehdr.o -MD -MP -MF .deps/elf64_newehdr.Tpo -c -o elf64_newehdr.o elf64_newehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_newehdr.o -MD -MP -MF .deps/gelf_newehdr.Tpo -c -o gelf_newehdr.o gelf_newehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_ehdr.o -MD -MP -MF .deps/gelf_update_ehdr.Tpo -c -o gelf_update_ehdr.o gelf_update_ehdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_getphdr.o -MD -MP -MF .deps/elf32_getphdr.Tpo -c -o elf32_getphdr.o elf32_getphdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_getphdr.o -MD -MP -MF .deps/elf64_getphdr.Tpo -c -o elf64_getphdr.o elf64_getphdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getphdr.o -MD -MP -MF .deps/gelf_getphdr.Tpo -c -o gelf_getphdr.o gelf_getphdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_newphdr.o -MD -MP -MF .deps/elf32_newphdr.Tpo -c -o elf32_newphdr.o elf32_newphdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_newphdr.o -MD -MP -MF .deps/elf64_newphdr.Tpo -c -o elf64_newphdr.o elf64_newphdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_fill.Tpo .deps/elf_fill.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_newphdr.o -MD -MP -MF .deps/gelf_newphdr.Tpo -c -o gelf_newphdr.o gelf_newphdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getident.Tpo .deps/elf_getident.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getbase.Tpo .deps/elf_getbase.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_kind.Tpo .deps/elf_kind.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_next.Tpo .deps/elf_next.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getclass.Tpo .deps/gelf_getclass.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_fsize.Tpo .deps/elf32_fsize.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_rand.Tpo .deps/elf_rand.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_fsize.Tpo .deps/elf64_fsize.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_phdr.o -MD -MP -MF .deps/gelf_update_phdr.Tpo -c -o gelf_update_phdr.o gelf_update_phdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getarhdr.o -MD -MP -MF .deps/elf_getarhdr.Tpo -c -o elf_getarhdr.o elf_getarhdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_version.Tpo .deps/elf_version.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getarsym.o -MD -MP -MF .deps/elf_getarsym.Tpo -c -o elf_getarsym.o elf_getarsym.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_rawfile.o -MD -MP -MF .deps/elf_rawfile.Tpo -c -o elf_rawfile.o elf_rawfile.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_readall.o -MD -MP -MF .deps/elf_readall.Tpo -c -o elf_readall.o elf_readall.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_cntl.o -MD -MP -MF .deps/elf_cntl.Tpo -c -o elf_cntl.o elf_cntl.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_hash.Tpo .deps/elf_hash.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getscn.o -MD -MP -MF .deps/elf_getscn.Tpo -c -o elf_getscn.o elf_getscn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_nextscn.o -MD -MP -MF .deps/elf_nextscn.Tpo -c -o elf_nextscn.o elf_nextscn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_ndxscn.o -MD -MP -MF .deps/elf_ndxscn.Tpo -c -o elf_ndxscn.o elf_ndxscn.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_newehdr.Tpo .deps/gelf_newehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_error.Tpo .deps/elf_error.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_fsize.Tpo .deps/gelf_fsize.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_newscn.o -MD -MP -MF .deps/elf_newscn.Tpo -c -o elf_newscn.o elf_newscn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_getshdr.o -MD -MP -MF .deps/elf32_getshdr.Tpo -c -o elf32_getshdr.o elf32_getshdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_getshdr.o -MD -MP -MF .deps/elf64_getshdr.Tpo -c -o elf64_getshdr.o elf64_getshdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getshdr.o -MD -MP -MF .deps/gelf_getshdr.Tpo -c -o gelf_getshdr.o gelf_getshdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_xlatetof.Tpo .deps/elf64_xlatetof.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_xlatetof.Tpo .deps/elf32_xlatetof.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_xlatetom.Tpo .deps/elf64_xlatetom.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_xlatetom.Tpo .deps/elf32_xlatetom.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_getehdr.Tpo .deps/elf32_getehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_getehdr.Tpo .deps/elf64_getehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_newehdr.Tpo .deps/elf32_newehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_newehdr.Tpo .deps/elf64_newehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_shdr.o -MD -MP -MF .deps/gelf_update_shdr.Tpo -c -o gelf_update_shdr.o gelf_update_shdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_strptr.o -MD -MP -MF .deps/elf_strptr.Tpo -c -o elf_strptr.o elf_strptr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_rawdata.o -MD -MP -MF .deps/elf_rawdata.Tpo -c -o elf_rawdata.o elf_rawdata.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getdata.o -MD -MP -MF .deps/elf_getdata.Tpo -c -o elf_getdata.o elf_getdata.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_newdata.o -MD -MP -MF .deps/elf_newdata.Tpo -c -o elf_newdata.o elf_newdata.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getdata_rawchunk.o -MD -MP -MF .deps/elf_getdata_rawchunk.Tpo -c -o elf_getdata_rawchunk.o elf_getdata_rawchunk.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_flagelf.o -MD -MP -MF .deps/elf_flagelf.Tpo -c -o elf_flagelf.o elf_flagelf.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_flagehdr.o -MD -MP -MF .deps/elf_flagehdr.Tpo -c -o elf_flagehdr.o elf_flagehdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getehdr.Tpo .deps/gelf_getehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_ehdr.Tpo .deps/gelf_update_ehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_flagphdr.o -MD -MP -MF .deps/elf_flagphdr.Tpo -c -o elf_flagphdr.o elf_flagphdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_flagscn.o -MD -MP -MF .deps/elf_flagscn.Tpo -c -o elf_flagscn.o elf_flagscn.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getphdr.Tpo .deps/gelf_getphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_flagshdr.o -MD -MP -MF .deps/elf_flagshdr.Tpo -c -o elf_flagshdr.o elf_flagshdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_end.Tpo .deps/elf_end.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_flagdata.o -MD -MP -MF .deps/elf_flagdata.Tpo -c -o elf_flagdata.o elf_flagdata.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_newphdr.Tpo .deps/elf32_newphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_newphdr.Tpo .deps/elf64_newphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_memory.o -MD -MP -MF .deps/elf_memory.Tpo -c -o elf_memory.o elf_memory.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_update.o -MD -MP -MF .deps/elf_update.Tpo -c -o elf_update.o elf_update.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_newphdr.Tpo .deps/gelf_newphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_updatenull.o -MD -MP -MF .deps/elf32_updatenull.Tpo -c -o elf32_updatenull.o elf32_updatenull.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getarhdr.Tpo .deps/elf_getarhdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_cntl.Tpo .deps/elf_cntl.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_rawfile.Tpo .deps/elf_rawfile.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_updatenull.o -MD -MP -MF .deps/elf64_updatenull.Tpo -c -o elf64_updatenull.o elf64_updatenull.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_ndxscn.Tpo .deps/elf_ndxscn.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_updatefile.o -MD -MP -MF .deps/elf32_updatefile.Tpo -c -o elf32_updatefile.o elf32_updatefile.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_nextscn.Tpo .deps/elf_nextscn.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_updatefile.o -MD -MP -MF .deps/elf64_updatefile.Tpo -c -o elf64_updatefile.o elf64_updatefile.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getsym.o -MD -MP -MF .deps/gelf_getsym.Tpo -c -o gelf_getsym.o gelf_getsym.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_sym.o -MD -MP -MF .deps/gelf_update_sym.Tpo -c -o gelf_update_sym.o gelf_update_sym.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getscn.Tpo .deps/elf_getscn.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_getphdr.Tpo .deps/elf32_getphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_getphdr.Tpo .deps/elf64_getphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_phdr.Tpo .deps/gelf_update_phdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_newscn.Tpo .deps/elf_newscn.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getshdr.Tpo .deps/gelf_getshdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_newdata.Tpo .deps/elf_newdata.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_flagelf.Tpo .deps/elf_flagelf.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_flagehdr.Tpo .deps/elf_flagehdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_flagphdr.Tpo .deps/elf_flagphdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_shdr.Tpo .deps/gelf_update_shdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getversym.o -MD -MP -MF .deps/gelf_getversym.Tpo -c -o gelf_getversym.o gelf_getversym.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getverneed.o -MD -MP -MF .deps/gelf_getverneed.Tpo -c -o gelf_getverneed.o gelf_getverneed.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getvernaux.o -MD -MP -MF .deps/gelf_getvernaux.Tpo -c -o gelf_getvernaux.o gelf_getvernaux.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getverdef.o -MD -MP -MF .deps/gelf_getverdef.Tpo -c -o gelf_getverdef.o gelf_getverdef.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getverdaux.o -MD -MP -MF .deps/gelf_getverdaux.Tpo -c -o gelf_getverdaux.o gelf_getverdaux.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getrel.o -MD -MP -MF .deps/gelf_getrel.Tpo -c -o gelf_getrel.o gelf_getrel.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getrela.o -MD -MP -MF .deps/gelf_getrela.Tpo -c -o gelf_getrela.o gelf_getrela.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_rel.o -MD -MP -MF .deps/gelf_update_rel.Tpo -c -o gelf_update_rel.o gelf_update_rel.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_rela.o -MD -MP -MF .deps/gelf_update_rela.Tpo -c -o gelf_update_rela.o gelf_update_rela.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getdyn.o -MD -MP -MF .deps/gelf_getdyn.Tpo -c -o gelf_getdyn.o gelf_getdyn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_dyn.o -MD -MP -MF .deps/gelf_update_dyn.Tpo -c -o gelf_update_dyn.o gelf_update_dyn.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_flagscn.Tpo .deps/elf_flagscn.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_flagshdr.Tpo .deps/elf_flagshdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_readall.Tpo .deps/elf_readall.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_rawdata.Tpo .deps/elf_rawdata.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getmove.o -MD -MP -MF .deps/gelf_getmove.Tpo -c -o gelf_getmove.o gelf_getmove.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_flagdata.Tpo .deps/elf_flagdata.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_move.o -MD -MP -MF .deps/gelf_update_move.Tpo -c -o gelf_update_move.o gelf_update_move.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_memory.Tpo .deps/elf_memory.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getsyminfo.o -MD -MP -MF .deps/gelf_getsyminfo.Tpo -c -o gelf_getsyminfo.o gelf_getsyminfo.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_syminfo.o -MD -MP -MF .deps/gelf_update_syminfo.Tpo -c -o gelf_update_syminfo.o gelf_update_syminfo.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getauxv.o -MD -MP -MF .deps/gelf_getauxv.Tpo -c -o gelf_getauxv.o gelf_getauxv.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_auxv.o -MD -MP -MF .deps/gelf_update_auxv.Tpo -c -o gelf_update_auxv.o gelf_update_auxv.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getdata_rawchunk.Tpo .deps/elf_getdata_rawchunk.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_strptr.Tpo .deps/elf_strptr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getnote.o -MD -MP -MF .deps/gelf_getnote.Tpo -c -o gelf_getnote.o gelf_getnote.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getsym.Tpo .deps/gelf_getsym.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_xlatetof.o -MD -MP -MF .deps/gelf_xlatetof.Tpo -c -o gelf_xlatetof.o gelf_xlatetof.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_sym.Tpo .deps/gelf_update_sym.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_xlatetom.o -MD -MP -MF .deps/gelf_xlatetom.Tpo -c -o gelf_xlatetom.o gelf_xlatetom.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT nlist.o -MD -MP -MF .deps/nlist.Tpo -c -o nlist.o nlist.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getarsym.Tpo .deps/elf_getarsym.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getsymshndx.o -MD -MP -MF .deps/gelf_getsymshndx.Tpo -c -o gelf_getsymshndx.o gelf_getsymshndx.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_update.Tpo .deps/elf_update.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getversym.Tpo .deps/gelf_getversym.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getverneed.Tpo .deps/gelf_getverneed.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_symshndx.o -MD -MP -MF .deps/gelf_update_symshndx.Tpo -c -o gelf_update_symshndx.o gelf_update_symshndx.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_versym.o -MD -MP -MF .deps/gelf_update_versym.Tpo -c -o gelf_update_versym.o gelf_update_versym.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getverdef.Tpo .deps/gelf_getverdef.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getverdaux.Tpo .deps/gelf_getverdaux.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getvernaux.Tpo .deps/gelf_getvernaux.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_getshdr.Tpo .deps/elf64_getshdr.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_verneed.o -MD -MP -MF .deps/gelf_update_verneed.Tpo -c -o gelf_update_verneed.o gelf_update_verneed.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getrel.Tpo .deps/gelf_getrel.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_vernaux.o -MD -MP -MF .deps/gelf_update_vernaux.Tpo -c -o gelf_update_vernaux.o gelf_update_vernaux.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_verdef.o -MD -MP -MF .deps/gelf_update_verdef.Tpo -c -o gelf_update_verdef.o gelf_update_verdef.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_verdaux.o -MD -MP -MF .deps/gelf_update_verdaux.Tpo -c -o gelf_update_verdaux.o gelf_update_verdaux.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getrela.Tpo .deps/gelf_getrela.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_getshdr.Tpo .deps/elf32_getshdr.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getdyn.Tpo .deps/gelf_getdyn.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getphdrnum.o -MD -MP -MF .deps/elf_getphdrnum.Tpo -c -o elf_getphdrnum.o elf_getphdrnum.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_rel.Tpo .deps/gelf_update_rel.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getshdrnum.o -MD -MP -MF .deps/elf_getshdrnum.Tpo -c -o elf_getshdrnum.o elf_getshdrnum.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getshdrstrndx.o -MD -MP -MF .deps/elf_getshdrstrndx.Tpo -c -o elf_getshdrstrndx.o elf_getshdrstrndx.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_checksum.o -MD -MP -MF .deps/gelf_checksum.Tpo -c -o gelf_checksum.o gelf_checksum.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_rela.Tpo .deps/gelf_update_rela.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_checksum.o -MD -MP -MF .deps/elf32_checksum.Tpo -c -o elf32_checksum.o elf32_checksum.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_move.Tpo .deps/gelf_update_move.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_checksum.o -MD -MP -MF .deps/elf64_checksum.Tpo -c -o elf64_checksum.o elf64_checksum.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT libelf_crc32.o -MD -MP -MF .deps/libelf_crc32.Tpo -c -o libelf_crc32.o libelf_crc32.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getmove.Tpo .deps/gelf_getmove.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_dyn.Tpo .deps/gelf_update_dyn.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getsyminfo.Tpo .deps/gelf_getsyminfo.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_syminfo.Tpo .deps/gelf_update_syminfo.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getauxv.Tpo .deps/gelf_getauxv.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_auxv.Tpo .deps/gelf_update_auxv.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT libelf_next_prime.o -MD -MP -MF .deps/libelf_next_prime.Tpo -c -o libelf_next_prime.o libelf_next_prime.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_clone.o -MD -MP -MF .deps/elf_clone.Tpo -c -o elf_clone.o elf_clone.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getlib.o -MD -MP -MF .deps/gelf_getlib.Tpo -c -o gelf_getlib.o gelf_getlib.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_update_lib.o -MD -MP -MF .deps/gelf_update_lib.Tpo -c -o gelf_update_lib.o gelf_update_lib.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getdata.Tpo .deps/elf_getdata.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_offscn.o -MD -MP -MF .deps/elf32_offscn.Tpo -c -o elf32_offscn.o elf32_offscn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_offscn.o -MD -MP -MF .deps/elf64_offscn.Tpo -c -o elf64_offscn.o elf64_offscn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_offscn.o -MD -MP -MF .deps/gelf_offscn.Tpo -c -o gelf_offscn.o gelf_offscn.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_getaroff.o -MD -MP -MF .deps/elf_getaroff.Tpo -c -o elf_getaroff.o elf_getaroff.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_xlatetom.Tpo .deps/gelf_xlatetom.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_xlatetof.Tpo .deps/gelf_xlatetof.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_gnu_hash.o -MD -MP -MF .deps/elf_gnu_hash.Tpo -c -o elf_gnu_hash.o elf_gnu_hash.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_scnshndx.o -MD -MP -MF .deps/elf_scnshndx.Tpo -c -o elf_scnshndx.o elf_scnshndx.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getnote.Tpo .deps/gelf_getnote.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_versym.Tpo .deps/gelf_update_versym.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_vernaux.Tpo .deps/gelf_update_vernaux.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_verneed.Tpo .deps/gelf_update_verneed.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_verdef.Tpo .deps/gelf_update_verdef.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_verdaux.Tpo .deps/gelf_update_verdaux.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getshdrnum.Tpo .deps/elf_getshdrnum.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/libelf_crc32.Tpo .deps/libelf_crc32.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getsymshndx.Tpo .deps/gelf_getsymshndx.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/libelf_next_prime.Tpo .deps/libelf_next_prime.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf32_getchdr.o -MD -MP -MF .deps/elf32_getchdr.Tpo -c -o elf32_getchdr.o elf32_getchdr.c Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_checksum.Tpo .deps/gelf_checksum.Po Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf64_getchdr.o -MD -MP -MF .deps/elf64_getchdr.Tpo -c -o elf64_getchdr.o elf64_getchdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT gelf_getchdr.o -MD -MP -MF .deps/gelf_getchdr.Tpo -c -o gelf_getchdr.o gelf_getchdr.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_compress.o -MD -MP -MF .deps/elf_compress.Tpo -c -o elf_compress.o elf_compress.c Step #12 - "compile-honggfuzz-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -MT elf_compress_gnu.o -MD -MP -MF .deps/elf_compress_gnu.Tpo -c -o elf_compress_gnu.o elf_compress_gnu.c Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_version.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_version.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_version.Tpo" `test -f 'elf_version.c' || echo './'`elf_version.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_version.Tpo" >> ".deps/elf_version.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_version.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_version.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_hash.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_hash.Tpo" `test -f 'elf_hash.c' || echo './'`elf_hash.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_hash.Tpo" >> ".deps/elf_hash.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_hash.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_hash.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_error.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_error.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_error.Tpo" `test -f 'elf_error.c' || echo './'`elf_error.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_error.Tpo" >> ".deps/elf_error.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_error.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_error.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_fill.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_fill.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_fill.Tpo" `test -f 'elf_fill.c' || echo './'`elf_fill.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_fill.Tpo" >> ".deps/elf_fill.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_fill.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_fill.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_next.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_next.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_next.Tpo" `test -f 'elf_next.c' || echo './'`elf_next.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_next.Tpo" >> ".deps/elf_next.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_next.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_next.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_rand.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rand.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_rand.Tpo" `test -f 'elf_rand.c' || echo './'`elf_rand.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_rand.Tpo" >> ".deps/elf_rand.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_rand.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_rand.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_symshndx.Tpo .deps/gelf_update_symshndx.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_end.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_end.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_end.Tpo" `test -f 'elf_end.c' || echo './'`elf_end.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_end.Tpo" >> ".deps/elf_end.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_end.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_end.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_checksum.Tpo .deps/elf64_checksum.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getlib.Tpo .deps/gelf_getlib.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_kind.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_kind.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_kind.Tpo" `test -f 'elf_kind.c' || echo './'`elf_kind.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_kind.Tpo" >> ".deps/elf_kind.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_kind.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_kind.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_checksum.Tpo .deps/elf32_checksum.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getclass.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getclass.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getclass.Tpo" `test -f 'gelf_getclass.c' || echo './'`gelf_getclass.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getclass.Tpo" >> ".deps/gelf_getclass.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getclass.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getclass.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getphdrnum.Tpo .deps/elf_getphdrnum.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_update_lib.Tpo .deps/gelf_update_lib.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_offscn.Tpo .deps/gelf_offscn.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getbase.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getbase.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getbase.Tpo" `test -f 'elf_getbase.c' || echo './'`elf_getbase.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getbase.Tpo" >> ".deps/elf_getbase.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getbase.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getbase.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getident.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getident.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getident.Tpo" `test -f 'elf_getident.c' || echo './'`elf_getident.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getident.Tpo" >> ".deps/elf_getident.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getident.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getident.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getaroff.Tpo .deps/elf_getaroff.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_fsize.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_fsize.Tpo" `test -f 'elf32_fsize.c' || echo './'`elf32_fsize.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_fsize.Tpo" >> ".deps/elf32_fsize.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_fsize.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_fsize.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_fsize.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_fsize.Tpo" `test -f 'elf64_fsize.c' || echo './'`elf64_fsize.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_fsize.Tpo" >> ".deps/elf64_fsize.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_fsize.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_fsize.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_clone.Tpo .deps/elf_clone.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_offscn.Tpo .deps/elf32_offscn.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_fsize.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_fsize.Tpo" `test -f 'gelf_fsize.c' || echo './'`gelf_fsize.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_fsize.Tpo" >> ".deps/gelf_fsize.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_fsize.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_fsize.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetof.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_xlatetof.Tpo" `test -f 'elf32_xlatetof.c' || echo './'`elf32_xlatetof.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_xlatetof.Tpo" >> ".deps/elf32_xlatetof.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_xlatetof.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_xlatetof.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetom.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_xlatetom.Tpo" `test -f 'elf32_xlatetom.c' || echo './'`elf32_xlatetom.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_xlatetom.Tpo" >> ".deps/elf32_xlatetom.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_xlatetom.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_xlatetom.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_offscn.Tpo .deps/elf64_offscn.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/nlist.Tpo .deps/nlist.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetof.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_xlatetof.Tpo" `test -f 'elf64_xlatetof.c' || echo './'`elf64_xlatetof.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_xlatetof.Tpo" >> ".deps/elf64_xlatetof.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_xlatetof.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_xlatetof.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_gnu_hash.Tpo .deps/elf_gnu_hash.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_getshdrstrndx.Tpo .deps/elf_getshdrstrndx.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_scnshndx.Tpo .deps/elf_scnshndx.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetom.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_xlatetom.Tpo" `test -f 'elf64_xlatetom.c' || echo './'`elf64_xlatetom.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_xlatetom.Tpo" >> ".deps/elf64_xlatetom.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_xlatetom.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_xlatetom.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_getehdr.Tpo" `test -f 'elf32_getehdr.c' || echo './'`elf32_getehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_getehdr.Tpo" >> ".deps/elf32_getehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_getehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_getehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_getehdr.Tpo" `test -f 'elf64_getehdr.c' || echo './'`elf64_getehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_getehdr.Tpo" >> ".deps/elf64_getehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_getehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_getehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getehdr.Tpo" `test -f 'gelf_getehdr.c' || echo './'`gelf_getehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getehdr.Tpo" >> ".deps/gelf_getehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_getchdr.Tpo .deps/elf32_getchdr.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_newehdr.Tpo" `test -f 'elf32_newehdr.c' || echo './'`elf32_newehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_newehdr.Tpo" >> ".deps/elf32_newehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_newehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_newehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_newehdr.Tpo" `test -f 'elf64_newehdr.c' || echo './'`elf64_newehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_newehdr.Tpo" >> ".deps/elf64_newehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_newehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_newehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_newehdr.Tpo" `test -f 'gelf_newehdr.c' || echo './'`gelf_newehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_newehdr.Tpo" >> ".deps/gelf_newehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_newehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_newehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_getchdr.Tpo .deps/elf64_getchdr.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_ehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_ehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_ehdr.Tpo" `test -f 'gelf_update_ehdr.c' || echo './'`gelf_update_ehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_ehdr.Tpo" >> ".deps/gelf_update_ehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_ehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_ehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_updatenull.Tpo .deps/elf64_updatenull.Po Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_getchdr.Tpo .deps/gelf_getchdr.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_getphdr.Tpo" `test -f 'elf32_getphdr.c' || echo './'`elf32_getphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_getphdr.Tpo" >> ".deps/elf32_getphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_getphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_getphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_getphdr.Tpo" `test -f 'elf64_getphdr.c' || echo './'`elf64_getphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_getphdr.Tpo" >> ".deps/elf64_getphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_getphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_getphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_updatenull.Tpo .deps/elf32_updatenull.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getphdr.Tpo" `test -f 'gelf_getphdr.c' || echo './'`gelf_getphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getphdr.Tpo" >> ".deps/gelf_getphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_newphdr.Tpo" `test -f 'elf32_newphdr.c' || echo './'`elf32_newphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_newphdr.Tpo" >> ".deps/elf32_newphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_newphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_newphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_newphdr.Tpo" `test -f 'elf64_newphdr.c' || echo './'`elf64_newphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_newphdr.Tpo" >> ".deps/elf64_newphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_newphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_newphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_newphdr.Tpo" `test -f 'gelf_newphdr.c' || echo './'`gelf_newphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_newphdr.Tpo" >> ".deps/gelf_newphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_newphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_newphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_phdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_phdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_phdr.Tpo" `test -f 'gelf_update_phdr.c' || echo './'`gelf_update_phdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_phdr.Tpo" >> ".deps/gelf_update_phdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_phdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_phdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getarhdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarhdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getarhdr.Tpo" `test -f 'elf_getarhdr.c' || echo './'`elf_getarhdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getarhdr.Tpo" >> ".deps/elf_getarhdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getarhdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getarhdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getarsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarsym.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getarsym.Tpo" `test -f 'elf_getarsym.c' || echo './'`elf_getarsym.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getarsym.Tpo" >> ".deps/elf_getarsym.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getarsym.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getarsym.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_rawfile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawfile.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_rawfile.Tpo" `test -f 'elf_rawfile.c' || echo './'`elf_rawfile.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_rawfile.Tpo" >> ".deps/elf_rawfile.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_rawfile.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_rawfile.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_readall.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_readall.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_readall.Tpo" `test -f 'elf_readall.c' || echo './'`elf_readall.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_readall.Tpo" >> ".deps/elf_readall.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_readall.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_readall.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_cntl.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_cntl.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_cntl.Tpo" `test -f 'elf_cntl.c' || echo './'`elf_cntl.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_cntl.Tpo" >> ".deps/elf_cntl.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_cntl.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_cntl.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_compress_gnu.Tpo .deps/elf_compress_gnu.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getscn.Tpo" `test -f 'elf_getscn.c' || echo './'`elf_getscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getscn.Tpo" >> ".deps/elf_getscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_nextscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_nextscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_nextscn.Tpo" `test -f 'elf_nextscn.c' || echo './'`elf_nextscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_nextscn.Tpo" >> ".deps/elf_nextscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_nextscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_nextscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_ndxscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_ndxscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_ndxscn.Tpo" `test -f 'elf_ndxscn.c' || echo './'`elf_ndxscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_ndxscn.Tpo" >> ".deps/elf_ndxscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_ndxscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_ndxscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_newscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_newscn.Tpo" `test -f 'elf_newscn.c' || echo './'`elf_newscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_newscn.Tpo" >> ".deps/elf_newscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_newscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_newscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getshdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_getshdr.Tpo" `test -f 'elf32_getshdr.c' || echo './'`elf32_getshdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_getshdr.Tpo" >> ".deps/elf32_getshdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_getshdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_getshdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getshdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_getshdr.Tpo" `test -f 'elf64_getshdr.c' || echo './'`elf64_getshdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_getshdr.Tpo" >> ".deps/elf64_getshdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_getshdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_getshdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getshdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getshdr.Tpo" `test -f 'gelf_getshdr.c' || echo './'`gelf_getshdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getshdr.Tpo" >> ".deps/gelf_getshdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getshdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getshdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_shdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_shdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_shdr.Tpo" `test -f 'gelf_update_shdr.c' || echo './'`gelf_update_shdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_shdr.Tpo" >> ".deps/gelf_update_shdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_shdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_shdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_strptr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_strptr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_strptr.Tpo" `test -f 'elf_strptr.c' || echo './'`elf_strptr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_strptr.Tpo" >> ".deps/elf_strptr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_strptr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_strptr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_rawdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawdata.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_rawdata.Tpo" `test -f 'elf_rawdata.c' || echo './'`elf_rawdata.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_rawdata.Tpo" >> ".deps/elf_rawdata.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_rawdata.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_rawdata.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getdata.Tpo" `test -f 'elf_getdata.c' || echo './'`elf_getdata.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getdata.Tpo" >> ".deps/elf_getdata.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getdata.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getdata.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_newdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newdata.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_newdata.Tpo" `test -f 'elf_newdata.c' || echo './'`elf_newdata.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_newdata.Tpo" >> ".deps/elf_newdata.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_newdata.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_newdata.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getdata_rawchunk.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata_rawchunk.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getdata_rawchunk.Tpo" `test -f 'elf_getdata_rawchunk.c' || echo './'`elf_getdata_rawchunk.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getdata_rawchunk.Tpo" >> ".deps/elf_getdata_rawchunk.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getdata_rawchunk.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getdata_rawchunk.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_flagelf.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagelf.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_flagelf.Tpo" `test -f 'elf_flagelf.c' || echo './'`elf_flagelf.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_flagelf.Tpo" >> ".deps/elf_flagelf.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_flagelf.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_flagelf.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_flagehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagehdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_flagehdr.Tpo" `test -f 'elf_flagehdr.c' || echo './'`elf_flagehdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_flagehdr.Tpo" >> ".deps/elf_flagehdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_flagehdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_flagehdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_begin.Tpo .deps/elf_begin.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_flagphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagphdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_flagphdr.Tpo" `test -f 'elf_flagphdr.c' || echo './'`elf_flagphdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_flagphdr.Tpo" >> ".deps/elf_flagphdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_flagphdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_flagphdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_flagscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_flagscn.Tpo" `test -f 'elf_flagscn.c' || echo './'`elf_flagscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_flagscn.Tpo" >> ".deps/elf_flagscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_flagscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_flagscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_flagshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagshdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_flagshdr.Tpo" `test -f 'elf_flagshdr.c' || echo './'`elf_flagshdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_flagshdr.Tpo" >> ".deps/elf_flagshdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_flagshdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_flagshdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_flagdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagdata.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_flagdata.Tpo" `test -f 'elf_flagdata.c' || echo './'`elf_flagdata.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_flagdata.Tpo" >> ".deps/elf_flagdata.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_flagdata.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_flagdata.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_memory.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_memory.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_memory.Tpo" `test -f 'elf_memory.c' || echo './'`elf_memory.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_memory.Tpo" >> ".deps/elf_memory.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_memory.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_memory.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_update.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_update.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_update.Tpo" `test -f 'elf_update.c' || echo './'`elf_update.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_update.Tpo" >> ".deps/elf_update.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_update.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_update.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatenull.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_updatenull.Tpo" `test -f 'elf32_updatenull.c' || echo './'`elf32_updatenull.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_updatenull.Tpo" >> ".deps/elf32_updatenull.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_updatenull.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_updatenull.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatenull.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_updatenull.Tpo" `test -f 'elf64_updatenull.c' || echo './'`elf64_updatenull.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_updatenull.Tpo" >> ".deps/elf64_updatenull.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_updatenull.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_updatenull.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsym.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getsym.Tpo" `test -f 'gelf_getsym.c' || echo './'`gelf_getsym.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getsym.Tpo" >> ".deps/gelf_getsym.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getsym.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getsym.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_sym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_sym.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_sym.Tpo" `test -f 'gelf_update_sym.c' || echo './'`gelf_update_sym.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_sym.Tpo" >> ".deps/gelf_update_sym.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_sym.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_sym.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getversym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getversym.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getversym.Tpo" `test -f 'gelf_getversym.c' || echo './'`gelf_getversym.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getversym.Tpo" >> ".deps/gelf_getversym.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getversym.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getversym.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf64_updatefile.Tpo .deps/elf64_updatefile.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getverneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverneed.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getverneed.Tpo" `test -f 'gelf_getverneed.c' || echo './'`gelf_getverneed.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getverneed.Tpo" >> ".deps/gelf_getverneed.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getverneed.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getverneed.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getvernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getvernaux.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getvernaux.Tpo" `test -f 'gelf_getvernaux.c' || echo './'`gelf_getvernaux.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getvernaux.Tpo" >> ".deps/gelf_getvernaux.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getvernaux.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getvernaux.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getverdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdef.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getverdef.Tpo" `test -f 'gelf_getverdef.c' || echo './'`gelf_getverdef.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getverdef.Tpo" >> ".deps/gelf_getverdef.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getverdef.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getverdef.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getverdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdaux.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getverdaux.Tpo" `test -f 'gelf_getverdaux.c' || echo './'`gelf_getverdaux.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getverdaux.Tpo" >> ".deps/gelf_getverdaux.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getverdaux.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getverdaux.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getrel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrel.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getrel.Tpo" `test -f 'gelf_getrel.c' || echo './'`gelf_getrel.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getrel.Tpo" >> ".deps/gelf_getrel.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getrel.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getrel.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getrela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrela.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getrela.Tpo" `test -f 'gelf_getrela.c' || echo './'`gelf_getrela.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getrela.Tpo" >> ".deps/gelf_getrela.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getrela.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getrela.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_rel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rel.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_rel.Tpo" `test -f 'gelf_update_rel.c' || echo './'`gelf_update_rel.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_rel.Tpo" >> ".deps/gelf_update_rel.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_rel.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_rel.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_rela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rela.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_rela.Tpo" `test -f 'gelf_update_rela.c' || echo './'`gelf_update_rela.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_rela.Tpo" >> ".deps/gelf_update_rela.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_rela.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_rela.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf_compress.Tpo .deps/elf_compress.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getdyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getdyn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getdyn.Tpo" `test -f 'gelf_getdyn.c' || echo './'`gelf_getdyn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getdyn.Tpo" >> ".deps/gelf_getdyn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getdyn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getdyn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_dyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_dyn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_dyn.Tpo" `test -f 'gelf_update_dyn.c' || echo './'`gelf_update_dyn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_dyn.Tpo" >> ".deps/gelf_update_dyn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_dyn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_dyn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getmove.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getmove.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getmove.Tpo" `test -f 'gelf_getmove.c' || echo './'`gelf_getmove.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getmove.Tpo" >> ".deps/gelf_getmove.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getmove.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getmove.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_move.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_move.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_move.Tpo" `test -f 'gelf_update_move.c' || echo './'`gelf_update_move.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_move.Tpo" >> ".deps/gelf_update_move.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_move.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_move.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getsyminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsyminfo.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getsyminfo.Tpo" `test -f 'gelf_getsyminfo.c' || echo './'`gelf_getsyminfo.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getsyminfo.Tpo" >> ".deps/gelf_getsyminfo.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getsyminfo.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getsyminfo.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_syminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_syminfo.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_syminfo.Tpo" `test -f 'gelf_update_syminfo.c' || echo './'`gelf_update_syminfo.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_syminfo.Tpo" >> ".deps/gelf_update_syminfo.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_syminfo.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_syminfo.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/elf32_updatefile.Tpo .deps/elf32_updatefile.Po Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getauxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getauxv.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getauxv.Tpo" `test -f 'gelf_getauxv.c' || echo './'`gelf_getauxv.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getauxv.Tpo" >> ".deps/gelf_getauxv.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getauxv.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getauxv.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_auxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_auxv.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_auxv.Tpo" `test -f 'gelf_update_auxv.c' || echo './'`gelf_update_auxv.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_auxv.Tpo" >> ".deps/gelf_update_auxv.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_auxv.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_auxv.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getnote.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getnote.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getnote.Tpo" `test -f 'gelf_getnote.c' || echo './'`gelf_getnote.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getnote.Tpo" >> ".deps/gelf_getnote.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getnote.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getnote.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetof.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_xlatetof.Tpo" `test -f 'gelf_xlatetof.c' || echo './'`gelf_xlatetof.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_xlatetof.Tpo" >> ".deps/gelf_xlatetof.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_xlatetof.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_xlatetof.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetom.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_xlatetom.Tpo" `test -f 'gelf_xlatetom.c' || echo './'`gelf_xlatetom.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_xlatetom.Tpo" >> ".deps/gelf_xlatetom.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_xlatetom.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_xlatetom.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o nlist.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT nlist.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/nlist.Tpo" `test -f 'nlist.c' || echo './'`nlist.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/nlist.Tpo" >> ".deps/nlist.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/nlist.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/nlist.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getsymshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsymshndx.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getsymshndx.Tpo" `test -f 'gelf_getsymshndx.c' || echo './'`gelf_getsymshndx.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getsymshndx.Tpo" >> ".deps/gelf_getsymshndx.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getsymshndx.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getsymshndx.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_symshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_symshndx.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_symshndx.Tpo" `test -f 'gelf_update_symshndx.c' || echo './'`gelf_update_symshndx.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_symshndx.Tpo" >> ".deps/gelf_update_symshndx.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_symshndx.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_symshndx.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_versym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_versym.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_versym.Tpo" `test -f 'gelf_update_versym.c' || echo './'`gelf_update_versym.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_versym.Tpo" >> ".deps/gelf_update_versym.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_versym.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_versym.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_verneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verneed.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_verneed.Tpo" `test -f 'gelf_update_verneed.c' || echo './'`gelf_update_verneed.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_verneed.Tpo" >> ".deps/gelf_update_verneed.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_verneed.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_verneed.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_vernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_vernaux.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_vernaux.Tpo" `test -f 'gelf_update_vernaux.c' || echo './'`gelf_update_vernaux.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_vernaux.Tpo" >> ".deps/gelf_update_vernaux.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_vernaux.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_vernaux.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_verdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdef.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_verdef.Tpo" `test -f 'gelf_update_verdef.c' || echo './'`gelf_update_verdef.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_verdef.Tpo" >> ".deps/gelf_update_verdef.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_verdef.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_verdef.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_verdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdaux.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_verdaux.Tpo" `test -f 'gelf_update_verdaux.c' || echo './'`gelf_update_verdaux.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_verdaux.Tpo" >> ".deps/gelf_update_verdaux.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_verdaux.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_verdaux.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getphdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getphdrnum.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getphdrnum.Tpo" `test -f 'elf_getphdrnum.c' || echo './'`elf_getphdrnum.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getphdrnum.Tpo" >> ".deps/elf_getphdrnum.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getphdrnum.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getphdrnum.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getshdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrnum.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getshdrnum.Tpo" `test -f 'elf_getshdrnum.c' || echo './'`elf_getshdrnum.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getshdrnum.Tpo" >> ".deps/elf_getshdrnum.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getshdrnum.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getshdrnum.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getshdrstrndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrstrndx.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getshdrstrndx.Tpo" `test -f 'elf_getshdrstrndx.c' || echo './'`elf_getshdrstrndx.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getshdrstrndx.Tpo" >> ".deps/elf_getshdrstrndx.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getshdrstrndx.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getshdrstrndx.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_checksum.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_checksum.Tpo" `test -f 'gelf_checksum.c' || echo './'`gelf_checksum.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_checksum.Tpo" >> ".deps/gelf_checksum.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_checksum.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_checksum.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_checksum.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_checksum.Tpo" `test -f 'elf32_checksum.c' || echo './'`elf32_checksum.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_checksum.Tpo" >> ".deps/elf32_checksum.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_checksum.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_checksum.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_checksum.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_checksum.Tpo" `test -f 'elf64_checksum.c' || echo './'`elf64_checksum.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_checksum.Tpo" >> ".deps/elf64_checksum.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_checksum.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_checksum.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o libelf_crc32.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_crc32.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/libelf_crc32.Tpo" `test -f 'libelf_crc32.c' || echo './'`libelf_crc32.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/libelf_crc32.Tpo" >> ".deps/libelf_crc32.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/libelf_crc32.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/libelf_crc32.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o libelf_next_prime.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_next_prime.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/libelf_next_prime.Tpo" `test -f 'libelf_next_prime.c' || echo './'`libelf_next_prime.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/libelf_next_prime.Tpo" >> ".deps/libelf_next_prime.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/libelf_next_prime.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/libelf_next_prime.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_clone.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_clone.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_clone.Tpo" `test -f 'elf_clone.c' || echo './'`elf_clone.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_clone.Tpo" >> ".deps/elf_clone.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_clone.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_clone.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getlib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getlib.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getlib.Tpo" `test -f 'gelf_getlib.c' || echo './'`gelf_getlib.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getlib.Tpo" >> ".deps/gelf_getlib.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getlib.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getlib.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_update_lib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_lib.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_update_lib.Tpo" `test -f 'gelf_update_lib.c' || echo './'`gelf_update_lib.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_update_lib.Tpo" >> ".deps/gelf_update_lib.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_update_lib.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_update_lib.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_offscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_offscn.Tpo" `test -f 'elf32_offscn.c' || echo './'`elf32_offscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_offscn.Tpo" >> ".deps/elf32_offscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_offscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_offscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_offscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_offscn.Tpo" `test -f 'elf64_offscn.c' || echo './'`elf64_offscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_offscn.Tpo" >> ".deps/elf64_offscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_offscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_offscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_offscn.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_offscn.Tpo" `test -f 'gelf_offscn.c' || echo './'`gelf_offscn.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_offscn.Tpo" >> ".deps/gelf_offscn.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_offscn.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_offscn.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_getaroff.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getaroff.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_getaroff.Tpo" `test -f 'elf_getaroff.c' || echo './'`elf_getaroff.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_getaroff.Tpo" >> ".deps/elf_getaroff.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_getaroff.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_getaroff.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_gnu_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_gnu_hash.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_gnu_hash.Tpo" `test -f 'elf_gnu_hash.c' || echo './'`elf_gnu_hash.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_gnu_hash.Tpo" >> ".deps/elf_gnu_hash.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_gnu_hash.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_gnu_hash.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_scnshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_scnshndx.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_scnshndx.Tpo" `test -f 'elf_scnshndx.c' || echo './'`elf_scnshndx.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_scnshndx.Tpo" >> ".deps/elf_scnshndx.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_scnshndx.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_scnshndx.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getchdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_getchdr.Tpo" `test -f 'elf32_getchdr.c' || echo './'`elf32_getchdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_getchdr.Tpo" >> ".deps/elf32_getchdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_getchdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_getchdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getchdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_getchdr.Tpo" `test -f 'elf64_getchdr.c' || echo './'`elf64_getchdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_getchdr.Tpo" >> ".deps/elf64_getchdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_getchdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_getchdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getchdr.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_getchdr.Tpo" `test -f 'gelf_getchdr.c' || echo './'`gelf_getchdr.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_getchdr.Tpo" >> ".deps/gelf_getchdr.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_getchdr.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_getchdr.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_compress.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_compress.Tpo" `test -f 'elf_compress.c' || echo './'`elf_compress.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_compress.Tpo" >> ".deps/elf_compress.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_compress.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_compress.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_compress_gnu.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress_gnu.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_compress_gnu.Tpo" `test -f 'elf_compress_gnu.c' || echo './'`elf_compress_gnu.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_compress_gnu.Tpo" >> ".deps/elf_compress_gnu.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_compress_gnu.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_compress_gnu.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf_begin.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_begin.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf_begin.Tpo" `test -f 'elf_begin.c' || echo './'`elf_begin.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf_begin.Tpo" >> ".deps/elf_begin.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf_begin.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf_begin.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf32_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatefile.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf32_updatefile.Tpo" `test -f 'elf32_updatefile.c' || echo './'`elf32_updatefile.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf32_updatefile.Tpo" >> ".deps/elf32_updatefile.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf32_updatefile.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf32_updatefile.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o elf64_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatefile.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/elf64_updatefile.Tpo" `test -f 'elf64_updatefile.c' || echo './'`elf64_updatefile.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/elf64_updatefile.Tpo" >> ".deps/elf64_updatefile.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/elf64_updatefile.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/elf64_updatefile.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": mv -f .deps/gelf_xlate.Tpo .deps/gelf_xlate.Po Step #12 - "compile-honggfuzz-address-x86_64": rm -f libelf.a Step #12 - "compile-honggfuzz-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -c -o gelf_xlate.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlate.os -MD -MP \ Step #12 - "compile-honggfuzz-address-x86_64": -MF ".deps/gelf_xlate.Tpo" `test -f 'gelf_xlate.c' || echo './'`gelf_xlate.c; \ Step #12 - "compile-honggfuzz-address-x86_64": then cat ".deps/gelf_xlate.Tpo" >> ".deps/gelf_xlate.Po"; \ Step #12 - "compile-honggfuzz-address-x86_64": rm -f ".deps/gelf_xlate.Tpo"; \ Step #12 - "compile-honggfuzz-address-x86_64": else rm -f ".deps/gelf_xlate.Tpo"; exit 1; \ Step #12 - "compile-honggfuzz-address-x86_64": fi Step #12 - "compile-honggfuzz-address-x86_64": ar cr libelf.a elf_version.o elf_hash.o elf_error.o elf_fill.o elf_begin.o elf_next.o elf_rand.o elf_end.o elf_kind.o gelf_getclass.o elf_getbase.o elf_getident.o elf32_fsize.o elf64_fsize.o gelf_fsize.o elf32_xlatetof.o elf32_xlatetom.o elf64_xlatetof.o elf64_xlatetom.o gelf_xlate.o elf32_getehdr.o elf64_getehdr.o gelf_getehdr.o elf32_newehdr.o elf64_newehdr.o gelf_newehdr.o gelf_update_ehdr.o elf32_getphdr.o elf64_getphdr.o gelf_getphdr.o elf32_newphdr.o elf64_newphdr.o gelf_newphdr.o gelf_update_phdr.o elf_getarhdr.o elf_getarsym.o elf_rawfile.o elf_readall.o elf_cntl.o elf_getscn.o elf_nextscn.o elf_ndxscn.o elf_newscn.o elf32_getshdr.o elf64_getshdr.o gelf_getshdr.o gelf_update_shdr.o elf_strptr.o elf_rawdata.o elf_getdata.o elf_newdata.o elf_getdata_rawchunk.o elf_flagelf.o elf_flagehdr.o elf_flagphdr.o elf_flagscn.o elf_flagshdr.o elf_flagdata.o elf_memory.o elf_update.o elf32_updatenull.o elf64_updatenull.o elf32_updatefile.o elf64_updatefile.o gelf_getsym.o gelf_update_sym.o gelf_getversym.o gelf_getverneed.o gelf_getvernaux.o gelf_getverdef.o gelf_getverdaux.o gelf_getrel.o gelf_getrela.o gelf_update_rel.o gelf_update_rela.o gelf_getdyn.o gelf_update_dyn.o gelf_getmove.o gelf_update_move.o gelf_getsyminfo.o gelf_update_syminfo.o gelf_getauxv.o gelf_update_auxv.o gelf_getnote.o gelf_xlatetof.o gelf_xlatetom.o nlist.o gelf_getsymshndx.o gelf_update_symshndx.o gelf_update_versym.o gelf_update_verneed.o gelf_update_vernaux.o gelf_update_verdef.o gelf_update_verdaux.o elf_getphdrnum.o elf_getshdrnum.o elf_getshdrstrndx.o gelf_checksum.o elf32_checksum.o elf64_checksum.o libelf_crc32.o libelf_next_prime.o elf_clone.o gelf_getlib.o gelf_update_lib.o elf32_offscn.o elf64_offscn.o gelf_offscn.o elf_getaroff.o elf_gnu_hash.o elf_scnshndx.o elf32_getchdr.o elf64_getchdr.o gelf_getchdr.o elf_compress.o elf_compress_gnu.o Step #12 - "compile-honggfuzz-address-x86_64": ranlib libelf.a Step #12 - "compile-honggfuzz-address-x86_64": rm -f libelf_pic.a Step #12 - "compile-honggfuzz-address-x86_64": ar cr libelf_pic.a elf_version.os elf_hash.os elf_error.os elf_fill.os elf_begin.os elf_next.os elf_rand.os elf_end.os elf_kind.os gelf_getclass.os elf_getbase.os elf_getident.os elf32_fsize.os elf64_fsize.os gelf_fsize.os elf32_xlatetof.os elf32_xlatetom.os elf64_xlatetof.os elf64_xlatetom.os gelf_xlate.os elf32_getehdr.os elf64_getehdr.os gelf_getehdr.os elf32_newehdr.os elf64_newehdr.os gelf_newehdr.os gelf_update_ehdr.os elf32_getphdr.os elf64_getphdr.os gelf_getphdr.os elf32_newphdr.os elf64_newphdr.os gelf_newphdr.os gelf_update_phdr.os elf_getarhdr.os elf_getarsym.os elf_rawfile.os elf_readall.os elf_cntl.os elf_getscn.os elf_nextscn.os elf_ndxscn.os elf_newscn.os elf32_getshdr.os elf64_getshdr.os gelf_getshdr.os gelf_update_shdr.os elf_strptr.os elf_rawdata.os elf_getdata.os elf_newdata.os elf_getdata_rawchunk.os elf_flagelf.os elf_flagehdr.os elf_flagphdr.os elf_flagscn.os elf_flagshdr.os elf_flagdata.os elf_memory.os elf_update.os elf32_updatenull.os elf64_updatenull.os elf32_updatefile.os elf64_updatefile.os gelf_getsym.os gelf_update_sym.os gelf_getversym.os gelf_getverneed.os gelf_getvernaux.os gelf_getverdef.os gelf_getverdaux.os gelf_getrel.os gelf_getrela.os gelf_update_rel.os gelf_update_rela.os gelf_getdyn.os gelf_update_dyn.os gelf_getmove.os gelf_update_move.os gelf_getsyminfo.os gelf_update_syminfo.os gelf_getauxv.os gelf_update_auxv.os gelf_getnote.os gelf_xlatetof.os gelf_xlatetom.os nlist.os gelf_getsymshndx.os gelf_update_symshndx.os gelf_update_versym.os gelf_update_verneed.os gelf_update_vernaux.os gelf_update_verdef.os gelf_update_verdaux.os elf_getphdrnum.os elf_getshdrnum.os elf_getshdrstrndx.os gelf_checksum.os elf32_checksum.os elf64_checksum.os libelf_crc32.os libelf_next_prime.os elf_clone.os gelf_getlib.os gelf_update_lib.os elf32_offscn.os elf64_offscn.os gelf_offscn.os elf_getaroff.os elf_gnu_hash.os elf_scnshndx.os elf32_getchdr.os elf64_getchdr.os gelf_getchdr.os elf_compress.os elf_compress_gnu.os Step #12 - "compile-honggfuzz-address-x86_64": ranlib libelf_pic.a Step #12 - "compile-honggfuzz-address-x86_64": clang -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -fno-addrsig -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -Wl,--build-id -o libelf.so -shared -Wl,-z,relro -o libelf.so \ Step #12 - "compile-honggfuzz-address-x86_64": -Wl,--soname,libelf.so.1 \ Step #12 - "compile-honggfuzz-address-x86_64": -Wl,--version-script,libelf.map \ Step #12 - "compile-honggfuzz-address-x86_64": \ Step #12 - "compile-honggfuzz-address-x86_64": -Wl,--whole-archive libelf_pic.a -Wl,--no-whole-archive \ Step #12 - "compile-honggfuzz-address-x86_64": ../lib/libeu.a -lz Step #12 - "compile-honggfuzz-address-x86_64": ln -fs libelf.so libelf.so.1 Step #12 - "compile-honggfuzz-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/libelf' Step #12 - "compile-honggfuzz-address-x86_64": + make -C src BUILD_STATIC_ONLY=y V=1 clean Step #12 - "compile-honggfuzz-address-x86_64": make: Entering directory '/src/libbpf/src' Step #12 - "compile-honggfuzz-address-x86_64": Package libelf was not found in the pkg-config search path. Step #12 - "compile-honggfuzz-address-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #12 - "compile-honggfuzz-address-x86_64": to the PKG_CONFIG_PATH environment variable Step #12 - "compile-honggfuzz-address-x86_64": No package 'libelf' found Step #12 - "compile-honggfuzz-address-x86_64": rm -rf *.o *.a *.so *.so.* *.pc ./sharedobjs ./staticobjs Step #12 - "compile-honggfuzz-address-x86_64": make: Leaving directory '/src/libbpf/src' Step #12 - "compile-honggfuzz-address-x86_64": ++ nproc Step #12 - "compile-honggfuzz-address-x86_64": ++ pwd Step #12 - "compile-honggfuzz-address-x86_64": + make -C src -j32 'CFLAGS=-I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp' BUILD_STATIC_ONLY=y V=1 Step #12 - "compile-honggfuzz-address-x86_64": make: Entering directory '/src/libbpf/src' Step #12 - "compile-honggfuzz-address-x86_64": Package libelf was not found in the pkg-config search path. Step #12 - "compile-honggfuzz-address-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #12 - "compile-honggfuzz-address-x86_64": to the PKG_CONFIG_PATH environment variable Step #12 - "compile-honggfuzz-address-x86_64": No package 'libelf' found Step #12 - "compile-honggfuzz-address-x86_64": mkdir -p staticobjs Step #12 - "compile-honggfuzz-address-x86_64": sed -e "s|@PREFIX@|/usr|" \ Step #12 - "compile-honggfuzz-address-x86_64": -e "s|@LIBDIR@|$\{prefix\}/lib64|" \ Step #12 - "compile-honggfuzz-address-x86_64": -e "s|@VERSION@|1.4.0|" \ Step #12 - "compile-honggfuzz-address-x86_64": < libbpf.pc.template > libbpf.pc Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf.c -o staticobjs/bpf.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf.c -o staticobjs/btf.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf.c -o staticobjs/libbpf.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_errno.c -o staticobjs/libbpf_errno.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c netlink.c -o staticobjs/netlink.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c nlattr.c -o staticobjs/nlattr.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c str_error.c -o staticobjs/str_error.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_probes.c -o staticobjs/libbpf_probes.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf_prog_linfo.c -o staticobjs/bpf_prog_linfo.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf_dump.c -o staticobjs/btf_dump.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c hashmap.c -o staticobjs/hashmap.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c ringbuf.c -o staticobjs/ringbuf.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c strset.c -o staticobjs/strset.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c linker.c -o staticobjs/linker.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c gen_loader.c -o staticobjs/gen_loader.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c relo_core.c -o staticobjs/relo_core.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c usdt.c -o staticobjs/usdt.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c zip.c -o staticobjs/zip.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c elf.c -o staticobjs/elf.o Step #12 - "compile-honggfuzz-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c features.c -o staticobjs/features.o Step #12 - "compile-honggfuzz-address-x86_64": ar rcs libbpf.a staticobjs/bpf.o staticobjs/btf.o staticobjs/libbpf.o staticobjs/libbpf_errno.o staticobjs/netlink.o staticobjs/nlattr.o staticobjs/str_error.o staticobjs/libbpf_probes.o staticobjs/bpf_prog_linfo.o staticobjs/btf_dump.o staticobjs/hashmap.o staticobjs/ringbuf.o staticobjs/strset.o staticobjs/linker.o staticobjs/gen_loader.o staticobjs/relo_core.o staticobjs/usdt.o staticobjs/zip.o staticobjs/elf.o staticobjs/features.o Step #12 - "compile-honggfuzz-address-x86_64": make: Leaving directory '/src/libbpf/src' Step #12 - "compile-honggfuzz-address-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o Step #12 - "compile-honggfuzz-address-x86_64": ++ pwd Step #12 - "compile-honggfuzz-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ /usr/lib/libFuzzingEngine.a bpf-object-fuzzer.o src/libbpf.a /src/libbpf/elfutils/libelf/libelf.a -l:libz.a -o /workspace/out/honggfuzz-address-x86_64/bpf-object-fuzzer Step #12 - "compile-honggfuzz-address-x86_64": + cp fuzz/bpf-object-fuzzer_seed_corpus.zip /workspace/out/honggfuzz-address-x86_64 Finished Step #12 - "compile-honggfuzz-address-x86_64" Starting Step #13 - "build-check-honggfuzz-address-x86_64" Step #13 - "build-check-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp695mj5mm/bpf-object-fuzzer Finished Step #13 - "build-check-honggfuzz-address-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/libbpf Step #15: adding: bpf-object-fuzzer (deflated 63%) Step #15: adding: bpf-object-fuzzer_seed_corpus.zip (stored 0%) Step #15: adding: honggfuzz (deflated 66%) Step #15: adding: llvm-symbolizer (deflated 64%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 147 0 0 100 147 0 653 --:--:-- --:--:-- --:--:-- 656 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3991k 0 0 100 3991k 0 13.0M --:--:-- --:--:-- --:--:-- 13.0M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 18 0 0 100 18 0 51 --:--:-- --:--:-- --:--:-- 51 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 142 --:--:-- --:--:-- --:--:-- 142 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/libbpf Finished Step #20 Starting Step #21 - "compile-libfuzzer-address-x86_64" Step #21 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": CC=clang Step #21 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #21 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #21 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": + ./scripts/build-fuzzers.sh Step #21 - "compile-libfuzzer-address-x86_64": + SANITIZER=address Step #21 - "compile-libfuzzer-address-x86_64": + flags='-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize=fuzzer-no-link' Step #21 - "compile-libfuzzer-address-x86_64": + export CC=clang Step #21 - "compile-libfuzzer-address-x86_64": + CC=clang Step #21 - "compile-libfuzzer-address-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #21 - "compile-libfuzzer-address-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #21 - "compile-libfuzzer-address-x86_64": + export CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": + CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #21 - "compile-libfuzzer-address-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #21 - "compile-libfuzzer-address-x86_64": ++ dirname -- ./scripts/build-fuzzers.sh Step #21 - "compile-libfuzzer-address-x86_64": + cd ./scripts/.. Step #21 - "compile-libfuzzer-address-x86_64": + export OUT=/workspace/out/libfuzzer-address-x86_64 Step #21 - "compile-libfuzzer-address-x86_64": + OUT=/workspace/out/libfuzzer-address-x86_64 Step #21 - "compile-libfuzzer-address-x86_64": + mkdir -p /workspace/out/libfuzzer-address-x86_64 Step #21 - "compile-libfuzzer-address-x86_64": + export LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #21 - "compile-libfuzzer-address-x86_64": + LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #21 - "compile-libfuzzer-address-x86_64": + [[ address == memory ]] Step #21 - "compile-libfuzzer-address-x86_64": + [[ address == undefined ]] Step #21 - "compile-libfuzzer-address-x86_64": + rm -rf elfutils Step #21 - "compile-libfuzzer-address-x86_64": + git clone https://sourceware.org/git/elfutils.git Step #21 - "compile-libfuzzer-address-x86_64": Cloning into 'elfutils'... Step #21 - "compile-libfuzzer-address-x86_64": remote: Enumerating objects: 38615, done. Step #21 - "compile-libfuzzer-address-x86_64": remote: Counting objects: 0% (1/38615) remote: Counting objects: 1% (387/38615) remote: Counting objects: 2% (773/38615) remote: Counting objects: 3% (1159/38615) remote: Counting objects: 4% (1545/38615) remote: Counting objects: 5% (1931/38615) remote: Counting objects: 6% (2317/38615) remote: Counting objects: 7% (2704/38615) remote: Counting objects: 8% (3090/38615) remote: Counting objects: 9% (3476/38615) remote: Counting objects: 10% (3862/38615) remote: Counting objects: 11% (4248/38615) remote: Counting objects: 12% (4634/38615) remote: Counting objects: 13% (5020/38615) remote: Counting objects: 14% (5407/38615) remote: Counting objects: 15% (5793/38615) remote: Counting objects: 16% (6179/38615) remote: Counting objects: 17% (6565/38615) remote: Counting objects: 18% (6951/38615) remote: Counting objects: 19% (7337/38615) remote: Counting objects: 20% (7723/38615) remote: Counting objects: 21% (8110/38615) remote: Counting objects: 22% (8496/38615) remote: Counting objects: 23% (8882/38615) remote: Counting objects: 24% (9268/38615) remote: Counting objects: 25% (9654/38615) remote: Counting objects: 26% (10040/38615) remote: Counting objects: 27% (10427/38615) remote: Counting objects: 28% (10813/38615) remote: Counting objects: 29% (11199/38615) remote: Counting objects: 30% (11585/38615) remote: Counting objects: 31% (11971/38615) remote: Counting objects: 32% (12357/38615) remote: Counting objects: 33% (12743/38615) remote: Counting objects: 34% (13130/38615) remote: Counting objects: 35% (13516/38615) remote: Counting objects: 36% (13902/38615) remote: Counting objects: 37% (14288/38615) remote: Counting objects: 38% (14674/38615) remote: Counting objects: 39% (15060/38615) remote: Counting objects: 40% (15446/38615) remote: Counting objects: 41% (15833/38615) remote: Counting objects: 42% (16219/38615) remote: Counting objects: 43% (16605/38615) remote: Counting objects: 44% (16991/38615) remote: Counting objects: 45% (17377/38615) remote: Counting objects: 46% (17763/38615) remote: Counting objects: 47% (18150/38615) remote: Counting objects: 48% (18536/38615) remote: Counting objects: 49% (18922/38615) remote: Counting objects: 50% (19308/38615) remote: Counting objects: 51% (19694/38615) remote: Counting objects: 52% (20080/38615) remote: Counting objects: 53% (20466/38615) remote: Counting objects: 54% (20853/38615) remote: Counting objects: 55% (21239/38615) remote: Counting objects: 56% (21625/38615) remote: Counting objects: 57% (22011/38615) remote: Counting objects: 58% (22397/38615) remote: Counting objects: 59% (22783/38615) remote: Counting objects: 60% (23169/38615) remote: Counting objects: 61% (23556/38615) remote: Counting objects: 62% (23942/38615) remote: Counting objects: 63% (24328/38615) remote: Counting objects: 64% (24714/38615) remote: Counting objects: 65% (25100/38615) remote: Counting objects: 66% (25486/38615) remote: Counting objects: 67% (25873/38615) remote: Counting objects: 68% (26259/38615) remote: Counting objects: 69% (26645/38615) remote: Counting objects: 70% (27031/38615) remote: Counting objects: 71% (27417/38615) remote: Counting objects: 72% (27803/38615) remote: Counting objects: 73% (28189/38615) remote: Counting objects: 74% (28576/38615) remote: Counting objects: 75% (28962/38615) remote: Counting objects: 76% (29348/38615) remote: Counting objects: 77% (29734/38615) remote: Counting objects: 78% (30120/38615) remote: Counting objects: 79% (30506/38615) remote: Counting objects: 80% (30892/38615) remote: Counting objects: 81% (31279/38615) remote: Counting objects: 82% (31665/38615) remote: Counting objects: 83% (32051/38615) remote: Counting objects: 84% (32437/38615) remote: Counting objects: 85% (32823/38615) remote: Counting objects: 86% (33209/38615) remote: Counting objects: 87% (33596/38615) remote: Counting objects: 88% (33982/38615) remote: Counting objects: 89% (34368/38615) remote: Counting objects: 90% (34754/38615) remote: Counting objects: 91% (35140/38615) remote: Counting objects: 92% (35526/38615) remote: Counting objects: 93% (35912/38615) remote: Counting objects: 94% (36299/38615) remote: Counting objects: 95% (36685/38615) remote: Counting objects: 96% (37071/38615) remote: Counting objects: 97% (37457/38615) remote: Counting objects: 98% (37843/38615) remote: Counting objects: 99% (38229/38615) remote: Counting objects: 100% (38615/38615) remote: Counting objects: 100% (38615/38615), done. Step #21 - "compile-libfuzzer-address-x86_64": remote: Compressing objects: 0% (1/7338) remote: Compressing objects: 1% (74/7338) remote: Compressing objects: 2% (147/7338) remote: Compressing objects: 3% (221/7338) remote: Compressing objects: 4% (294/7338) remote: Compressing objects: 5% (367/7338) remote: Compressing objects: 6% (441/7338) remote: Compressing objects: 7% (514/7338) remote: Compressing objects: 8% (588/7338) remote: Compressing objects: 9% (661/7338) remote: Compressing objects: 10% (734/7338) remote: Compressing objects: 11% (808/7338) remote: Compressing objects: 12% (881/7338) remote: Compressing objects: 13% (954/7338) remote: Compressing objects: 14% (1028/7338) remote: Compressing objects: 15% (1101/7338) remote: Compressing objects: 16% (1175/7338) remote: Compressing objects: 17% (1248/7338) remote: Compressing objects: 18% (1321/7338) remote: Compressing objects: 19% (1395/7338) remote: Compressing objects: 20% (1468/7338) remote: Compressing objects: 21% (1541/7338) remote: Compressing objects: 22% (1615/7338) remote: Compressing objects: 23% (1688/7338) remote: Compressing objects: 24% (1762/7338) remote: Compressing objects: 25% (1835/7338) remote: Compressing objects: 26% (1908/7338) remote: Compressing objects: 27% (1982/7338) remote: Compressing objects: 28% (2055/7338) remote: Compressing objects: 29% (2129/7338) remote: Compressing objects: 30% (2202/7338) remote: Compressing objects: 31% (2275/7338) remote: Compressing objects: 32% (2349/7338) remote: Compressing objects: 33% (2422/7338) remote: Compressing objects: 34% (2495/7338) remote: Compressing objects: 35% (2569/7338) remote: Compressing objects: 36% (2642/7338) remote: Compressing objects: 37% (2716/7338) remote: Compressing objects: 38% (2789/7338) remote: Compressing objects: 39% (2862/7338) remote: Compressing objects: 40% (2936/7338) remote: Compressing objects: 41% (3009/7338) remote: Compressing objects: 42% (3082/7338) remote: Compressing objects: 43% (3156/7338) remote: Compressing objects: 44% (3229/7338) remote: Compressing objects: 45% (3303/7338) remote: Compressing objects: 46% (3376/7338) remote: Compressing objects: 47% (3449/7338) remote: Compressing objects: 48% (3523/7338) remote: Compressing objects: 49% (3596/7338) remote: Compressing objects: 50% (3669/7338) remote: Compressing objects: 51% (3743/7338) remote: Compressing objects: 52% (3816/7338) remote: Compressing objects: 53% (3890/7338) remote: Compressing objects: 54% (3963/7338) remote: Compressing objects: 55% (4036/7338) remote: Compressing objects: 56% (4110/7338) remote: Compressing objects: 57% (4183/7338) remote: Compressing objects: 58% (4257/7338) remote: Compressing objects: 59% (4330/7338) remote: Compressing objects: 60% (4403/7338) remote: Compressing objects: 61% (4477/7338) remote: Compressing objects: 62% (4550/7338) remote: Compressing objects: 63% (4623/7338) remote: Compressing objects: 64% (4697/7338) remote: Compressing objects: 65% (4770/7338) remote: Compressing objects: 66% (4844/7338) remote: Compressing objects: 67% (4917/7338) remote: Compressing objects: 68% (4990/7338) remote: Compressing objects: 69% (5064/7338) remote: Compressing objects: 70% (5137/7338) remote: Compressing objects: 71% (5210/7338) remote: Compressing objects: 72% (5284/7338) remote: Compressing objects: 73% (5357/7338) remote: Compressing objects: 74% (5431/7338) remote: Compressing objects: 75% (5504/7338) remote: Compressing objects: 76% (5577/7338) remote: Compressing objects: 77% (5651/7338) remote: Compressing objects: 78% (5724/7338) remote: Compressing objects: 79% (5798/7338) remote: Compressing objects: 80% (5871/7338) remote: Compressing objects: 81% (5944/7338) remote: Compressing objects: 82% (6018/7338) remote: Compressing objects: 83% (6091/7338) remote: Compressing objects: 84% (6164/7338) remote: Compressing objects: 85% (6238/7338) remote: Compressing objects: 86% (6311/7338) remote: Compressing objects: 87% (6385/7338) remote: Compressing objects: 88% (6458/7338) remote: Compressing objects: 89% (6531/7338) remote: Compressing objects: 90% (6605/7338) remote: Compressing objects: 91% (6678/7338) remote: Compressing objects: 92% (6751/7338) remote: Compressing objects: 93% (6825/7338) remote: Compressing objects: 94% (6898/7338) remote: Compressing objects: 95% (6972/7338) remote: Compressing objects: 96% (7045/7338) remote: Compressing objects: 97% (7118/7338) remote: Compressing objects: 98% (7192/7338) remote: Compressing objects: 99% (7265/7338) remote: Compressing objects: 100% (7338/7338) remote: Compressing objects: 100% (7338/7338), done. Step #21 - "compile-libfuzzer-address-x86_64": Receiving objects: 0% (1/38615) Receiving objects: 1% (387/38615) Receiving objects: 2% (773/38615) Receiving objects: 3% (1159/38615) Receiving objects: 4% (1545/38615) Receiving objects: 5% (1931/38615) Receiving objects: 6% (2317/38615) Receiving objects: 7% (2704/38615) Receiving objects: 8% (3090/38615) Receiving objects: 9% (3476/38615) Receiving objects: 10% (3862/38615) Receiving objects: 11% (4248/38615) Receiving objects: 12% (4634/38615) Receiving objects: 13% (5020/38615) Receiving objects: 14% (5407/38615) Receiving objects: 15% (5793/38615) Receiving objects: 16% (6179/38615) Receiving objects: 17% (6565/38615) Receiving objects: 18% (6951/38615) Receiving objects: 19% (7337/38615) Receiving objects: 20% (7723/38615) Receiving objects: 21% (8110/38615) Receiving objects: 22% (8496/38615) Receiving objects: 23% (8882/38615) Receiving objects: 24% (9268/38615) Receiving objects: 25% (9654/38615) Receiving objects: 26% (10040/38615) Receiving objects: 27% (10427/38615) Receiving objects: 28% (10813/38615) Receiving objects: 29% (11199/38615) Receiving objects: 30% (11585/38615) Receiving objects: 31% (11971/38615) Receiving objects: 32% (12357/38615) Receiving objects: 33% (12743/38615) Receiving objects: 34% (13130/38615) Receiving objects: 35% (13516/38615) Receiving objects: 36% (13902/38615) Receiving objects: 37% (14288/38615) Receiving objects: 38% (14674/38615) Receiving objects: 39% (15060/38615) Receiving objects: 40% (15446/38615) Receiving objects: 41% (15833/38615) Receiving objects: 42% (16219/38615) Receiving objects: 43% (16605/38615) Receiving objects: 44% (16991/38615) Receiving objects: 45% (17377/38615) Receiving objects: 46% (17763/38615) Receiving objects: 47% (18150/38615) Receiving objects: 48% (18536/38615) Receiving objects: 49% (18922/38615) Receiving objects: 50% (19308/38615) Receiving objects: 51% (19694/38615) Receiving objects: 52% (20080/38615) Receiving objects: 53% (20466/38615) Receiving objects: 54% (20853/38615) Receiving objects: 55% (21239/38615) Receiving objects: 56% (21625/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 57% (22011/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 58% (22397/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 59% (22783/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 60% (23169/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 61% (23556/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 62% (23942/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 63% (24328/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 64% (24714/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 65% (25100/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 66% (25486/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 67% (25873/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 68% (26259/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 69% (26645/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 70% (27031/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 71% (27417/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 72% (27803/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 73% (28189/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 74% (28576/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 75% (28962/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 76% (29348/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 77% (29734/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 78% (30120/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 79% (30506/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 80% (30892/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 81% (31279/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 82% (31665/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 83% (32051/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 84% (32437/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 85% (32823/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 86% (33209/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 87% (33596/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 88% (33982/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 89% (34368/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 90% (34754/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 91% (35140/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 92% (35526/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 93% (35912/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 94% (36299/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 95% (36685/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 96% (37071/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 97% (37457/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 98% (37843/38615), 11.54 MiB | 23.07 MiB/s remote: Total 38615 (delta 32217), reused 37479 (delta 31234), pack-reused 0 Step #21 - "compile-libfuzzer-address-x86_64": Receiving objects: 99% (38229/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 100% (38615/38615), 11.54 MiB | 23.07 MiB/s Receiving objects: 100% (38615/38615), 21.53 MiB | 29.83 MiB/s, done. Step #21 - "compile-libfuzzer-address-x86_64": Resolving deltas: 0% (0/32217) Resolving deltas: 1% (428/32217) Resolving deltas: 2% (948/32217) Resolving deltas: 3% (1079/32217) Resolving deltas: 4% (1356/32217) Resolving deltas: 5% (1611/32217) Resolving deltas: 6% (2040/32217) Resolving deltas: 7% (2263/32217) Resolving deltas: 8% (2610/32217) Resolving deltas: 9% (2922/32217) Resolving deltas: 10% (3300/32217) Resolving deltas: 11% (3559/32217) Resolving deltas: 12% (3901/32217) Resolving deltas: 13% (4230/32217) Resolving deltas: 14% (4606/32217) Resolving deltas: 15% (4857/32217) Resolving deltas: 17% (5558/32217) Resolving deltas: 18% (5848/32217) Resolving deltas: 19% (6129/32217) Resolving deltas: 20% (6451/32217) Resolving deltas: 22% (7233/32217) Resolving deltas: 23% (7436/32217) Resolving deltas: 26% (8422/32217) Resolving deltas: 27% (8718/32217) Resolving deltas: 29% (9357/32217) Resolving deltas: 30% (9735/32217) Resolving deltas: 31% (9993/32217) Resolving deltas: 32% (10377/32217) Resolving deltas: 33% (10633/32217) Resolving deltas: 34% (11094/32217) Resolving deltas: 35% (11278/32217) Resolving deltas: 36% (11719/32217) Resolving deltas: 37% (11941/32217) Resolving deltas: 39% (12637/32217) Resolving deltas: 40% (13001/32217) Resolving deltas: 41% (13215/32217) Resolving deltas: 42% (13544/32217) Resolving deltas: 43% (13870/32217) Resolving deltas: 44% (14220/32217) Resolving deltas: 45% (14769/32217) Resolving deltas: 46% (14863/32217) Resolving deltas: 47% (15198/32217) Resolving deltas: 48% (15617/32217) Resolving deltas: 49% (15794/32217) Resolving deltas: 50% (16181/32217) Resolving deltas: 51% (16459/32217) Resolving deltas: 52% (16762/32217) Resolving deltas: 53% (17110/32217) Resolving deltas: 54% (17414/32217) Resolving deltas: 55% (17737/32217) Resolving deltas: 56% (18163/32217) Resolving deltas: 57% (18509/32217) Resolving deltas: 58% (18688/32217) Resolving deltas: 59% (19033/32217) Resolving deltas: 60% (19338/32217) Resolving deltas: 61% (19656/32217) Resolving deltas: 62% (20022/32217) Resolving deltas: 63% (20311/32217) Resolving deltas: 64% (20647/32217) Resolving deltas: 65% (20943/32217) Resolving deltas: 66% (21339/32217) Resolving deltas: 67% (21644/32217) Resolving deltas: 68% (21915/32217) Resolving deltas: 69% (22540/32217) Resolving deltas: 70% (22616/32217) Resolving deltas: 71% (22886/32217) Resolving deltas: 72% (23259/32217) Resolving deltas: 73% (23527/32217) Resolving deltas: 74% (23876/32217) Resolving deltas: 75% (24414/32217) Resolving deltas: 77% (24894/32217) Resolving deltas: 78% (25248/32217) Resolving deltas: 80% (25920/32217) Resolving deltas: 81% (26335/32217) Resolving deltas: 82% (26502/32217) Resolving deltas: 83% (26776/32217) Resolving deltas: 84% (27063/32217) Resolving deltas: 85% (27388/32217) Resolving deltas: 86% (27708/32217) Resolving deltas: 87% (28043/32217) Resolving deltas: 88% (28369/32217) Resolving deltas: 89% (28812/32217) Resolving deltas: 90% (29001/32217) Resolving deltas: 91% (29357/32217) Resolving deltas: 92% (29644/32217) Resolving deltas: 93% (29984/32217) Resolving deltas: 94% (30295/32217) Resolving deltas: 95% (30634/32217) Resolving deltas: 96% (30934/32217) Resolving deltas: 97% (31251/32217) Resolving deltas: 97% (31514/32217) Resolving deltas: 98% (31607/32217) Resolving deltas: 99% (32002/32217) Resolving deltas: 100% (32217/32217) Resolving deltas: 100% (32217/32217), done. Step #21 - "compile-libfuzzer-address-x86_64": + cd elfutils Step #21 - "compile-libfuzzer-address-x86_64": + git checkout 67a187d4c1790058fc7fd218317851cb68bb087c Step #21 - "compile-libfuzzer-address-x86_64": Note: switching to '67a187d4c1790058fc7fd218317851cb68bb087c'. Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #21 - "compile-libfuzzer-address-x86_64": changes and commit them, and you can discard any commits you make in this Step #21 - "compile-libfuzzer-address-x86_64": state without impacting any branches by switching back to a branch. Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": If you want to create a new branch to retain commits you create, you may Step #21 - "compile-libfuzzer-address-x86_64": do so (now or later) by using -c with the switch command. Example: Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": git switch -c Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": Or undo this operation with: Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": git switch - Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": HEAD is now at 67a187d4 Prepare for 0.189 Step #21 - "compile-libfuzzer-address-x86_64": + git log --oneline -1 Step #21 - "compile-libfuzzer-address-x86_64": [?1h= 67a187d4 (HEAD, tag: elfutils-0.189) Prepare for 0.189 Step #21 - "compile-libfuzzer-address-x86_64": [?1l>+ sed -i 's/^\(NO_UNDEFINED=\).*/\1/' configure.ac Step #21 - "compile-libfuzzer-address-x86_64": + sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac Step #21 - "compile-libfuzzer-address-x86_64": + [[ address == undefined ]] Step #21 - "compile-libfuzzer-address-x86_64": + autoreconf -i -f Step #21 - "compile-libfuzzer-address-x86_64": autopoint: using AM_GNU_GETTEXT_REQUIRE_VERSION instead of AM_GNU_GETTEXT_VERSION Step #21 - "compile-libfuzzer-address-x86_64": Copying file ABOUT-NLS Step #21 - "compile-libfuzzer-address-x86_64": Copying file config/config.rpath Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/codeset.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/extern-inline.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/fcntl-o.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/gettext.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/glibc2.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/glibc21.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/iconv.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/intdiv0.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/intl.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/intldir.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/intlmacosx.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/intmax.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/inttypes-pri.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/inttypes_h.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/lcmessage.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/lib-ld.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/lib-link.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/lib-prefix.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/lock.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/longlong.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/nls.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/po.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/printf-posix.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/progtest.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/size_max.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/stdint_h.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/threadlib.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/uintmax_t.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/visibility.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/wchar_t.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/wint_t.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file m4/xsize.m4 Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/Makefile.in.in Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/Makevars.template Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/Rules-quot Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/boldquot.sed Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/en@boldquot.header Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/en@quot.header Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/insert-header.sin Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/quot.sed Step #21 - "compile-libfuzzer-address-x86_64": Copying file po/remove-potcdate.sin Step #21 - "compile-libfuzzer-address-x86_64": configure.ac:97: installing 'config/ar-lib' Step #21 - "compile-libfuzzer-address-x86_64": configure.ac:91: installing 'config/compile' Step #21 - "compile-libfuzzer-address-x86_64": configure.ac:67: installing 'config/config.guess' Step #21 - "compile-libfuzzer-address-x86_64": configure.ac:67: installing 'config/config.sub' Step #21 - "compile-libfuzzer-address-x86_64": configure.ac:52: installing 'config/install-sh' Step #21 - "compile-libfuzzer-address-x86_64": configure.ac:52: installing 'config/missing' Step #21 - "compile-libfuzzer-address-x86_64": Makefile.am: installing './INSTALL' Step #21 - "compile-libfuzzer-address-x86_64": backends/Makefile.am: installing 'config/depcomp' Step #21 - "compile-libfuzzer-address-x86_64": configure.ac: installing 'config/ylwrap' Step #21 - "compile-libfuzzer-address-x86_64": parallel-tests: installing 'config/test-driver' Step #21 - "compile-libfuzzer-address-x86_64": + ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod --disable-demangler --without-bzlib --without-lzma --without-zstd CC=clang 'CFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' CXX=clang++ 'CXXFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' 'LDFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #21 - "compile-libfuzzer-address-x86_64": configure: No --program-prefix given, using "eu-" Step #21 - "compile-libfuzzer-address-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #21 - "compile-libfuzzer-address-x86_64": checking whether build environment is sane... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #21 - "compile-libfuzzer-address-x86_64": checking for gawk... gawk Step #21 - "compile-libfuzzer-address-x86_64": checking whether make sets $(MAKE)... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether make supports nested variables... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether make supports nested variables... (cached) yes Step #21 - "compile-libfuzzer-address-x86_64": checking build system type... x86_64-pc-linux-gnu Step #21 - "compile-libfuzzer-address-x86_64": checking host system type... x86_64-pc-linux-gnu Step #21 - "compile-libfuzzer-address-x86_64": checking whether make supports the include directive... yes (GNU style) Step #21 - "compile-libfuzzer-address-x86_64": checking for gcc... clang Step #21 - "compile-libfuzzer-address-x86_64": checking whether the C compiler works... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for C compiler default output file name... a.out Step #21 - "compile-libfuzzer-address-x86_64": checking for suffix of executables... Step #21 - "compile-libfuzzer-address-x86_64": checking whether we are cross compiling... no Step #21 - "compile-libfuzzer-address-x86_64": checking for suffix of object files... o Step #21 - "compile-libfuzzer-address-x86_64": checking whether we are using the GNU C compiler... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether clang accepts -g... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for clang option to accept ISO C89... none needed Step #21 - "compile-libfuzzer-address-x86_64": checking whether clang understands -c and -o together... yes Step #21 - "compile-libfuzzer-address-x86_64": checking dependency style of clang... gcc3 Step #21 - "compile-libfuzzer-address-x86_64": checking for clang option to accept ISO C99... none needed Step #21 - "compile-libfuzzer-address-x86_64": checking whether we are using the GNU C++ compiler... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether clang++ accepts -g... yes Step #21 - "compile-libfuzzer-address-x86_64": checking dependency style of clang++... gcc3 Step #21 - "compile-libfuzzer-address-x86_64": checking for ranlib... ranlib Step #21 - "compile-libfuzzer-address-x86_64": checking for bison... bison -y Step #21 - "compile-libfuzzer-address-x86_64": checking for flex... flex Step #21 - "compile-libfuzzer-address-x86_64": checking lex output file root... lex.yy Step #21 - "compile-libfuzzer-address-x86_64": checking lex library... none needed Step #21 - "compile-libfuzzer-address-x86_64": checking whether yytext is a pointer... no Step #21 - "compile-libfuzzer-address-x86_64": checking for ar... ar Step #21 - "compile-libfuzzer-address-x86_64": checking the archiver (ar) interface... ar Step #21 - "compile-libfuzzer-address-x86_64": checking for readelf... readelf Step #21 - "compile-libfuzzer-address-x86_64": checking for nm... nm Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc supports __attribute__((visibility()))... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc supports __attribute__((gcc_struct))... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc supports -fPIC... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc supports -fPIE... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc supports ... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether the compiler generates build-ids... no Step #21 - "compile-libfuzzer-address-x86_64": configure: WARNING: compiler doesn't generate build-id by default Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc supports -Wl,-z,relro... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for __thread support... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc provides stdatomic.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for special C compiler options needed for large files... no Step #21 - "compile-libfuzzer-address-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether fts.h is bad when included (with LFS)... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether to add -D_FORTIFY_SOURCE=2 or =3 to CFLAGS... yes -D_FORTIFY_SOURCE=3 Step #21 - "compile-libfuzzer-address-x86_64": checking for library containing gzdirect... -lz Step #21 - "compile-libfuzzer-address-x86_64": checking whether memrchr is declared... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether rawmemchr is declared... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether powerof2 is declared... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether mempcpy is declared... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether reallocarray is declared... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for process_vm_readv... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for mremap... yes Step #21 - "compile-libfuzzer-address-x86_64": checking how to run the C preprocessor... clang -E Step #21 - "compile-libfuzzer-address-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #21 - "compile-libfuzzer-address-x86_64": checking for egrep... /usr/bin/grep -E Step #21 - "compile-libfuzzer-address-x86_64": checking for ANSI C header files... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for sys/types.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for sys/stat.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for stdlib.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for string.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for memory.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for strings.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for inttypes.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for stdint.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for unistd.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking error.h usability... yes Step #21 - "compile-libfuzzer-address-x86_64": checking error.h presence... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for error.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking err.h usability... yes Step #21 - "compile-libfuzzer-address-x86_64": checking err.h presence... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for err.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking sched.h usability... yes Step #21 - "compile-libfuzzer-address-x86_64": checking sched.h presence... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for sched.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for sched_getaffinity... yes Step #21 - "compile-libfuzzer-address-x86_64": checking sys/resource.h usability... yes Step #21 - "compile-libfuzzer-address-x86_64": checking sys/resource.h presence... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for sys/resource.h... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for getrlimit... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether strerror_r is declared... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for strerror_r... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether strerror_r returns char *... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether symbol versioning is supported... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc accepts -Wstack-usage... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc has a sane -Wlogical-op... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc accepts -Wduplicated-cond... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc accepts -Wnull-dereference... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether gcc accepts -Wimplicit-fallthrough... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether the compiler accepts -Wimplicit-fallthrough=5... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether the compiler accepts -Wtrampolines... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether the compiler accepts -Wno-packed-not-aligned... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether the compiler accepts -Wuse-after-free=3... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether the compiler accepts -fno-addrsig... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for library containing argp_parse... none required Step #21 - "compile-libfuzzer-address-x86_64": checking for library containing fts_close... none required Step #21 - "compile-libfuzzer-address-x86_64": checking for library containing _obstack_free... none required Step #21 - "compile-libfuzzer-address-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #21 - "compile-libfuzzer-address-x86_64": checking whether NLS is requested... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for msgfmt... /usr/bin/msgfmt Step #21 - "compile-libfuzzer-address-x86_64": checking for gmsgfmt... /usr/bin/msgfmt Step #21 - "compile-libfuzzer-address-x86_64": checking for xgettext... /usr/bin/xgettext Step #21 - "compile-libfuzzer-address-x86_64": checking for msgmerge... /usr/bin/msgmerge Step #21 - "compile-libfuzzer-address-x86_64": checking for ld used by clang... /usr/bin/ld Step #21 - "compile-libfuzzer-address-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for shared library run path origin... done Step #21 - "compile-libfuzzer-address-x86_64": checking for CFPreferencesCopyAppValue... no Step #21 - "compile-libfuzzer-address-x86_64": checking for CFLocaleCopyCurrent... no Step #21 - "compile-libfuzzer-address-x86_64": checking for GNU gettext in libc... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether to use NLS... yes Step #21 - "compile-libfuzzer-address-x86_64": checking where the gettext function comes from... libc Step #21 - "compile-libfuzzer-address-x86_64": checking size of long... 8 Step #21 - "compile-libfuzzer-address-x86_64": checking for struct user_regs_struct... yes Step #21 - "compile-libfuzzer-address-x86_64": checking clang option for 32-bit word size... -m32 Step #21 - "compile-libfuzzer-address-x86_64": checking for 64-bit host... yes Step #21 - "compile-libfuzzer-address-x86_64": checking whether clang -m32 makes executables we can run... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for flex... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for bison... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for gawk... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for bunzip2... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for zstd... no Step #21 - "compile-libfuzzer-address-x86_64": checking whether clang++ supports C++11 features with -std=c++11... yes Step #21 - "compile-libfuzzer-address-x86_64": checking for pthread_setname_np in -lpthread... yes Step #21 - "compile-libfuzzer-address-x86_64": checking that generated files are newer than configure... done Step #21 - "compile-libfuzzer-address-x86_64": configure: creating ./config.status Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating elfutils.spec Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating debuginfod/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating debuginfod/debuginfod.h Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating doc/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating lib/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libelf/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libebl/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libdwelf/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libdw/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libdwfl/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libcpu/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating libasm/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating backends/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating src/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating po/Makefile.in Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating tests/Makefile Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config/libelf.pc Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config/libdw.pc Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config/libdebuginfod.pc Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating version.h Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config/profile.sh Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config/profile.csh Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating config.h Step #21 - "compile-libfuzzer-address-x86_64": config.status: executing depfiles commands Step #21 - "compile-libfuzzer-address-x86_64": config.status: executing po-directories commands Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating po/POTFILES Step #21 - "compile-libfuzzer-address-x86_64": config.status: creating po/Makefile Step #21 - "compile-libfuzzer-address-x86_64": configure: Step #21 - "compile-libfuzzer-address-x86_64": ===================================================================== Step #21 - "compile-libfuzzer-address-x86_64": elfutils: 0.189 (eu_version: 189) Step #21 - "compile-libfuzzer-address-x86_64": ===================================================================== Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": Prefix : /usr/local Step #21 - "compile-libfuzzer-address-x86_64": Program prefix ("eu-" recommended) : eu- Step #21 - "compile-libfuzzer-address-x86_64": Source code location : . Step #21 - "compile-libfuzzer-address-x86_64": Maintainer mode : yes Step #21 - "compile-libfuzzer-address-x86_64": build arch : x86_64-pc-linux-gnu Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": CFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig Step #21 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": RECOMMENDED FEATURES (should all be yes) Step #21 - "compile-libfuzzer-address-x86_64": gzip support : yes Step #21 - "compile-libfuzzer-address-x86_64": bzip2 support : no Step #21 - "compile-libfuzzer-address-x86_64": lzma/xz support : no Step #21 - "compile-libfuzzer-address-x86_64": zstd support : no Step #21 - "compile-libfuzzer-address-x86_64": zstd compression support : no Step #21 - "compile-libfuzzer-address-x86_64": libstdc++ demangle support : no Step #21 - "compile-libfuzzer-address-x86_64": File textrel check : yes Step #21 - "compile-libfuzzer-address-x86_64": Symbol versioning : yes Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": NOT RECOMMENDED FEATURES (should all be no) Step #21 - "compile-libfuzzer-address-x86_64": Experimental thread safety : no Step #21 - "compile-libfuzzer-address-x86_64": install elf.h : no Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": OTHER FEATURES Step #21 - "compile-libfuzzer-address-x86_64": Deterministic archives by default : false Step #21 - "compile-libfuzzer-address-x86_64": Native language support : yes Step #21 - "compile-libfuzzer-address-x86_64": Extra Valgrind annotations : no Step #21 - "compile-libfuzzer-address-x86_64": libdebuginfod client support : no Step #21 - "compile-libfuzzer-address-x86_64": Debuginfod server support : no Step #21 - "compile-libfuzzer-address-x86_64": Default DEBUGINFOD_URLS : Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": EXTRA TEST FEATURES (used with make check) Step #21 - "compile-libfuzzer-address-x86_64": have bunzip2 installed (required) : yes Step #21 - "compile-libfuzzer-address-x86_64": have zstd installed : no Step #21 - "compile-libfuzzer-address-x86_64": C++11 : yes Step #21 - "compile-libfuzzer-address-x86_64": debug branch prediction : no Step #21 - "compile-libfuzzer-address-x86_64": gprof support : no Step #21 - "compile-libfuzzer-address-x86_64": gcov support : no Step #21 - "compile-libfuzzer-address-x86_64": run all tests under valgrind : no Step #21 - "compile-libfuzzer-address-x86_64": gcc undefined behaviour sanitizer : no Step #21 - "compile-libfuzzer-address-x86_64": gcc address sanitizer : no Step #21 - "compile-libfuzzer-address-x86_64": clang memory sanitizer : no Step #21 - "compile-libfuzzer-address-x86_64": use rpath in tests : no Step #21 - "compile-libfuzzer-address-x86_64": test biarch : yes Step #21 - "compile-libfuzzer-address-x86_64": Step #21 - "compile-libfuzzer-address-x86_64": ++ nproc Step #21 - "compile-libfuzzer-address-x86_64": + make -C config -j32 V=1 Step #21 - "compile-libfuzzer-address-x86_64": make: Entering directory '/src/libbpf/elfutils/config' Step #21 - "compile-libfuzzer-address-x86_64": make: Nothing to be done for 'all'. Step #21 - "compile-libfuzzer-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/config' Step #21 - "compile-libfuzzer-address-x86_64": ++ nproc Step #21 - "compile-libfuzzer-address-x86_64": + make -C lib -j32 V=1 Step #21 - "compile-libfuzzer-address-x86_64": make: Entering directory '/src/libbpf/elfutils/lib' Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xasprintf.o -MD -MP -MF .deps/xasprintf.Tpo -c -o xasprintf.o xasprintf.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xstrdup.o -MD -MP -MF .deps/xstrdup.Tpo -c -o xstrdup.o xstrdup.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xstrndup.o -MD -MP -MF .deps/xstrndup.Tpo -c -o xstrndup.o xstrndup.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xmalloc.o -MD -MP -MF .deps/xmalloc.Tpo -c -o xmalloc.o xmalloc.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT next_prime.o -MD -MP -MF .deps/next_prime.Tpo -c -o next_prime.o next_prime.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT crc32.o -MD -MP -MF .deps/crc32.Tpo -c -o crc32.o crc32.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT crc32_file.o -MD -MP -MF .deps/crc32_file.Tpo -c -o crc32_file.o crc32_file.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT color.o -MD -MP -MF .deps/color.Tpo -c -o color.o color.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT error.o -MD -MP -MF .deps/error.Tpo -c -o error.o error.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT printversion.o -MD -MP -MF .deps/printversion.Tpo -c -o printversion.o printversion.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/error.Tpo .deps/error.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/next_prime.Tpo .deps/next_prime.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/xstrdup.Tpo .deps/xstrdup.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/printversion.Tpo .deps/printversion.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/xstrndup.Tpo .deps/xstrndup.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/crc32.Tpo .deps/crc32.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/xmalloc.Tpo .deps/xmalloc.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/xasprintf.Tpo .deps/xasprintf.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/crc32_file.Tpo .deps/crc32_file.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/color.Tpo .deps/color.Po Step #21 - "compile-libfuzzer-address-x86_64": rm -f libeu.a Step #21 - "compile-libfuzzer-address-x86_64": ar cr libeu.a xasprintf.o xstrdup.o xstrndup.o xmalloc.o next_prime.o crc32.o crc32_file.o color.o error.o printversion.o Step #21 - "compile-libfuzzer-address-x86_64": ranlib libeu.a Step #21 - "compile-libfuzzer-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/lib' Step #21 - "compile-libfuzzer-address-x86_64": ++ nproc Step #21 - "compile-libfuzzer-address-x86_64": + make -C libelf -j32 V=1 Step #21 - "compile-libfuzzer-address-x86_64": make: Entering directory '/src/libbpf/elfutils/libelf' Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_version.o -MD -MP -MF .deps/elf_version.Tpo -c -o elf_version.o elf_version.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_hash.o -MD -MP -MF .deps/elf_hash.Tpo -c -o elf_hash.o elf_hash.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_error.o -MD -MP -MF .deps/elf_error.Tpo -c -o elf_error.o elf_error.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_fill.o -MD -MP -MF .deps/elf_fill.Tpo -c -o elf_fill.o elf_fill.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_begin.o -MD -MP -MF .deps/elf_begin.Tpo -c -o elf_begin.o elf_begin.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_next.o -MD -MP -MF .deps/elf_next.Tpo -c -o elf_next.o elf_next.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_rand.o -MD -MP -MF .deps/elf_rand.Tpo -c -o elf_rand.o elf_rand.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_end.o -MD -MP -MF .deps/elf_end.Tpo -c -o elf_end.o elf_end.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_kind.o -MD -MP -MF .deps/elf_kind.Tpo -c -o elf_kind.o elf_kind.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getclass.o -MD -MP -MF .deps/gelf_getclass.Tpo -c -o gelf_getclass.o gelf_getclass.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getbase.o -MD -MP -MF .deps/elf_getbase.Tpo -c -o elf_getbase.o elf_getbase.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getident.o -MD -MP -MF .deps/elf_getident.Tpo -c -o elf_getident.o elf_getident.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_fsize.o -MD -MP -MF .deps/elf32_fsize.Tpo -c -o elf32_fsize.o elf32_fsize.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_fsize.o -MD -MP -MF .deps/elf64_fsize.Tpo -c -o elf64_fsize.o elf64_fsize.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_fsize.o -MD -MP -MF .deps/gelf_fsize.Tpo -c -o gelf_fsize.o gelf_fsize.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_xlatetof.o -MD -MP -MF .deps/elf32_xlatetof.Tpo -c -o elf32_xlatetof.o elf32_xlatetof.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_xlatetom.o -MD -MP -MF .deps/elf32_xlatetom.Tpo -c -o elf32_xlatetom.o elf32_xlatetom.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_xlatetof.o -MD -MP -MF .deps/elf64_xlatetof.Tpo -c -o elf64_xlatetof.o elf64_xlatetof.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_xlatetom.o -MD -MP -MF .deps/elf64_xlatetom.Tpo -c -o elf64_xlatetom.o elf64_xlatetom.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_xlate.o -MD -MP -MF .deps/gelf_xlate.Tpo -c -o gelf_xlate.o gelf_xlate.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getehdr.o -MD -MP -MF .deps/elf32_getehdr.Tpo -c -o elf32_getehdr.o elf32_getehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getehdr.o -MD -MP -MF .deps/elf64_getehdr.Tpo -c -o elf64_getehdr.o elf64_getehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getehdr.o -MD -MP -MF .deps/gelf_getehdr.Tpo -c -o gelf_getehdr.o gelf_getehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_newehdr.o -MD -MP -MF .deps/elf32_newehdr.Tpo -c -o elf32_newehdr.o elf32_newehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_newehdr.o -MD -MP -MF .deps/elf64_newehdr.Tpo -c -o elf64_newehdr.o elf64_newehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_newehdr.o -MD -MP -MF .deps/gelf_newehdr.Tpo -c -o gelf_newehdr.o gelf_newehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_ehdr.o -MD -MP -MF .deps/gelf_update_ehdr.Tpo -c -o gelf_update_ehdr.o gelf_update_ehdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getphdr.o -MD -MP -MF .deps/elf32_getphdr.Tpo -c -o elf32_getphdr.o elf32_getphdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getphdr.o -MD -MP -MF .deps/elf64_getphdr.Tpo -c -o elf64_getphdr.o elf64_getphdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getphdr.o -MD -MP -MF .deps/gelf_getphdr.Tpo -c -o gelf_getphdr.o gelf_getphdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_newphdr.o -MD -MP -MF .deps/elf32_newphdr.Tpo -c -o elf32_newphdr.o elf32_newphdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_newphdr.o -MD -MP -MF .deps/elf64_newphdr.Tpo -c -o elf64_newphdr.o elf64_newphdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_version.Tpo .deps/elf_version.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_fill.Tpo .deps/elf_fill.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_newphdr.o -MD -MP -MF .deps/gelf_newphdr.Tpo -c -o gelf_newphdr.o gelf_newphdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_kind.Tpo .deps/elf_kind.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getclass.Tpo .deps/gelf_getclass.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_fsize.Tpo .deps/elf32_fsize.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_phdr.o -MD -MP -MF .deps/gelf_update_phdr.Tpo -c -o gelf_update_phdr.o gelf_update_phdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_rand.Tpo .deps/elf_rand.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getarhdr.o -MD -MP -MF .deps/elf_getarhdr.Tpo -c -o elf_getarhdr.o elf_getarhdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getbase.Tpo .deps/elf_getbase.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_fsize.Tpo .deps/elf64_fsize.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getarsym.o -MD -MP -MF .deps/elf_getarsym.Tpo -c -o elf_getarsym.o elf_getarsym.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_rawfile.o -MD -MP -MF .deps/elf_rawfile.Tpo -c -o elf_rawfile.o elf_rawfile.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_readall.o -MD -MP -MF .deps/elf_readall.Tpo -c -o elf_readall.o elf_readall.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getident.Tpo .deps/elf_getident.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_hash.Tpo .deps/elf_hash.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_next.Tpo .deps/elf_next.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_fsize.Tpo .deps/gelf_fsize.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_cntl.o -MD -MP -MF .deps/elf_cntl.Tpo -c -o elf_cntl.o elf_cntl.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_error.Tpo .deps/elf_error.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getscn.o -MD -MP -MF .deps/elf_getscn.Tpo -c -o elf_getscn.o elf_getscn.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_nextscn.o -MD -MP -MF .deps/elf_nextscn.Tpo -c -o elf_nextscn.o elf_nextscn.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_newehdr.Tpo .deps/gelf_newehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_ndxscn.o -MD -MP -MF .deps/elf_ndxscn.Tpo -c -o elf_ndxscn.o elf_ndxscn.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_newscn.o -MD -MP -MF .deps/elf_newscn.Tpo -c -o elf_newscn.o elf_newscn.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getshdr.o -MD -MP -MF .deps/elf32_getshdr.Tpo -c -o elf32_getshdr.o elf32_getshdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getshdr.o -MD -MP -MF .deps/elf64_getshdr.Tpo -c -o elf64_getshdr.o elf64_getshdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getshdr.o -MD -MP -MF .deps/gelf_getshdr.Tpo -c -o gelf_getshdr.o gelf_getshdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_newehdr.Tpo .deps/elf32_newehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_xlatetom.Tpo .deps/elf32_xlatetom.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_getehdr.Tpo .deps/elf64_getehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_newehdr.Tpo .deps/elf64_newehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_getehdr.Tpo .deps/elf32_getehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_xlatetof.Tpo .deps/elf64_xlatetof.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_xlatetof.Tpo .deps/elf32_xlatetof.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_shdr.o -MD -MP -MF .deps/gelf_update_shdr.Tpo -c -o gelf_update_shdr.o gelf_update_shdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_strptr.o -MD -MP -MF .deps/elf_strptr.Tpo -c -o elf_strptr.o elf_strptr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_xlatetom.Tpo .deps/elf64_xlatetom.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_rawdata.o -MD -MP -MF .deps/elf_rawdata.Tpo -c -o elf_rawdata.o elf_rawdata.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getdata.o -MD -MP -MF .deps/elf_getdata.Tpo -c -o elf_getdata.o elf_getdata.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_newdata.o -MD -MP -MF .deps/elf_newdata.Tpo -c -o elf_newdata.o elf_newdata.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getdata_rawchunk.o -MD -MP -MF .deps/elf_getdata_rawchunk.Tpo -c -o elf_getdata_rawchunk.o elf_getdata_rawchunk.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagelf.o -MD -MP -MF .deps/elf_flagelf.Tpo -c -o elf_flagelf.o elf_flagelf.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagehdr.o -MD -MP -MF .deps/elf_flagehdr.Tpo -c -o elf_flagehdr.o elf_flagehdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getehdr.Tpo .deps/gelf_getehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_ehdr.Tpo .deps/gelf_update_ehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagphdr.o -MD -MP -MF .deps/elf_flagphdr.Tpo -c -o elf_flagphdr.o elf_flagphdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagscn.o -MD -MP -MF .deps/elf_flagscn.Tpo -c -o elf_flagscn.o elf_flagscn.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getphdr.Tpo .deps/gelf_getphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_end.Tpo .deps/elf_end.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_newphdr.Tpo .deps/elf32_newphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_newphdr.Tpo .deps/elf64_newphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagshdr.o -MD -MP -MF .deps/elf_flagshdr.Tpo -c -o elf_flagshdr.o elf_flagshdr.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagdata.o -MD -MP -MF .deps/elf_flagdata.Tpo -c -o elf_flagdata.o elf_flagdata.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_memory.o -MD -MP -MF .deps/elf_memory.Tpo -c -o elf_memory.o elf_memory.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_update.o -MD -MP -MF .deps/elf_update.Tpo -c -o elf_update.o elf_update.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_newphdr.Tpo .deps/gelf_newphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_rawfile.Tpo .deps/elf_rawfile.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_updatenull.o -MD -MP -MF .deps/elf32_updatenull.Tpo -c -o elf32_updatenull.o elf32_updatenull.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_updatenull.o -MD -MP -MF .deps/elf64_updatenull.Tpo -c -o elf64_updatenull.o elf64_updatenull.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_ndxscn.Tpo .deps/elf_ndxscn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getarhdr.Tpo .deps/elf_getarhdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_getphdr.Tpo .deps/elf64_getphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_cntl.Tpo .deps/elf_cntl.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getscn.Tpo .deps/elf_getscn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_nextscn.Tpo .deps/elf_nextscn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_rawdata.Tpo .deps/elf_rawdata.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getshdr.Tpo .deps/gelf_getshdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_flagehdr.Tpo .deps/elf_flagehdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_updatefile.o -MD -MP -MF .deps/elf32_updatefile.Tpo -c -o elf32_updatefile.o elf32_updatefile.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_getphdr.Tpo .deps/elf32_getphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_updatefile.o -MD -MP -MF .deps/elf64_updatefile.Tpo -c -o elf64_updatefile.o elf64_updatefile.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_flagelf.Tpo .deps/elf_flagelf.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getsym.o -MD -MP -MF .deps/gelf_getsym.Tpo -c -o gelf_getsym.o gelf_getsym.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_sym.o -MD -MP -MF .deps/gelf_update_sym.Tpo -c -o gelf_update_sym.o gelf_update_sym.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getversym.o -MD -MP -MF .deps/gelf_getversym.Tpo -c -o gelf_getversym.o gelf_getversym.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getverneed.o -MD -MP -MF .deps/gelf_getverneed.Tpo -c -o gelf_getverneed.o gelf_getverneed.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getvernaux.o -MD -MP -MF .deps/gelf_getvernaux.Tpo -c -o gelf_getvernaux.o gelf_getvernaux.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getverdef.o -MD -MP -MF .deps/gelf_getverdef.Tpo -c -o gelf_getverdef.o gelf_getverdef.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getverdaux.o -MD -MP -MF .deps/gelf_getverdaux.Tpo -c -o gelf_getverdaux.o gelf_getverdaux.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getrel.o -MD -MP -MF .deps/gelf_getrel.Tpo -c -o gelf_getrel.o gelf_getrel.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getrela.o -MD -MP -MF .deps/gelf_getrela.Tpo -c -o gelf_getrela.o gelf_getrela.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_newdata.Tpo .deps/elf_newdata.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_rel.o -MD -MP -MF .deps/gelf_update_rel.Tpo -c -o gelf_update_rel.o gelf_update_rel.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_phdr.Tpo .deps/gelf_update_phdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_newscn.Tpo .deps/elf_newscn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_flagphdr.Tpo .deps/elf_flagphdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_flagscn.Tpo .deps/elf_flagscn.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_rela.o -MD -MP -MF .deps/gelf_update_rela.Tpo -c -o gelf_update_rela.o gelf_update_rela.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getdyn.o -MD -MP -MF .deps/gelf_getdyn.Tpo -c -o gelf_getdyn.o gelf_getdyn.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_dyn.o -MD -MP -MF .deps/gelf_update_dyn.Tpo -c -o gelf_update_dyn.o gelf_update_dyn.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_shdr.Tpo .deps/gelf_update_shdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getmove.o -MD -MP -MF .deps/gelf_getmove.Tpo -c -o gelf_getmove.o gelf_getmove.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_move.o -MD -MP -MF .deps/gelf_update_move.Tpo -c -o gelf_update_move.o gelf_update_move.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_readall.Tpo .deps/elf_readall.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getsyminfo.o -MD -MP -MF .deps/gelf_getsyminfo.Tpo -c -o gelf_getsyminfo.o gelf_getsyminfo.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_memory.Tpo .deps/elf_memory.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_syminfo.o -MD -MP -MF .deps/gelf_update_syminfo.Tpo -c -o gelf_update_syminfo.o gelf_update_syminfo.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getdata_rawchunk.Tpo .deps/elf_getdata_rawchunk.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_strptr.Tpo .deps/elf_strptr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_flagshdr.Tpo .deps/elf_flagshdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_flagdata.Tpo .deps/elf_flagdata.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getauxv.o -MD -MP -MF .deps/gelf_getauxv.Tpo -c -o gelf_getauxv.o gelf_getauxv.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_auxv.o -MD -MP -MF .deps/gelf_update_auxv.Tpo -c -o gelf_update_auxv.o gelf_update_auxv.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getnote.o -MD -MP -MF .deps/gelf_getnote.Tpo -c -o gelf_getnote.o gelf_getnote.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_xlatetof.o -MD -MP -MF .deps/gelf_xlatetof.Tpo -c -o gelf_xlatetof.o gelf_xlatetof.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getarsym.Tpo .deps/elf_getarsym.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getversym.Tpo .deps/gelf_getversym.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getverdef.Tpo .deps/gelf_getverdef.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getvernaux.Tpo .deps/gelf_getvernaux.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_xlatetom.o -MD -MP -MF .deps/gelf_xlatetom.Tpo -c -o gelf_xlatetom.o gelf_xlatetom.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getverdaux.Tpo .deps/gelf_getverdaux.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT nlist.o -MD -MP -MF .deps/nlist.Tpo -c -o nlist.o nlist.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getsymshndx.o -MD -MP -MF .deps/gelf_getsymshndx.Tpo -c -o gelf_getsymshndx.o gelf_getsymshndx.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getverneed.Tpo .deps/gelf_getverneed.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_symshndx.o -MD -MP -MF .deps/gelf_update_symshndx.Tpo -c -o gelf_update_symshndx.o gelf_update_symshndx.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getrel.Tpo .deps/gelf_getrel.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_versym.o -MD -MP -MF .deps/gelf_update_versym.Tpo -c -o gelf_update_versym.o gelf_update_versym.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_sym.Tpo .deps/gelf_update_sym.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getsym.Tpo .deps/gelf_getsym.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_verneed.o -MD -MP -MF .deps/gelf_update_verneed.Tpo -c -o gelf_update_verneed.o gelf_update_verneed.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_vernaux.o -MD -MP -MF .deps/gelf_update_vernaux.Tpo -c -o gelf_update_vernaux.o gelf_update_vernaux.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_verdef.o -MD -MP -MF .deps/gelf_update_verdef.Tpo -c -o gelf_update_verdef.o gelf_update_verdef.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_verdaux.o -MD -MP -MF .deps/gelf_update_verdaux.Tpo -c -o gelf_update_verdaux.o gelf_update_verdaux.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_rel.Tpo .deps/gelf_update_rel.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_move.Tpo .deps/gelf_update_move.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getmove.Tpo .deps/gelf_getmove.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getphdrnum.o -MD -MP -MF .deps/elf_getphdrnum.Tpo -c -o elf_getphdrnum.o elf_getphdrnum.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getrela.Tpo .deps/gelf_getrela.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getshdrnum.o -MD -MP -MF .deps/elf_getshdrnum.Tpo -c -o elf_getshdrnum.o elf_getshdrnum.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getshdrstrndx.o -MD -MP -MF .deps/elf_getshdrstrndx.Tpo -c -o elf_getshdrstrndx.o elf_getshdrstrndx.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_checksum.o -MD -MP -MF .deps/gelf_checksum.Tpo -c -o gelf_checksum.o gelf_checksum.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getdyn.Tpo .deps/gelf_getdyn.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_checksum.o -MD -MP -MF .deps/elf32_checksum.Tpo -c -o elf32_checksum.o elf32_checksum.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_dyn.Tpo .deps/gelf_update_dyn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_rela.Tpo .deps/gelf_update_rela.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_update.Tpo .deps/elf_update.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_checksum.o -MD -MP -MF .deps/elf64_checksum.Tpo -c -o elf64_checksum.o elf64_checksum.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT libelf_crc32.o -MD -MP -MF .deps/libelf_crc32.Tpo -c -o libelf_crc32.o libelf_crc32.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT libelf_next_prime.o -MD -MP -MF .deps/libelf_next_prime.Tpo -c -o libelf_next_prime.o libelf_next_prime.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getsyminfo.Tpo .deps/gelf_getsyminfo.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_getshdr.Tpo .deps/elf64_getshdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_clone.o -MD -MP -MF .deps/elf_clone.Tpo -c -o elf_clone.o elf_clone.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_getshdr.Tpo .deps/elf32_getshdr.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getlib.o -MD -MP -MF .deps/gelf_getlib.Tpo -c -o gelf_getlib.o gelf_getlib.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_lib.o -MD -MP -MF .deps/gelf_update_lib.Tpo -c -o gelf_update_lib.o gelf_update_lib.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_syminfo.Tpo .deps/gelf_update_syminfo.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_offscn.o -MD -MP -MF .deps/elf32_offscn.Tpo -c -o elf32_offscn.o elf32_offscn.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_xlatetof.Tpo .deps/gelf_xlatetof.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getdata.Tpo .deps/elf_getdata.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getauxv.Tpo .deps/gelf_getauxv.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_auxv.Tpo .deps/gelf_update_auxv.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/libelf_next_prime.Tpo .deps/libelf_next_prime.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getnote.Tpo .deps/gelf_getnote.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_offscn.o -MD -MP -MF .deps/elf64_offscn.Tpo -c -o elf64_offscn.o elf64_offscn.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_offscn.o -MD -MP -MF .deps/gelf_offscn.Tpo -c -o gelf_offscn.o gelf_offscn.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getaroff.o -MD -MP -MF .deps/elf_getaroff.Tpo -c -o elf_getaroff.o elf_getaroff.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_gnu_hash.o -MD -MP -MF .deps/elf_gnu_hash.Tpo -c -o elf_gnu_hash.o elf_gnu_hash.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_scnshndx.o -MD -MP -MF .deps/elf_scnshndx.Tpo -c -o elf_scnshndx.o elf_scnshndx.c Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getchdr.o -MD -MP -MF .deps/elf32_getchdr.Tpo -c -o elf32_getchdr.o elf32_getchdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_xlatetom.Tpo .deps/gelf_xlatetom.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getchdr.o -MD -MP -MF .deps/elf64_getchdr.Tpo -c -o elf64_getchdr.o elf64_getchdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_versym.Tpo .deps/gelf_update_versym.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_verdaux.Tpo .deps/gelf_update_verdaux.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getchdr.o -MD -MP -MF .deps/gelf_getchdr.Tpo -c -o gelf_getchdr.o gelf_getchdr.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_verdef.Tpo .deps/gelf_update_verdef.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_compress.o -MD -MP -MF .deps/elf_compress.Tpo -c -o elf_compress.o elf_compress.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_checksum.Tpo .deps/gelf_checksum.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/libelf_crc32.Tpo .deps/libelf_crc32.Po Step #21 - "compile-libfuzzer-address-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_compress_gnu.o -MD -MP -MF .deps/elf_compress_gnu.Tpo -c -o elf_compress_gnu.o elf_compress_gnu.c Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_vernaux.Tpo .deps/gelf_update_vernaux.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_version.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_version.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_version.Tpo" `test -f 'elf_version.c' || echo './'`elf_version.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_version.Tpo" >> ".deps/elf_version.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_version.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_version.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_hash.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_hash.Tpo" `test -f 'elf_hash.c' || echo './'`elf_hash.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_hash.Tpo" >> ".deps/elf_hash.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_hash.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_hash.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_verneed.Tpo .deps/gelf_update_verneed.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getsymshndx.Tpo .deps/gelf_getsymshndx.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_error.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_error.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_error.Tpo" `test -f 'elf_error.c' || echo './'`elf_error.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_error.Tpo" >> ".deps/elf_error.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_error.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_error.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_fill.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_fill.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_fill.Tpo" `test -f 'elf_fill.c' || echo './'`elf_fill.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_fill.Tpo" >> ".deps/elf_fill.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_fill.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_fill.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_symshndx.Tpo .deps/gelf_update_symshndx.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_next.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_next.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_next.Tpo" `test -f 'elf_next.c' || echo './'`elf_next.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_next.Tpo" >> ".deps/elf_next.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_next.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_next.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getshdrnum.Tpo .deps/elf_getshdrnum.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_rand.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rand.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_rand.Tpo" `test -f 'elf_rand.c' || echo './'`elf_rand.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_rand.Tpo" >> ".deps/elf_rand.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_rand.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_rand.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_end.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_end.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_end.Tpo" `test -f 'elf_end.c' || echo './'`elf_end.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_end.Tpo" >> ".deps/elf_end.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_end.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_end.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getlib.Tpo .deps/gelf_getlib.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_kind.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_kind.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_kind.Tpo" `test -f 'elf_kind.c' || echo './'`elf_kind.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_kind.Tpo" >> ".deps/elf_kind.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_kind.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_kind.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_update_lib.Tpo .deps/gelf_update_lib.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getclass.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getclass.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getclass.Tpo" `test -f 'gelf_getclass.c' || echo './'`gelf_getclass.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getclass.Tpo" >> ".deps/gelf_getclass.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getclass.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getclass.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getphdrnum.Tpo .deps/elf_getphdrnum.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_clone.Tpo .deps/elf_clone.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getbase.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getbase.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getbase.Tpo" `test -f 'elf_getbase.c' || echo './'`elf_getbase.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getbase.Tpo" >> ".deps/elf_getbase.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getbase.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getbase.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getident.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getident.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getident.Tpo" `test -f 'elf_getident.c' || echo './'`elf_getident.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getident.Tpo" >> ".deps/elf_getident.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getident.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getident.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_offscn.Tpo .deps/elf32_offscn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_checksum.Tpo .deps/elf64_checksum.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_fsize.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_fsize.Tpo" `test -f 'elf32_fsize.c' || echo './'`elf32_fsize.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_fsize.Tpo" >> ".deps/elf32_fsize.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_fsize.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_fsize.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_fsize.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_fsize.Tpo" `test -f 'elf64_fsize.c' || echo './'`elf64_fsize.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_fsize.Tpo" >> ".deps/elf64_fsize.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_fsize.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_fsize.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getaroff.Tpo .deps/elf_getaroff.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_offscn.Tpo .deps/gelf_offscn.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_gnu_hash.Tpo .deps/elf_gnu_hash.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_checksum.Tpo .deps/elf32_checksum.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_fsize.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_fsize.Tpo" `test -f 'gelf_fsize.c' || echo './'`gelf_fsize.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_fsize.Tpo" >> ".deps/gelf_fsize.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_fsize.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_fsize.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetof.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_xlatetof.Tpo" `test -f 'elf32_xlatetof.c' || echo './'`elf32_xlatetof.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_xlatetof.Tpo" >> ".deps/elf32_xlatetof.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_xlatetof.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_xlatetof.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_scnshndx.Tpo .deps/elf_scnshndx.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_getshdrstrndx.Tpo .deps/elf_getshdrstrndx.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_getchdr.Tpo .deps/elf32_getchdr.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetom.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_xlatetom.Tpo" `test -f 'elf32_xlatetom.c' || echo './'`elf32_xlatetom.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_xlatetom.Tpo" >> ".deps/elf32_xlatetom.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_xlatetom.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_xlatetom.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetof.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_xlatetof.Tpo" `test -f 'elf64_xlatetof.c' || echo './'`elf64_xlatetof.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_xlatetof.Tpo" >> ".deps/elf64_xlatetof.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_xlatetof.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_xlatetof.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetom.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_xlatetom.Tpo" `test -f 'elf64_xlatetom.c' || echo './'`elf64_xlatetom.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_xlatetom.Tpo" >> ".deps/elf64_xlatetom.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_xlatetom.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_xlatetom.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_getehdr.Tpo" `test -f 'elf32_getehdr.c' || echo './'`elf32_getehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_getehdr.Tpo" >> ".deps/elf32_getehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_getehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_getehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_getehdr.Tpo" `test -f 'elf64_getehdr.c' || echo './'`elf64_getehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_getehdr.Tpo" >> ".deps/elf64_getehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_getehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_getehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_offscn.Tpo .deps/elf64_offscn.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getehdr.Tpo" `test -f 'gelf_getehdr.c' || echo './'`gelf_getehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getehdr.Tpo" >> ".deps/gelf_getehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_getchdr.Tpo .deps/elf64_getchdr.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/nlist.Tpo .deps/nlist.Po Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_getchdr.Tpo .deps/gelf_getchdr.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_newehdr.Tpo" `test -f 'elf32_newehdr.c' || echo './'`elf32_newehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_newehdr.Tpo" >> ".deps/elf32_newehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_newehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_newehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_newehdr.Tpo" `test -f 'elf64_newehdr.c' || echo './'`elf64_newehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_newehdr.Tpo" >> ".deps/elf64_newehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_newehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_newehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_updatenull.Tpo .deps/elf64_updatenull.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_newehdr.Tpo" `test -f 'gelf_newehdr.c' || echo './'`gelf_newehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_newehdr.Tpo" >> ".deps/gelf_newehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_newehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_newehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_ehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_ehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_ehdr.Tpo" `test -f 'gelf_update_ehdr.c' || echo './'`gelf_update_ehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_ehdr.Tpo" >> ".deps/gelf_update_ehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_ehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_ehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_getphdr.Tpo" `test -f 'elf32_getphdr.c' || echo './'`elf32_getphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_getphdr.Tpo" >> ".deps/elf32_getphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_getphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_getphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_getphdr.Tpo" `test -f 'elf64_getphdr.c' || echo './'`elf64_getphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_getphdr.Tpo" >> ".deps/elf64_getphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_getphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_getphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getphdr.Tpo" `test -f 'gelf_getphdr.c' || echo './'`gelf_getphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getphdr.Tpo" >> ".deps/gelf_getphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_newphdr.Tpo" `test -f 'elf32_newphdr.c' || echo './'`elf32_newphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_newphdr.Tpo" >> ".deps/elf32_newphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_newphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_newphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_newphdr.Tpo" `test -f 'elf64_newphdr.c' || echo './'`elf64_newphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_newphdr.Tpo" >> ".deps/elf64_newphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_newphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_newphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_newphdr.Tpo" `test -f 'gelf_newphdr.c' || echo './'`gelf_newphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_newphdr.Tpo" >> ".deps/gelf_newphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_newphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_newphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_updatenull.Tpo .deps/elf32_updatenull.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_phdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_phdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_phdr.Tpo" `test -f 'gelf_update_phdr.c' || echo './'`gelf_update_phdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_phdr.Tpo" >> ".deps/gelf_update_phdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_phdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_phdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getarhdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarhdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getarhdr.Tpo" `test -f 'elf_getarhdr.c' || echo './'`elf_getarhdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getarhdr.Tpo" >> ".deps/elf_getarhdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getarhdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getarhdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getarsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarsym.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getarsym.Tpo" `test -f 'elf_getarsym.c' || echo './'`elf_getarsym.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getarsym.Tpo" >> ".deps/elf_getarsym.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getarsym.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getarsym.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_rawfile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawfile.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_rawfile.Tpo" `test -f 'elf_rawfile.c' || echo './'`elf_rawfile.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_rawfile.Tpo" >> ".deps/elf_rawfile.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_rawfile.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_rawfile.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_readall.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_readall.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_readall.Tpo" `test -f 'elf_readall.c' || echo './'`elf_readall.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_readall.Tpo" >> ".deps/elf_readall.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_readall.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_readall.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_cntl.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_cntl.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_cntl.Tpo" `test -f 'elf_cntl.c' || echo './'`elf_cntl.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_cntl.Tpo" >> ".deps/elf_cntl.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_cntl.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_cntl.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getscn.Tpo" `test -f 'elf_getscn.c' || echo './'`elf_getscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getscn.Tpo" >> ".deps/elf_getscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_compress_gnu.Tpo .deps/elf_compress_gnu.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_nextscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_nextscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_nextscn.Tpo" `test -f 'elf_nextscn.c' || echo './'`elf_nextscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_nextscn.Tpo" >> ".deps/elf_nextscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_nextscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_nextscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_ndxscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_ndxscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_ndxscn.Tpo" `test -f 'elf_ndxscn.c' || echo './'`elf_ndxscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_ndxscn.Tpo" >> ".deps/elf_ndxscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_ndxscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_ndxscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_newscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_newscn.Tpo" `test -f 'elf_newscn.c' || echo './'`elf_newscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_newscn.Tpo" >> ".deps/elf_newscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_newscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_newscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getshdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_getshdr.Tpo" `test -f 'elf32_getshdr.c' || echo './'`elf32_getshdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_getshdr.Tpo" >> ".deps/elf32_getshdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_getshdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_getshdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getshdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_getshdr.Tpo" `test -f 'elf64_getshdr.c' || echo './'`elf64_getshdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_getshdr.Tpo" >> ".deps/elf64_getshdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_getshdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_getshdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getshdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getshdr.Tpo" `test -f 'gelf_getshdr.c' || echo './'`gelf_getshdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getshdr.Tpo" >> ".deps/gelf_getshdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getshdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getshdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_shdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_shdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_shdr.Tpo" `test -f 'gelf_update_shdr.c' || echo './'`gelf_update_shdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_shdr.Tpo" >> ".deps/gelf_update_shdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_shdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_shdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_strptr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_strptr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_strptr.Tpo" `test -f 'elf_strptr.c' || echo './'`elf_strptr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_strptr.Tpo" >> ".deps/elf_strptr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_strptr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_strptr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_rawdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawdata.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_rawdata.Tpo" `test -f 'elf_rawdata.c' || echo './'`elf_rawdata.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_rawdata.Tpo" >> ".deps/elf_rawdata.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_rawdata.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_rawdata.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getdata.Tpo" `test -f 'elf_getdata.c' || echo './'`elf_getdata.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getdata.Tpo" >> ".deps/elf_getdata.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getdata.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getdata.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_newdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newdata.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_newdata.Tpo" `test -f 'elf_newdata.c' || echo './'`elf_newdata.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_newdata.Tpo" >> ".deps/elf_newdata.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_newdata.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_newdata.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getdata_rawchunk.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata_rawchunk.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getdata_rawchunk.Tpo" `test -f 'elf_getdata_rawchunk.c' || echo './'`elf_getdata_rawchunk.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getdata_rawchunk.Tpo" >> ".deps/elf_getdata_rawchunk.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getdata_rawchunk.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getdata_rawchunk.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagelf.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagelf.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_flagelf.Tpo" `test -f 'elf_flagelf.c' || echo './'`elf_flagelf.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_flagelf.Tpo" >> ".deps/elf_flagelf.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_flagelf.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_flagelf.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagehdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_flagehdr.Tpo" `test -f 'elf_flagehdr.c' || echo './'`elf_flagehdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_flagehdr.Tpo" >> ".deps/elf_flagehdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_flagehdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_flagehdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagphdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_flagphdr.Tpo" `test -f 'elf_flagphdr.c' || echo './'`elf_flagphdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_flagphdr.Tpo" >> ".deps/elf_flagphdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_flagphdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_flagphdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_flagscn.Tpo" `test -f 'elf_flagscn.c' || echo './'`elf_flagscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_flagscn.Tpo" >> ".deps/elf_flagscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_flagscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_flagscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagshdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_flagshdr.Tpo" `test -f 'elf_flagshdr.c' || echo './'`elf_flagshdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_flagshdr.Tpo" >> ".deps/elf_flagshdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_flagshdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_flagshdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagdata.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_flagdata.Tpo" `test -f 'elf_flagdata.c' || echo './'`elf_flagdata.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_flagdata.Tpo" >> ".deps/elf_flagdata.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_flagdata.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_flagdata.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_memory.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_memory.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_memory.Tpo" `test -f 'elf_memory.c' || echo './'`elf_memory.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_memory.Tpo" >> ".deps/elf_memory.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_memory.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_memory.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_update.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_update.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_update.Tpo" `test -f 'elf_update.c' || echo './'`elf_update.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_update.Tpo" >> ".deps/elf_update.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_update.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_update.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatenull.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_updatenull.Tpo" `test -f 'elf32_updatenull.c' || echo './'`elf32_updatenull.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_updatenull.Tpo" >> ".deps/elf32_updatenull.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_updatenull.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_updatenull.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatenull.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_updatenull.Tpo" `test -f 'elf64_updatenull.c' || echo './'`elf64_updatenull.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_updatenull.Tpo" >> ".deps/elf64_updatenull.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_updatenull.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_updatenull.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_begin.Tpo .deps/elf_begin.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsym.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getsym.Tpo" `test -f 'gelf_getsym.c' || echo './'`gelf_getsym.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getsym.Tpo" >> ".deps/gelf_getsym.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getsym.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getsym.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_sym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_sym.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_sym.Tpo" `test -f 'gelf_update_sym.c' || echo './'`gelf_update_sym.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_sym.Tpo" >> ".deps/gelf_update_sym.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_sym.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_sym.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getversym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getversym.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getversym.Tpo" `test -f 'gelf_getversym.c' || echo './'`gelf_getversym.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getversym.Tpo" >> ".deps/gelf_getversym.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getversym.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getversym.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getverneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverneed.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getverneed.Tpo" `test -f 'gelf_getverneed.c' || echo './'`gelf_getverneed.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getverneed.Tpo" >> ".deps/gelf_getverneed.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getverneed.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getverneed.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getvernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getvernaux.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getvernaux.Tpo" `test -f 'gelf_getvernaux.c' || echo './'`gelf_getvernaux.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getvernaux.Tpo" >> ".deps/gelf_getvernaux.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getvernaux.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getvernaux.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getverdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdef.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getverdef.Tpo" `test -f 'gelf_getverdef.c' || echo './'`gelf_getverdef.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getverdef.Tpo" >> ".deps/gelf_getverdef.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getverdef.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getverdef.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getverdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdaux.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getverdaux.Tpo" `test -f 'gelf_getverdaux.c' || echo './'`gelf_getverdaux.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getverdaux.Tpo" >> ".deps/gelf_getverdaux.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getverdaux.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getverdaux.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getrel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrel.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getrel.Tpo" `test -f 'gelf_getrel.c' || echo './'`gelf_getrel.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getrel.Tpo" >> ".deps/gelf_getrel.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getrel.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getrel.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getrela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrela.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getrela.Tpo" `test -f 'gelf_getrela.c' || echo './'`gelf_getrela.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getrela.Tpo" >> ".deps/gelf_getrela.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getrela.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getrela.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_rel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rel.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_rel.Tpo" `test -f 'gelf_update_rel.c' || echo './'`gelf_update_rel.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_rel.Tpo" >> ".deps/gelf_update_rel.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_rel.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_rel.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_rela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rela.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_rela.Tpo" `test -f 'gelf_update_rela.c' || echo './'`gelf_update_rela.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_rela.Tpo" >> ".deps/gelf_update_rela.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_rela.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_rela.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf_compress.Tpo .deps/elf_compress.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getdyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getdyn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getdyn.Tpo" `test -f 'gelf_getdyn.c' || echo './'`gelf_getdyn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getdyn.Tpo" >> ".deps/gelf_getdyn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getdyn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getdyn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_dyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_dyn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_dyn.Tpo" `test -f 'gelf_update_dyn.c' || echo './'`gelf_update_dyn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_dyn.Tpo" >> ".deps/gelf_update_dyn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_dyn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_dyn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getmove.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getmove.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getmove.Tpo" `test -f 'gelf_getmove.c' || echo './'`gelf_getmove.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getmove.Tpo" >> ".deps/gelf_getmove.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getmove.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getmove.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_move.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_move.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_move.Tpo" `test -f 'gelf_update_move.c' || echo './'`gelf_update_move.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_move.Tpo" >> ".deps/gelf_update_move.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_move.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_move.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getsyminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsyminfo.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getsyminfo.Tpo" `test -f 'gelf_getsyminfo.c' || echo './'`gelf_getsyminfo.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getsyminfo.Tpo" >> ".deps/gelf_getsyminfo.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getsyminfo.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getsyminfo.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_syminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_syminfo.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_syminfo.Tpo" `test -f 'gelf_update_syminfo.c' || echo './'`gelf_update_syminfo.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_syminfo.Tpo" >> ".deps/gelf_update_syminfo.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_syminfo.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_syminfo.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getauxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getauxv.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getauxv.Tpo" `test -f 'gelf_getauxv.c' || echo './'`gelf_getauxv.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getauxv.Tpo" >> ".deps/gelf_getauxv.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getauxv.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getauxv.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_auxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_auxv.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_auxv.Tpo" `test -f 'gelf_update_auxv.c' || echo './'`gelf_update_auxv.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_auxv.Tpo" >> ".deps/gelf_update_auxv.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_auxv.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_auxv.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getnote.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getnote.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getnote.Tpo" `test -f 'gelf_getnote.c' || echo './'`gelf_getnote.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getnote.Tpo" >> ".deps/gelf_getnote.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getnote.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getnote.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf64_updatefile.Tpo .deps/elf64_updatefile.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetof.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_xlatetof.Tpo" `test -f 'gelf_xlatetof.c' || echo './'`gelf_xlatetof.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_xlatetof.Tpo" >> ".deps/gelf_xlatetof.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_xlatetof.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_xlatetof.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetom.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_xlatetom.Tpo" `test -f 'gelf_xlatetom.c' || echo './'`gelf_xlatetom.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_xlatetom.Tpo" >> ".deps/gelf_xlatetom.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_xlatetom.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_xlatetom.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o nlist.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT nlist.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/nlist.Tpo" `test -f 'nlist.c' || echo './'`nlist.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/nlist.Tpo" >> ".deps/nlist.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/nlist.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/nlist.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getsymshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsymshndx.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getsymshndx.Tpo" `test -f 'gelf_getsymshndx.c' || echo './'`gelf_getsymshndx.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getsymshndx.Tpo" >> ".deps/gelf_getsymshndx.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getsymshndx.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getsymshndx.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/elf32_updatefile.Tpo .deps/elf32_updatefile.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_symshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_symshndx.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_symshndx.Tpo" `test -f 'gelf_update_symshndx.c' || echo './'`gelf_update_symshndx.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_symshndx.Tpo" >> ".deps/gelf_update_symshndx.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_symshndx.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_symshndx.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_versym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_versym.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_versym.Tpo" `test -f 'gelf_update_versym.c' || echo './'`gelf_update_versym.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_versym.Tpo" >> ".deps/gelf_update_versym.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_versym.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_versym.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_verneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verneed.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_verneed.Tpo" `test -f 'gelf_update_verneed.c' || echo './'`gelf_update_verneed.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_verneed.Tpo" >> ".deps/gelf_update_verneed.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_verneed.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_verneed.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_vernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_vernaux.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_vernaux.Tpo" `test -f 'gelf_update_vernaux.c' || echo './'`gelf_update_vernaux.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_vernaux.Tpo" >> ".deps/gelf_update_vernaux.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_vernaux.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_vernaux.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_verdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdef.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_verdef.Tpo" `test -f 'gelf_update_verdef.c' || echo './'`gelf_update_verdef.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_verdef.Tpo" >> ".deps/gelf_update_verdef.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_verdef.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_verdef.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_verdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdaux.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_verdaux.Tpo" `test -f 'gelf_update_verdaux.c' || echo './'`gelf_update_verdaux.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_verdaux.Tpo" >> ".deps/gelf_update_verdaux.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_verdaux.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_verdaux.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getphdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getphdrnum.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getphdrnum.Tpo" `test -f 'elf_getphdrnum.c' || echo './'`elf_getphdrnum.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getphdrnum.Tpo" >> ".deps/elf_getphdrnum.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getphdrnum.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getphdrnum.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getshdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrnum.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getshdrnum.Tpo" `test -f 'elf_getshdrnum.c' || echo './'`elf_getshdrnum.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getshdrnum.Tpo" >> ".deps/elf_getshdrnum.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getshdrnum.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getshdrnum.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getshdrstrndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrstrndx.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getshdrstrndx.Tpo" `test -f 'elf_getshdrstrndx.c' || echo './'`elf_getshdrstrndx.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getshdrstrndx.Tpo" >> ".deps/elf_getshdrstrndx.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getshdrstrndx.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getshdrstrndx.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_checksum.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_checksum.Tpo" `test -f 'gelf_checksum.c' || echo './'`gelf_checksum.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_checksum.Tpo" >> ".deps/gelf_checksum.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_checksum.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_checksum.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_checksum.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_checksum.Tpo" `test -f 'elf32_checksum.c' || echo './'`elf32_checksum.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_checksum.Tpo" >> ".deps/elf32_checksum.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_checksum.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_checksum.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_checksum.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_checksum.Tpo" `test -f 'elf64_checksum.c' || echo './'`elf64_checksum.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_checksum.Tpo" >> ".deps/elf64_checksum.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_checksum.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_checksum.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o libelf_crc32.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_crc32.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/libelf_crc32.Tpo" `test -f 'libelf_crc32.c' || echo './'`libelf_crc32.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/libelf_crc32.Tpo" >> ".deps/libelf_crc32.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/libelf_crc32.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/libelf_crc32.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o libelf_next_prime.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_next_prime.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/libelf_next_prime.Tpo" `test -f 'libelf_next_prime.c' || echo './'`libelf_next_prime.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/libelf_next_prime.Tpo" >> ".deps/libelf_next_prime.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/libelf_next_prime.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/libelf_next_prime.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_clone.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_clone.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_clone.Tpo" `test -f 'elf_clone.c' || echo './'`elf_clone.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_clone.Tpo" >> ".deps/elf_clone.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_clone.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_clone.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getlib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getlib.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getlib.Tpo" `test -f 'gelf_getlib.c' || echo './'`gelf_getlib.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getlib.Tpo" >> ".deps/gelf_getlib.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getlib.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getlib.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_lib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_lib.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_update_lib.Tpo" `test -f 'gelf_update_lib.c' || echo './'`gelf_update_lib.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_update_lib.Tpo" >> ".deps/gelf_update_lib.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_update_lib.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_update_lib.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_offscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_offscn.Tpo" `test -f 'elf32_offscn.c' || echo './'`elf32_offscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_offscn.Tpo" >> ".deps/elf32_offscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_offscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_offscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_offscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_offscn.Tpo" `test -f 'elf64_offscn.c' || echo './'`elf64_offscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_offscn.Tpo" >> ".deps/elf64_offscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_offscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_offscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_offscn.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_offscn.Tpo" `test -f 'gelf_offscn.c' || echo './'`gelf_offscn.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_offscn.Tpo" >> ".deps/gelf_offscn.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_offscn.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_offscn.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getaroff.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getaroff.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_getaroff.Tpo" `test -f 'elf_getaroff.c' || echo './'`elf_getaroff.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_getaroff.Tpo" >> ".deps/elf_getaroff.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_getaroff.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_getaroff.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_gnu_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_gnu_hash.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_gnu_hash.Tpo" `test -f 'elf_gnu_hash.c' || echo './'`elf_gnu_hash.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_gnu_hash.Tpo" >> ".deps/elf_gnu_hash.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_gnu_hash.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_gnu_hash.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_scnshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_scnshndx.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_scnshndx.Tpo" `test -f 'elf_scnshndx.c' || echo './'`elf_scnshndx.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_scnshndx.Tpo" >> ".deps/elf_scnshndx.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_scnshndx.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_scnshndx.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getchdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_getchdr.Tpo" `test -f 'elf32_getchdr.c' || echo './'`elf32_getchdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_getchdr.Tpo" >> ".deps/elf32_getchdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_getchdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_getchdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getchdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_getchdr.Tpo" `test -f 'elf64_getchdr.c' || echo './'`elf64_getchdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_getchdr.Tpo" >> ".deps/elf64_getchdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_getchdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_getchdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getchdr.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_getchdr.Tpo" `test -f 'gelf_getchdr.c' || echo './'`gelf_getchdr.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_getchdr.Tpo" >> ".deps/gelf_getchdr.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_getchdr.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_getchdr.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_compress.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_compress.Tpo" `test -f 'elf_compress.c' || echo './'`elf_compress.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_compress.Tpo" >> ".deps/elf_compress.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_compress.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_compress.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_compress_gnu.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress_gnu.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_compress_gnu.Tpo" `test -f 'elf_compress_gnu.c' || echo './'`elf_compress_gnu.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_compress_gnu.Tpo" >> ".deps/elf_compress_gnu.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_compress_gnu.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_compress_gnu.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": mv -f .deps/gelf_xlate.Tpo .deps/gelf_xlate.Po Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_begin.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_begin.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf_begin.Tpo" `test -f 'elf_begin.c' || echo './'`elf_begin.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf_begin.Tpo" >> ".deps/elf_begin.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf_begin.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf_begin.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatefile.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf32_updatefile.Tpo" `test -f 'elf32_updatefile.c' || echo './'`elf32_updatefile.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf32_updatefile.Tpo" >> ".deps/elf32_updatefile.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf32_updatefile.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf32_updatefile.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatefile.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/elf64_updatefile.Tpo" `test -f 'elf64_updatefile.c' || echo './'`elf64_updatefile.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/elf64_updatefile.Tpo" >> ".deps/elf64_updatefile.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/elf64_updatefile.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/elf64_updatefile.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": rm -f libelf.a Step #21 - "compile-libfuzzer-address-x86_64": ar cr libelf.a elf_version.o elf_hash.o elf_error.o elf_fill.o elf_begin.o elf_next.o elf_rand.o elf_end.o elf_kind.o gelf_getclass.o elf_getbase.o elf_getident.o elf32_fsize.o elf64_fsize.o gelf_fsize.o elf32_xlatetof.o elf32_xlatetom.o elf64_xlatetof.o elf64_xlatetom.o gelf_xlate.o elf32_getehdr.o elf64_getehdr.o gelf_getehdr.o elf32_newehdr.o elf64_newehdr.o gelf_newehdr.o gelf_update_ehdr.o elf32_getphdr.o elf64_getphdr.o gelf_getphdr.o elf32_newphdr.o elf64_newphdr.o gelf_newphdr.o gelf_update_phdr.o elf_getarhdr.o elf_getarsym.o elf_rawfile.o elf_readall.o elf_cntl.o elf_getscn.o elf_nextscn.o elf_ndxscn.o elf_newscn.o elf32_getshdr.o elf64_getshdr.o gelf_getshdr.o gelf_update_shdr.o elf_strptr.o elf_rawdata.o elf_getdata.o elf_newdata.o elf_getdata_rawchunk.o elf_flagelf.o elf_flagehdr.o elf_flagphdr.o elf_flagscn.o elf_flagshdr.o elf_flagdata.o elf_memory.o elf_update.o elf32_updatenull.o elf64_updatenull.o elf32_updatefile.o elf64_updatefile.o gelf_getsym.o gelf_update_sym.o gelf_getversym.o gelf_getverneed.o gelf_getvernaux.o gelf_getverdef.o gelf_getverdaux.o gelf_getrel.o gelf_getrela.o gelf_update_rel.o gelf_update_rela.o gelf_getdyn.o gelf_update_dyn.o gelf_getmove.o gelf_update_move.o gelf_getsyminfo.o gelf_update_syminfo.o gelf_getauxv.o gelf_update_auxv.o gelf_getnote.o gelf_xlatetof.o gelf_xlatetom.o nlist.o gelf_getsymshndx.o gelf_update_symshndx.o gelf_update_versym.o gelf_update_verneed.o gelf_update_vernaux.o gelf_update_verdef.o gelf_update_verdaux.o elf_getphdrnum.o elf_getshdrnum.o elf_getshdrstrndx.o gelf_checksum.o elf32_checksum.o elf64_checksum.o libelf_crc32.o libelf_next_prime.o elf_clone.o gelf_getlib.o gelf_update_lib.o elf32_offscn.o elf64_offscn.o gelf_offscn.o elf_getaroff.o elf_gnu_hash.o elf_scnshndx.o elf32_getchdr.o elf64_getchdr.o gelf_getchdr.o elf_compress.o elf_compress_gnu.o Step #21 - "compile-libfuzzer-address-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_xlate.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlate.os -MD -MP \ Step #21 - "compile-libfuzzer-address-x86_64": -MF ".deps/gelf_xlate.Tpo" `test -f 'gelf_xlate.c' || echo './'`gelf_xlate.c; \ Step #21 - "compile-libfuzzer-address-x86_64": then cat ".deps/gelf_xlate.Tpo" >> ".deps/gelf_xlate.Po"; \ Step #21 - "compile-libfuzzer-address-x86_64": rm -f ".deps/gelf_xlate.Tpo"; \ Step #21 - "compile-libfuzzer-address-x86_64": else rm -f ".deps/gelf_xlate.Tpo"; exit 1; \ Step #21 - "compile-libfuzzer-address-x86_64": fi Step #21 - "compile-libfuzzer-address-x86_64": ranlib libelf.a Step #21 - "compile-libfuzzer-address-x86_64": rm -f libelf_pic.a Step #21 - "compile-libfuzzer-address-x86_64": ar cr libelf_pic.a elf_version.os elf_hash.os elf_error.os elf_fill.os elf_begin.os elf_next.os elf_rand.os elf_end.os elf_kind.os gelf_getclass.os elf_getbase.os elf_getident.os elf32_fsize.os elf64_fsize.os gelf_fsize.os elf32_xlatetof.os elf32_xlatetom.os elf64_xlatetof.os elf64_xlatetom.os gelf_xlate.os elf32_getehdr.os elf64_getehdr.os gelf_getehdr.os elf32_newehdr.os elf64_newehdr.os gelf_newehdr.os gelf_update_ehdr.os elf32_getphdr.os elf64_getphdr.os gelf_getphdr.os elf32_newphdr.os elf64_newphdr.os gelf_newphdr.os gelf_update_phdr.os elf_getarhdr.os elf_getarsym.os elf_rawfile.os elf_readall.os elf_cntl.os elf_getscn.os elf_nextscn.os elf_ndxscn.os elf_newscn.os elf32_getshdr.os elf64_getshdr.os gelf_getshdr.os gelf_update_shdr.os elf_strptr.os elf_rawdata.os elf_getdata.os elf_newdata.os elf_getdata_rawchunk.os elf_flagelf.os elf_flagehdr.os elf_flagphdr.os elf_flagscn.os elf_flagshdr.os elf_flagdata.os elf_memory.os elf_update.os elf32_updatenull.os elf64_updatenull.os elf32_updatefile.os elf64_updatefile.os gelf_getsym.os gelf_update_sym.os gelf_getversym.os gelf_getverneed.os gelf_getvernaux.os gelf_getverdef.os gelf_getverdaux.os gelf_getrel.os gelf_getrela.os gelf_update_rel.os gelf_update_rela.os gelf_getdyn.os gelf_update_dyn.os gelf_getmove.os gelf_update_move.os gelf_getsyminfo.os gelf_update_syminfo.os gelf_getauxv.os gelf_update_auxv.os gelf_getnote.os gelf_xlatetof.os gelf_xlatetom.os nlist.os gelf_getsymshndx.os gelf_update_symshndx.os gelf_update_versym.os gelf_update_verneed.os gelf_update_vernaux.os gelf_update_verdef.os gelf_update_verdaux.os elf_getphdrnum.os elf_getshdrnum.os elf_getshdrstrndx.os gelf_checksum.os elf32_checksum.os elf64_checksum.os libelf_crc32.os libelf_next_prime.os elf_clone.os gelf_getlib.os gelf_update_lib.os elf32_offscn.os elf64_offscn.os gelf_offscn.os elf_getaroff.os elf_gnu_hash.os elf_scnshndx.os elf32_getchdr.os elf64_getchdr.os gelf_getchdr.os elf_compress.os elf_compress_gnu.os Step #21 - "compile-libfuzzer-address-x86_64": ranlib libelf_pic.a Step #21 - "compile-libfuzzer-address-x86_64": clang -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -Wl,--build-id -o libelf.so -shared -Wl,-z,relro -o libelf.so \ Step #21 - "compile-libfuzzer-address-x86_64": -Wl,--soname,libelf.so.1 \ Step #21 - "compile-libfuzzer-address-x86_64": -Wl,--version-script,libelf.map \ Step #21 - "compile-libfuzzer-address-x86_64": \ Step #21 - "compile-libfuzzer-address-x86_64": -Wl,--whole-archive libelf_pic.a -Wl,--no-whole-archive \ Step #21 - "compile-libfuzzer-address-x86_64": ../lib/libeu.a -lz Step #21 - "compile-libfuzzer-address-x86_64": ln -fs libelf.so libelf.so.1 Step #21 - "compile-libfuzzer-address-x86_64": make: Leaving directory '/src/libbpf/elfutils/libelf' Step #21 - "compile-libfuzzer-address-x86_64": + make -C src BUILD_STATIC_ONLY=y V=1 clean Step #21 - "compile-libfuzzer-address-x86_64": make: Entering directory '/src/libbpf/src' Step #21 - "compile-libfuzzer-address-x86_64": Package libelf was not found in the pkg-config search path. Step #21 - "compile-libfuzzer-address-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #21 - "compile-libfuzzer-address-x86_64": to the PKG_CONFIG_PATH environment variable Step #21 - "compile-libfuzzer-address-x86_64": No package 'libelf' found Step #21 - "compile-libfuzzer-address-x86_64": rm -rf *.o *.a *.so *.so.* *.pc ./sharedobjs ./staticobjs Step #21 - "compile-libfuzzer-address-x86_64": make: Leaving directory '/src/libbpf/src' Step #21 - "compile-libfuzzer-address-x86_64": ++ nproc Step #21 - "compile-libfuzzer-address-x86_64": ++ pwd Step #21 - "compile-libfuzzer-address-x86_64": + make -C src -j32 'CFLAGS=-I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' BUILD_STATIC_ONLY=y V=1 Step #21 - "compile-libfuzzer-address-x86_64": make: Entering directory '/src/libbpf/src' Step #21 - "compile-libfuzzer-address-x86_64": Package libelf was not found in the pkg-config search path. Step #21 - "compile-libfuzzer-address-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #21 - "compile-libfuzzer-address-x86_64": to the PKG_CONFIG_PATH environment variable Step #21 - "compile-libfuzzer-address-x86_64": No package 'libelf' found Step #21 - "compile-libfuzzer-address-x86_64": mkdir -p staticobjs Step #21 - "compile-libfuzzer-address-x86_64": sed -e "s|@PREFIX@|/usr|" \ Step #21 - "compile-libfuzzer-address-x86_64": -e "s|@LIBDIR@|$\{prefix\}/lib64|" \ Step #21 - "compile-libfuzzer-address-x86_64": -e "s|@VERSION@|1.4.0|" \ Step #21 - "compile-libfuzzer-address-x86_64": < libbpf.pc.template > libbpf.pc Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf.c -o staticobjs/bpf.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf.c -o staticobjs/btf.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf.c -o staticobjs/libbpf.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_errno.c -o staticobjs/libbpf_errno.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c netlink.c -o staticobjs/netlink.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c nlattr.c -o staticobjs/nlattr.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c str_error.c -o staticobjs/str_error.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_probes.c -o staticobjs/libbpf_probes.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf_prog_linfo.c -o staticobjs/bpf_prog_linfo.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf_dump.c -o staticobjs/btf_dump.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c hashmap.c -o staticobjs/hashmap.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c ringbuf.c -o staticobjs/ringbuf.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c strset.c -o staticobjs/strset.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c linker.c -o staticobjs/linker.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c gen_loader.c -o staticobjs/gen_loader.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c relo_core.c -o staticobjs/relo_core.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c usdt.c -o staticobjs/usdt.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c zip.c -o staticobjs/zip.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c elf.c -o staticobjs/elf.o Step #21 - "compile-libfuzzer-address-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c features.c -o staticobjs/features.o Step #21 - "compile-libfuzzer-address-x86_64": ar rcs libbpf.a staticobjs/bpf.o staticobjs/btf.o staticobjs/libbpf.o staticobjs/libbpf_errno.o staticobjs/netlink.o staticobjs/nlattr.o staticobjs/str_error.o staticobjs/libbpf_probes.o staticobjs/bpf_prog_linfo.o staticobjs/btf_dump.o staticobjs/hashmap.o staticobjs/ringbuf.o staticobjs/strset.o staticobjs/linker.o staticobjs/gen_loader.o staticobjs/relo_core.o staticobjs/usdt.o staticobjs/zip.o staticobjs/elf.o staticobjs/features.o Step #21 - "compile-libfuzzer-address-x86_64": make: Leaving directory '/src/libbpf/src' Step #21 - "compile-libfuzzer-address-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o Step #21 - "compile-libfuzzer-address-x86_64": ++ pwd Step #21 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer bpf-object-fuzzer.o src/libbpf.a /src/libbpf/elfutils/libelf/libelf.a -l:libz.a -o /workspace/out/libfuzzer-address-x86_64/bpf-object-fuzzer Step #21 - "compile-libfuzzer-address-x86_64": + cp fuzz/bpf-object-fuzzer_seed_corpus.zip /workspace/out/libfuzzer-address-x86_64 Finished Step #21 - "compile-libfuzzer-address-x86_64" Starting Step #22 - "build-check-libfuzzer-address-x86_64" Step #22 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpz8wi4ydv/bpf-object-fuzzer Finished Step #22 - "build-check-libfuzzer-address-x86_64" Starting Step #23 Step #23: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #23 Starting Step #24 Step #24: Already have image: gcr.io/oss-fuzz/libbpf Step #24: adding: bpf-object-fuzzer (deflated 64%) Step #24: adding: bpf-object-fuzzer_seed_corpus.zip (stored 0%) Step #24: adding: llvm-symbolizer (deflated 64%) Finished Step #24 Starting Step #25 Step #25: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #25: % Total % Received % Xferd Average Speed Time Time Time Current Step #25: Dload Upload Total Spent Left Speed Step #25: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 147 0 0 100 147 0 646 --:--:-- --:--:-- --:--:-- 647 Finished Step #25 Starting Step #26 Step #26: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #26: % Total % Received % Xferd Average Speed Time Time Time Current Step #26: Dload Upload Total Spent Left Speed Step #26: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4283k 0 0 100 4283k 0 13.4M --:--:-- --:--:-- --:--:-- 13.5M Finished Step #26 Starting Step #27 Step #27: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #27: % Total % Received % Xferd Average Speed Time Time Time Current Step #27: Dload Upload Total Spent Left Speed Step #27: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 18 0 0 100 18 0 65 --:--:-- --:--:-- --:--:-- 65 Finished Step #27 Starting Step #28 Step #28: Already have image (with digest): gcr.io/cloud-builders/curl Step #28: % Total % Received % Xferd Average Speed Time Time Time Current Step #28: Dload Upload Total Spent Left Speed Step #28: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 130 --:--:-- --:--:-- --:--:-- 130 Finished Step #28 Starting Step #29 Step #29: Already have image: gcr.io/oss-fuzz/libbpf Finished Step #29 Starting Step #30 - "compile-libfuzzer-address-i386" Step #30 - "compile-libfuzzer-address-i386": Already have image (with digest): gcr.io/cloud-builders/docker Step #30 - "compile-libfuzzer-address-i386": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-address-i386": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #30 - "compile-libfuzzer-address-i386": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-address-i386": CC=clang Step #30 - "compile-libfuzzer-address-i386": CXX=clang++ Step #30 - "compile-libfuzzer-address-i386": CFLAGS=-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #30 - "compile-libfuzzer-address-i386": CXXFLAGS=-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #30 - "compile-libfuzzer-address-i386": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #30 - "compile-libfuzzer-address-i386": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-address-i386": + ./scripts/build-fuzzers.sh Step #30 - "compile-libfuzzer-address-i386": + SANITIZER=address Step #30 - "compile-libfuzzer-address-i386": + flags='-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize=fuzzer-no-link' Step #30 - "compile-libfuzzer-address-i386": + export CC=clang Step #30 - "compile-libfuzzer-address-i386": + CC=clang Step #30 - "compile-libfuzzer-address-i386": + export 'CFLAGS=-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #30 - "compile-libfuzzer-address-i386": + CFLAGS='-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #30 - "compile-libfuzzer-address-i386": + export CXX=clang++ Step #30 - "compile-libfuzzer-address-i386": + CXX=clang++ Step #30 - "compile-libfuzzer-address-i386": + export 'CXXFLAGS=-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #30 - "compile-libfuzzer-address-i386": + CXXFLAGS='-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #30 - "compile-libfuzzer-address-i386": ++ dirname -- ./scripts/build-fuzzers.sh Step #30 - "compile-libfuzzer-address-i386": + cd ./scripts/.. Step #30 - "compile-libfuzzer-address-i386": + export OUT=/workspace/out/libfuzzer-address-i386 Step #30 - "compile-libfuzzer-address-i386": + OUT=/workspace/out/libfuzzer-address-i386 Step #30 - "compile-libfuzzer-address-i386": + mkdir -p /workspace/out/libfuzzer-address-i386 Step #30 - "compile-libfuzzer-address-i386": + export LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #30 - "compile-libfuzzer-address-i386": + LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #30 - "compile-libfuzzer-address-i386": + [[ address == memory ]] Step #30 - "compile-libfuzzer-address-i386": + [[ address == undefined ]] Step #30 - "compile-libfuzzer-address-i386": + rm -rf elfutils Step #30 - "compile-libfuzzer-address-i386": + git clone https://sourceware.org/git/elfutils.git Step #30 - "compile-libfuzzer-address-i386": Cloning into 'elfutils'... Step #30 - "compile-libfuzzer-address-i386": remote: Enumerating objects: 38615, done. Step #30 - "compile-libfuzzer-address-i386": remote: Counting objects: 0% (1/38615) remote: Counting objects: 1% (387/38615) remote: Counting objects: 2% (773/38615) remote: Counting objects: 3% (1159/38615) remote: Counting objects: 4% (1545/38615) remote: Counting objects: 5% (1931/38615) remote: Counting objects: 6% (2317/38615) remote: Counting objects: 7% (2704/38615) remote: Counting objects: 8% (3090/38615) remote: Counting objects: 9% (3476/38615) remote: Counting objects: 10% (3862/38615) remote: Counting objects: 11% (4248/38615) remote: Counting objects: 12% (4634/38615) remote: Counting objects: 13% (5020/38615) remote: Counting objects: 14% (5407/38615) remote: Counting objects: 15% (5793/38615) remote: Counting objects: 16% (6179/38615) remote: Counting objects: 17% (6565/38615) remote: Counting objects: 18% (6951/38615) remote: Counting objects: 19% (7337/38615) remote: Counting objects: 20% (7723/38615) remote: Counting objects: 21% (8110/38615) remote: Counting objects: 22% (8496/38615) remote: Counting objects: 23% (8882/38615) remote: Counting objects: 24% (9268/38615) remote: Counting objects: 25% (9654/38615) remote: Counting objects: 26% (10040/38615) remote: Counting objects: 27% (10427/38615) remote: Counting objects: 28% (10813/38615) remote: Counting objects: 29% (11199/38615) remote: Counting objects: 30% (11585/38615) remote: Counting objects: 31% (11971/38615) remote: Counting objects: 32% (12357/38615) remote: Counting objects: 33% (12743/38615) remote: Counting objects: 34% (13130/38615) remote: Counting objects: 35% (13516/38615) remote: Counting objects: 36% (13902/38615) remote: Counting objects: 37% (14288/38615) remote: Counting objects: 38% (14674/38615) remote: Counting objects: 39% (15060/38615) remote: Counting objects: 40% (15446/38615) remote: Counting objects: 41% (15833/38615) remote: Counting objects: 42% (16219/38615) remote: Counting objects: 43% (16605/38615) remote: Counting objects: 44% (16991/38615) remote: Counting objects: 45% (17377/38615) remote: Counting objects: 46% (17763/38615) remote: Counting objects: 47% (18150/38615) remote: Counting objects: 48% (18536/38615) remote: Counting objects: 49% (18922/38615) remote: Counting objects: 50% (19308/38615) remote: Counting objects: 51% (19694/38615) remote: Counting objects: 52% (20080/38615) remote: Counting objects: 53% (20466/38615) remote: Counting objects: 54% (20853/38615) remote: Counting objects: 55% (21239/38615) remote: Counting objects: 56% (21625/38615) remote: Counting objects: 57% (22011/38615) remote: Counting objects: 58% (22397/38615) remote: Counting objects: 59% (22783/38615) remote: Counting objects: 60% (23169/38615) remote: Counting objects: 61% (23556/38615) remote: Counting objects: 62% (23942/38615) remote: Counting objects: 63% (24328/38615) remote: Counting objects: 64% (24714/38615) remote: Counting objects: 65% (25100/38615) remote: Counting objects: 66% (25486/38615) remote: Counting objects: 67% (25873/38615) remote: Counting objects: 68% (26259/38615) remote: Counting objects: 69% (26645/38615) remote: Counting objects: 70% (27031/38615) remote: Counting objects: 71% (27417/38615) remote: Counting objects: 72% (27803/38615) remote: Counting objects: 73% (28189/38615) remote: Counting objects: 74% (28576/38615) remote: Counting objects: 75% (28962/38615) remote: Counting objects: 76% (29348/38615) remote: Counting objects: 77% (29734/38615) remote: Counting objects: 78% (30120/38615) remote: Counting objects: 79% (30506/38615) remote: Counting objects: 80% (30892/38615) remote: Counting objects: 81% (31279/38615) remote: Counting objects: 82% (31665/38615) remote: Counting objects: 83% (32051/38615) remote: Counting objects: 84% (32437/38615) remote: Counting objects: 85% (32823/38615) remote: Counting objects: 86% (33209/38615) remote: Counting objects: 87% (33596/38615) remote: Counting objects: 88% (33982/38615) remote: Counting objects: 89% (34368/38615) remote: Counting objects: 90% (34754/38615) remote: Counting objects: 91% (35140/38615) remote: Counting objects: 92% (35526/38615) remote: Counting objects: 93% (35912/38615) remote: Counting objects: 94% (36299/38615) remote: Counting objects: 95% (36685/38615) remote: Counting objects: 96% (37071/38615) remote: Counting objects: 97% (37457/38615) remote: Counting objects: 98% (37843/38615) remote: Counting objects: 99% (38229/38615) remote: Counting objects: 100% (38615/38615) remote: Counting objects: 100% (38615/38615), done. Step #30 - "compile-libfuzzer-address-i386": remote: Compressing objects: 0% (1/7338) remote: Compressing objects: 1% (74/7338) remote: Compressing objects: 2% (147/7338) remote: Compressing objects: 3% (221/7338) remote: Compressing objects: 4% (294/7338) remote: Compressing objects: 5% (367/7338) remote: Compressing objects: 6% (441/7338) remote: Compressing objects: 7% (514/7338) remote: Compressing objects: 8% (588/7338) remote: Compressing objects: 9% (661/7338) remote: Compressing objects: 10% (734/7338) remote: Compressing objects: 11% (808/7338) remote: Compressing objects: 12% (881/7338) remote: Compressing objects: 13% (954/7338) remote: Compressing objects: 14% (1028/7338) remote: Compressing objects: 15% (1101/7338) remote: Compressing objects: 16% (1175/7338) remote: Compressing objects: 17% (1248/7338) remote: Compressing objects: 18% (1321/7338) remote: Compressing objects: 19% (1395/7338) remote: Compressing objects: 20% (1468/7338) remote: Compressing objects: 21% (1541/7338) remote: Compressing objects: 22% (1615/7338) remote: Compressing objects: 23% (1688/7338) remote: Compressing objects: 24% (1762/7338) remote: Compressing objects: 25% (1835/7338) remote: Compressing objects: 26% (1908/7338) remote: Compressing objects: 27% (1982/7338) remote: Compressing objects: 28% (2055/7338) remote: Compressing objects: 29% (2129/7338) remote: Compressing objects: 30% (2202/7338) remote: Compressing objects: 31% (2275/7338) remote: Compressing objects: 32% (2349/7338) remote: Compressing objects: 33% (2422/7338) remote: Compressing objects: 34% (2495/7338) remote: Compressing objects: 35% (2569/7338) remote: Compressing objects: 36% (2642/7338) remote: Compressing objects: 37% (2716/7338) remote: Compressing objects: 38% (2789/7338) remote: Compressing objects: 39% (2862/7338) remote: Compressing objects: 40% (2936/7338) remote: Compressing objects: 41% (3009/7338) remote: Compressing objects: 42% (3082/7338) remote: Compressing objects: 43% (3156/7338) remote: Compressing objects: 44% (3229/7338) remote: Compressing objects: 45% (3303/7338) remote: Compressing objects: 46% (3376/7338) remote: Compressing objects: 47% (3449/7338) remote: Compressing objects: 48% (3523/7338) remote: Compressing objects: 49% (3596/7338) remote: Compressing objects: 50% (3669/7338) remote: Compressing objects: 51% (3743/7338) remote: Compressing objects: 52% (3816/7338) remote: Compressing objects: 53% (3890/7338) remote: Compressing objects: 54% (3963/7338) remote: Compressing objects: 55% (4036/7338) remote: Compressing objects: 56% (4110/7338) remote: Compressing objects: 57% (4183/7338) remote: Compressing objects: 58% (4257/7338) remote: Compressing objects: 59% (4330/7338) remote: Compressing objects: 60% (4403/7338) remote: Compressing objects: 61% (4477/7338) remote: Compressing objects: 62% (4550/7338) remote: Compressing objects: 63% (4623/7338) remote: Compressing objects: 64% (4697/7338) remote: Compressing objects: 65% (4770/7338) remote: Compressing objects: 66% (4844/7338) remote: Compressing objects: 67% (4917/7338) remote: Compressing objects: 68% (4990/7338) remote: Compressing objects: 69% (5064/7338) remote: Compressing objects: 70% (5137/7338) remote: Compressing objects: 71% (5210/7338) remote: Compressing objects: 72% (5284/7338) remote: Compressing objects: 73% (5357/7338) remote: Compressing objects: 74% (5431/7338) remote: Compressing objects: 75% (5504/7338) remote: Compressing objects: 76% (5577/7338) remote: Compressing objects: 77% (5651/7338) remote: Compressing objects: 78% (5724/7338) remote: Compressing objects: 79% (5798/7338) remote: Compressing objects: 80% (5871/7338) remote: Compressing objects: 81% (5944/7338) remote: Compressing objects: 82% (6018/7338) remote: Compressing objects: 83% (6091/7338) remote: Compressing objects: 84% (6164/7338) remote: Compressing objects: 85% (6238/7338) remote: Compressing objects: 86% (6311/7338) remote: Compressing objects: 87% (6385/7338) remote: Compressing objects: 88% (6458/7338) remote: Compressing objects: 89% (6531/7338) remote: Compressing objects: 90% (6605/7338) remote: Compressing objects: 91% (6678/7338) remote: Compressing objects: 92% (6751/7338) remote: Compressing objects: 93% (6825/7338) remote: Compressing objects: 94% (6898/7338) remote: Compressing objects: 95% (6972/7338) remote: Compressing objects: 96% (7045/7338) remote: Compressing objects: 97% (7118/7338) remote: Compressing objects: 98% (7192/7338) remote: Compressing objects: 99% (7265/7338) remote: Compressing objects: 100% (7338/7338) remote: Compressing objects: 100% (7338/7338), done. Step #30 - "compile-libfuzzer-address-i386": Receiving objects: 0% (1/38615) Receiving objects: 1% (387/38615) Receiving objects: 2% (773/38615) Receiving objects: 3% (1159/38615) Receiving objects: 4% (1545/38615) Receiving objects: 5% (1931/38615) Receiving objects: 6% (2317/38615) Receiving objects: 7% (2704/38615) Receiving objects: 8% (3090/38615) Receiving objects: 9% (3476/38615) Receiving objects: 10% (3862/38615) Receiving objects: 11% (4248/38615) Receiving objects: 12% (4634/38615) Receiving objects: 13% (5020/38615) Receiving objects: 14% (5407/38615) Receiving objects: 15% (5793/38615) Receiving objects: 16% (6179/38615) Receiving objects: 17% (6565/38615) Receiving objects: 18% (6951/38615) Receiving objects: 19% (7337/38615) Receiving objects: 20% (7723/38615) Receiving objects: 21% (8110/38615) Receiving objects: 22% (8496/38615) Receiving objects: 23% (8882/38615) Receiving objects: 24% (9268/38615) Receiving objects: 25% (9654/38615) Receiving objects: 26% (10040/38615) Receiving objects: 27% (10427/38615) Receiving objects: 28% (10813/38615) Receiving objects: 29% (11199/38615) Receiving objects: 30% (11585/38615) Receiving objects: 31% (11971/38615) Receiving objects: 32% (12357/38615) Receiving objects: 33% (12743/38615) Receiving objects: 34% (13130/38615) Receiving objects: 35% (13516/38615) Receiving objects: 36% (13902/38615) Receiving objects: 37% (14288/38615) Receiving objects: 38% (14674/38615) Receiving objects: 39% (15060/38615) Receiving objects: 40% (15446/38615) Receiving objects: 41% (15833/38615) Receiving objects: 42% (16219/38615) Receiving objects: 43% (16605/38615) Receiving objects: 44% (16991/38615) Receiving objects: 45% (17377/38615) Receiving objects: 46% (17763/38615) Receiving objects: 47% (18150/38615) Receiving objects: 48% (18536/38615) Receiving objects: 49% (18922/38615) Receiving objects: 50% (19308/38615) Receiving objects: 51% (19694/38615) Receiving objects: 52% (20080/38615) Receiving objects: 53% (20466/38615) Receiving objects: 54% (20853/38615) Receiving objects: 55% (21239/38615) Receiving objects: 56% (21625/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 57% (22011/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 58% (22397/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 59% (22783/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 60% (23169/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 61% (23556/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 62% (23942/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 63% (24328/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 64% (24714/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 65% (25100/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 66% (25486/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 67% (25873/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 68% (26259/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 69% (26645/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 70% (27031/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 71% (27417/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 72% (27803/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 73% (28189/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 74% (28576/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 75% (28962/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 76% (29348/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 77% (29734/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 78% (30120/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 79% (30506/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 80% (30892/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 81% (31279/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 82% (31665/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 83% (32051/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 84% (32437/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 85% (32823/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 86% (33209/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 87% (33596/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 88% (33982/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 89% (34368/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 90% (34754/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 91% (35140/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 92% (35526/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 93% (35912/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 94% (36299/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 95% (36685/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 96% (37071/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 97% (37457/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 98% (37843/38615), 8.37 MiB | 16.73 MiB/s remote: Total 38615 (delta 32218), reused 37478 (delta 31234), pack-reused 0 Step #30 - "compile-libfuzzer-address-i386": Receiving objects: 99% (38229/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 100% (38615/38615), 8.37 MiB | 16.73 MiB/s Receiving objects: 100% (38615/38615), 21.52 MiB | 21.69 MiB/s, done. Step #30 - "compile-libfuzzer-address-i386": Resolving deltas: 0% (0/32218) Resolving deltas: 1% (407/32218) Resolving deltas: 3% (983/32218) Resolving deltas: 4% (1365/32218) Resolving deltas: 5% (1677/32218) Resolving deltas: 6% (2067/32218) Resolving deltas: 7% (2309/32218) Resolving deltas: 8% (2640/32218) Resolving deltas: 9% (2901/32218) Resolving deltas: 10% (3335/32218) Resolving deltas: 11% (3557/32218) Resolving deltas: 12% (3979/32218) Resolving deltas: 13% (4277/32218) Resolving deltas: 14% (4514/32218) Resolving deltas: 15% (4931/32218) Resolving deltas: 17% (5696/32218) Resolving deltas: 18% (5816/32218) Resolving deltas: 19% (6242/32218) Resolving deltas: 20% (6487/32218) Resolving deltas: 21% (6804/32218) Resolving deltas: 22% (7308/32218) Resolving deltas: 23% (7495/32218) Resolving deltas: 26% (8413/32218) Resolving deltas: 27% (8712/32218) Resolving deltas: 29% (9507/32218) Resolving deltas: 30% (9680/32218) Resolving deltas: 31% (10014/32218) Resolving deltas: 32% (10332/32218) Resolving deltas: 33% (10644/32218) Resolving deltas: 34% (11033/32218) Resolving deltas: 35% (11300/32218) Resolving deltas: 36% (11643/32218) Resolving deltas: 37% (11936/32218) Resolving deltas: 39% (12639/32218) Resolving deltas: 40% (12973/32218) Resolving deltas: 41% (13215/32218) Resolving deltas: 42% (13548/32218) Resolving deltas: 43% (13870/32218) Resolving deltas: 44% (14181/32218) Resolving deltas: 45% (14785/32218) Resolving deltas: 46% (14832/32218) Resolving deltas: 47% (15195/32218) Resolving deltas: 48% (15638/32218) Resolving deltas: 49% (15789/32218) Resolving deltas: 50% (16185/32218) Resolving deltas: 51% (16471/32218) Resolving deltas: 52% (16755/32218) Resolving deltas: 53% (17111/32218) Resolving deltas: 54% (17416/32218) Resolving deltas: 55% (17739/32218) Resolving deltas: 56% (18164/32218) Resolving deltas: 57% (18510/32218) Resolving deltas: 58% (18687/32218) Resolving deltas: 59% (19033/32218) Resolving deltas: 60% (19332/32218) Resolving deltas: 61% (19656/32218) Resolving deltas: 62% (20019/32218) Resolving deltas: 63% (20312/32218) Resolving deltas: 64% (20643/32218) Resolving deltas: 65% (20943/32218) Resolving deltas: 66% (21340/32218) Resolving deltas: 67% (21649/32218) Resolving deltas: 68% (21921/32218) Resolving deltas: 70% (22558/32218) Resolving deltas: 71% (22907/32218) Resolving deltas: 72% (23277/32218) Resolving deltas: 73% (23531/32218) Resolving deltas: 74% (23876/32218) Resolving deltas: 75% (24414/32218) Resolving deltas: 77% (24895/32218) Resolving deltas: 78% (25249/32218) Resolving deltas: 80% (25916/32218) Resolving deltas: 81% (26394/32218) Resolving deltas: 82% (26421/32218) Resolving deltas: 83% (26759/32218) Resolving deltas: 84% (27064/32218) Resolving deltas: 85% (27388/32218) Resolving deltas: 86% (27708/32218) Resolving deltas: 87% (28041/32218) Resolving deltas: 88% (28367/32218) Resolving deltas: 89% (28811/32218) Resolving deltas: 90% (28998/32218) Resolving deltas: 91% (29353/32218) Resolving deltas: 92% (29641/32218) Resolving deltas: 93% (29991/32218) Resolving deltas: 94% (30294/32218) Resolving deltas: 95% (30637/32218) Resolving deltas: 95% (30775/32218) Resolving deltas: 96% (30941/32218) Resolving deltas: 97% (31253/32218) Resolving deltas: 98% (31609/32218) Resolving deltas: 99% (32005/32218) Resolving deltas: 100% (32218/32218) Resolving deltas: 100% (32218/32218), done. Step #30 - "compile-libfuzzer-address-i386": + cd elfutils Step #30 - "compile-libfuzzer-address-i386": + git checkout 67a187d4c1790058fc7fd218317851cb68bb087c Step #30 - "compile-libfuzzer-address-i386": Note: switching to '67a187d4c1790058fc7fd218317851cb68bb087c'. Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": You are in 'detached HEAD' state. You can look around, make experimental Step #30 - "compile-libfuzzer-address-i386": changes and commit them, and you can discard any commits you make in this Step #30 - "compile-libfuzzer-address-i386": state without impacting any branches by switching back to a branch. Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": If you want to create a new branch to retain commits you create, you may Step #30 - "compile-libfuzzer-address-i386": do so (now or later) by using -c with the switch command. Example: Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": git switch -c Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": Or undo this operation with: Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": git switch - Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": Turn off this advice by setting config variable advice.detachedHead to false Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": HEAD is now at 67a187d4 Prepare for 0.189 Step #30 - "compile-libfuzzer-address-i386": + git log --oneline -1 Step #30 - "compile-libfuzzer-address-i386": [?1h= 67a187d4 (HEAD, tag: elfutils-0.189) Prepare for 0.189 Step #30 - "compile-libfuzzer-address-i386": [?1l>+ sed -i 's/^\(NO_UNDEFINED=\).*/\1/' configure.ac Step #30 - "compile-libfuzzer-address-i386": + sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac Step #30 - "compile-libfuzzer-address-i386": + [[ address == undefined ]] Step #30 - "compile-libfuzzer-address-i386": + autoreconf -i -f Step #30 - "compile-libfuzzer-address-i386": autopoint: using AM_GNU_GETTEXT_REQUIRE_VERSION instead of AM_GNU_GETTEXT_VERSION Step #30 - "compile-libfuzzer-address-i386": Copying file ABOUT-NLS Step #30 - "compile-libfuzzer-address-i386": Copying file config/config.rpath Step #30 - "compile-libfuzzer-address-i386": Copying file m4/codeset.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/extern-inline.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/fcntl-o.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/gettext.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/glibc2.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/glibc21.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/iconv.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/intdiv0.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/intl.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/intldir.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/intlmacosx.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/intmax.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/inttypes-pri.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/inttypes_h.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/lcmessage.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/lib-ld.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/lib-link.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/lib-prefix.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/lock.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/longlong.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/nls.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/po.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/printf-posix.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/progtest.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/size_max.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/stdint_h.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/threadlib.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/uintmax_t.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/visibility.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/wchar_t.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/wint_t.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file m4/xsize.m4 Step #30 - "compile-libfuzzer-address-i386": Copying file po/Makefile.in.in Step #30 - "compile-libfuzzer-address-i386": Copying file po/Makevars.template Step #30 - "compile-libfuzzer-address-i386": Copying file po/Rules-quot Step #30 - "compile-libfuzzer-address-i386": Copying file po/boldquot.sed Step #30 - "compile-libfuzzer-address-i386": Copying file po/en@boldquot.header Step #30 - "compile-libfuzzer-address-i386": Copying file po/en@quot.header Step #30 - "compile-libfuzzer-address-i386": Copying file po/insert-header.sin Step #30 - "compile-libfuzzer-address-i386": Copying file po/quot.sed Step #30 - "compile-libfuzzer-address-i386": Copying file po/remove-potcdate.sin Step #30 - "compile-libfuzzer-address-i386": configure.ac:97: installing 'config/ar-lib' Step #30 - "compile-libfuzzer-address-i386": configure.ac:91: installing 'config/compile' Step #30 - "compile-libfuzzer-address-i386": configure.ac:67: installing 'config/config.guess' Step #30 - "compile-libfuzzer-address-i386": configure.ac:67: installing 'config/config.sub' Step #30 - "compile-libfuzzer-address-i386": configure.ac:52: installing 'config/install-sh' Step #30 - "compile-libfuzzer-address-i386": configure.ac:52: installing 'config/missing' Step #30 - "compile-libfuzzer-address-i386": Makefile.am: installing './INSTALL' Step #30 - "compile-libfuzzer-address-i386": backends/Makefile.am: installing 'config/depcomp' Step #30 - "compile-libfuzzer-address-i386": configure.ac: installing 'config/ylwrap' Step #30 - "compile-libfuzzer-address-i386": parallel-tests: installing 'config/test-driver' Step #30 - "compile-libfuzzer-address-i386": + ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod --disable-demangler --without-bzlib --without-lzma --without-zstd CC=clang 'CFLAGS=-Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' CXX=clang++ 'CXXFLAGS=-Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' 'LDFLAGS=-m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #30 - "compile-libfuzzer-address-i386": configure: No --program-prefix given, using "eu-" Step #30 - "compile-libfuzzer-address-i386": checking for a BSD-compatible install... /usr/bin/install -c Step #30 - "compile-libfuzzer-address-i386": checking whether build environment is sane... yes Step #30 - "compile-libfuzzer-address-i386": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #30 - "compile-libfuzzer-address-i386": checking for gawk... gawk Step #30 - "compile-libfuzzer-address-i386": checking whether make sets $(MAKE)... yes Step #30 - "compile-libfuzzer-address-i386": checking whether make supports nested variables... yes Step #30 - "compile-libfuzzer-address-i386": checking whether to enable maintainer-specific portions of Makefiles... yes Step #30 - "compile-libfuzzer-address-i386": checking whether make supports nested variables... (cached) yes Step #30 - "compile-libfuzzer-address-i386": checking build system type... x86_64-pc-linux-gnu Step #30 - "compile-libfuzzer-address-i386": checking host system type... x86_64-pc-linux-gnu Step #30 - "compile-libfuzzer-address-i386": checking whether make supports the include directive... yes (GNU style) Step #30 - "compile-libfuzzer-address-i386": checking for gcc... clang Step #30 - "compile-libfuzzer-address-i386": checking whether the C compiler works... yes Step #30 - "compile-libfuzzer-address-i386": checking for C compiler default output file name... a.out Step #30 - "compile-libfuzzer-address-i386": checking for suffix of executables... Step #30 - "compile-libfuzzer-address-i386": checking whether we are cross compiling... no Step #30 - "compile-libfuzzer-address-i386": checking for suffix of object files... o Step #30 - "compile-libfuzzer-address-i386": checking whether we are using the GNU C compiler... yes Step #30 - "compile-libfuzzer-address-i386": checking whether clang accepts -g... yes Step #30 - "compile-libfuzzer-address-i386": checking for clang option to accept ISO C89... none needed Step #30 - "compile-libfuzzer-address-i386": checking whether clang understands -c and -o together... yes Step #30 - "compile-libfuzzer-address-i386": checking dependency style of clang... gcc3 Step #30 - "compile-libfuzzer-address-i386": checking for clang option to accept ISO C99... none needed Step #30 - "compile-libfuzzer-address-i386": checking whether we are using the GNU C++ compiler... yes Step #30 - "compile-libfuzzer-address-i386": checking whether clang++ accepts -g... yes Step #30 - "compile-libfuzzer-address-i386": checking dependency style of clang++... gcc3 Step #30 - "compile-libfuzzer-address-i386": checking for ranlib... ranlib Step #30 - "compile-libfuzzer-address-i386": checking for bison... bison -y Step #30 - "compile-libfuzzer-address-i386": checking for flex... flex Step #30 - "compile-libfuzzer-address-i386": checking lex output file root... lex.yy Step #30 - "compile-libfuzzer-address-i386": checking lex library... none needed Step #30 - "compile-libfuzzer-address-i386": checking whether yytext is a pointer... no Step #30 - "compile-libfuzzer-address-i386": checking for ar... ar Step #30 - "compile-libfuzzer-address-i386": checking the archiver (ar) interface... ar Step #30 - "compile-libfuzzer-address-i386": checking for readelf... readelf Step #30 - "compile-libfuzzer-address-i386": checking for nm... nm Step #30 - "compile-libfuzzer-address-i386": checking whether gcc supports __attribute__((visibility()))... yes Step #30 - "compile-libfuzzer-address-i386": checking whether gcc supports __attribute__((gcc_struct))... no Step #30 - "compile-libfuzzer-address-i386": checking whether gcc supports -fPIC... yes Step #30 - "compile-libfuzzer-address-i386": checking whether gcc supports -fPIE... yes Step #30 - "compile-libfuzzer-address-i386": checking whether gcc supports ... yes Step #30 - "compile-libfuzzer-address-i386": checking whether the compiler generates build-ids... no Step #30 - "compile-libfuzzer-address-i386": configure: WARNING: compiler doesn't generate build-id by default Step #30 - "compile-libfuzzer-address-i386": checking whether gcc supports -Wl,-z,relro... yes Step #30 - "compile-libfuzzer-address-i386": checking for __thread support... yes Step #30 - "compile-libfuzzer-address-i386": checking whether gcc provides stdatomic.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for special C compiler options needed for large files... no Step #30 - "compile-libfuzzer-address-i386": checking for _FILE_OFFSET_BITS value needed for large files... 64 Step #30 - "compile-libfuzzer-address-i386": checking whether fts.h is bad when included (with LFS)... no Step #30 - "compile-libfuzzer-address-i386": checking whether to add -D_FORTIFY_SOURCE=2 or =3 to CFLAGS... yes -D_FORTIFY_SOURCE=3 Step #30 - "compile-libfuzzer-address-i386": checking for library containing gzdirect... -lz Step #30 - "compile-libfuzzer-address-i386": checking whether memrchr is declared... yes Step #30 - "compile-libfuzzer-address-i386": checking whether rawmemchr is declared... yes Step #30 - "compile-libfuzzer-address-i386": checking whether powerof2 is declared... yes Step #30 - "compile-libfuzzer-address-i386": checking whether mempcpy is declared... yes Step #30 - "compile-libfuzzer-address-i386": checking whether reallocarray is declared... yes Step #30 - "compile-libfuzzer-address-i386": checking for process_vm_readv... yes Step #30 - "compile-libfuzzer-address-i386": checking for mremap... yes Step #30 - "compile-libfuzzer-address-i386": checking how to run the C preprocessor... clang -E Step #30 - "compile-libfuzzer-address-i386": checking for grep that handles long lines and -e... /usr/bin/grep Step #30 - "compile-libfuzzer-address-i386": checking for egrep... /usr/bin/grep -E Step #30 - "compile-libfuzzer-address-i386": checking for ANSI C header files... yes Step #30 - "compile-libfuzzer-address-i386": checking for sys/types.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for sys/stat.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for stdlib.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for string.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for memory.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for strings.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for inttypes.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for stdint.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for unistd.h... yes Step #30 - "compile-libfuzzer-address-i386": checking error.h usability... yes Step #30 - "compile-libfuzzer-address-i386": checking error.h presence... yes Step #30 - "compile-libfuzzer-address-i386": checking for error.h... yes Step #30 - "compile-libfuzzer-address-i386": checking err.h usability... yes Step #30 - "compile-libfuzzer-address-i386": checking err.h presence... yes Step #30 - "compile-libfuzzer-address-i386": checking for err.h... yes Step #30 - "compile-libfuzzer-address-i386": checking sched.h usability... yes Step #30 - "compile-libfuzzer-address-i386": checking sched.h presence... yes Step #30 - "compile-libfuzzer-address-i386": checking for sched.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for sched_getaffinity... yes Step #30 - "compile-libfuzzer-address-i386": checking sys/resource.h usability... yes Step #30 - "compile-libfuzzer-address-i386": checking sys/resource.h presence... yes Step #30 - "compile-libfuzzer-address-i386": checking for sys/resource.h... yes Step #30 - "compile-libfuzzer-address-i386": checking for getrlimit... yes Step #30 - "compile-libfuzzer-address-i386": checking whether strerror_r is declared... yes Step #30 - "compile-libfuzzer-address-i386": checking for strerror_r... yes Step #30 - "compile-libfuzzer-address-i386": checking whether strerror_r returns char *... yes Step #30 - "compile-libfuzzer-address-i386": checking whether symbol versioning is supported... yes Step #30 - "compile-libfuzzer-address-i386": checking whether gcc accepts -Wstack-usage... no Step #30 - "compile-libfuzzer-address-i386": checking whether gcc has a sane -Wlogical-op... no Step #30 - "compile-libfuzzer-address-i386": checking whether gcc accepts -Wduplicated-cond... no Step #30 - "compile-libfuzzer-address-i386": checking whether gcc accepts -Wnull-dereference... yes Step #30 - "compile-libfuzzer-address-i386": checking whether gcc accepts -Wimplicit-fallthrough... yes Step #30 - "compile-libfuzzer-address-i386": checking whether the compiler accepts -Wimplicit-fallthrough=5... no Step #30 - "compile-libfuzzer-address-i386": checking whether the compiler accepts -Wtrampolines... no Step #30 - "compile-libfuzzer-address-i386": checking whether the compiler accepts -Wno-packed-not-aligned... no Step #30 - "compile-libfuzzer-address-i386": checking whether the compiler accepts -Wuse-after-free=3... no Step #30 - "compile-libfuzzer-address-i386": checking whether the compiler accepts -fno-addrsig... yes Step #30 - "compile-libfuzzer-address-i386": checking for library containing argp_parse... none required Step #30 - "compile-libfuzzer-address-i386": checking for library containing fts_close... none required Step #30 - "compile-libfuzzer-address-i386": checking for library containing _obstack_free... none required Step #30 - "compile-libfuzzer-address-i386": checking for a sed that does not truncate output... /usr/bin/sed Step #30 - "compile-libfuzzer-address-i386": checking whether NLS is requested... yes Step #30 - "compile-libfuzzer-address-i386": checking for msgfmt... /usr/bin/msgfmt Step #30 - "compile-libfuzzer-address-i386": checking for gmsgfmt... /usr/bin/msgfmt Step #30 - "compile-libfuzzer-address-i386": checking for xgettext... /usr/bin/xgettext Step #30 - "compile-libfuzzer-address-i386": checking for msgmerge... /usr/bin/msgmerge Step #30 - "compile-libfuzzer-address-i386": checking for ld used by clang... /usr/bin/ld Step #30 - "compile-libfuzzer-address-i386": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #30 - "compile-libfuzzer-address-i386": checking for shared library run path origin... done Step #30 - "compile-libfuzzer-address-i386": checking for CFPreferencesCopyAppValue... no Step #30 - "compile-libfuzzer-address-i386": checking for CFLocaleCopyCurrent... no Step #30 - "compile-libfuzzer-address-i386": checking for GNU gettext in libc... yes Step #30 - "compile-libfuzzer-address-i386": checking whether to use NLS... yes Step #30 - "compile-libfuzzer-address-i386": checking where the gettext function comes from... libc Step #30 - "compile-libfuzzer-address-i386": checking size of long... 4 Step #30 - "compile-libfuzzer-address-i386": checking for struct user_regs_struct... yes Step #30 - "compile-libfuzzer-address-i386": checking clang option for 32-bit word size... -m32 Step #30 - "compile-libfuzzer-address-i386": checking for 64-bit host... yes Step #30 - "compile-libfuzzer-address-i386": checking whether clang -m32 makes executables we can run... yes Step #30 - "compile-libfuzzer-address-i386": checking for flex... yes Step #30 - "compile-libfuzzer-address-i386": checking for bison... yes Step #30 - "compile-libfuzzer-address-i386": checking for gawk... yes Step #30 - "compile-libfuzzer-address-i386": checking for bunzip2... yes Step #30 - "compile-libfuzzer-address-i386": checking for zstd... no Step #30 - "compile-libfuzzer-address-i386": checking whether clang++ supports C++11 features with -std=c++11... yes Step #30 - "compile-libfuzzer-address-i386": checking for pthread_setname_np in -lpthread... yes Step #30 - "compile-libfuzzer-address-i386": checking that generated files are newer than configure... done Step #30 - "compile-libfuzzer-address-i386": configure: creating ./config.status Step #30 - "compile-libfuzzer-address-i386": config.status: creating config/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating elfutils.spec Step #30 - "compile-libfuzzer-address-i386": config.status: creating debuginfod/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating debuginfod/debuginfod.h Step #30 - "compile-libfuzzer-address-i386": config.status: creating doc/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating lib/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libelf/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libebl/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libdwelf/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libdw/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libdwfl/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libcpu/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating libasm/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating backends/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating src/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating po/Makefile.in Step #30 - "compile-libfuzzer-address-i386": config.status: creating tests/Makefile Step #30 - "compile-libfuzzer-address-i386": config.status: creating config/libelf.pc Step #30 - "compile-libfuzzer-address-i386": config.status: creating config/libdw.pc Step #30 - "compile-libfuzzer-address-i386": config.status: creating config/libdebuginfod.pc Step #30 - "compile-libfuzzer-address-i386": config.status: creating version.h Step #30 - "compile-libfuzzer-address-i386": config.status: creating config/profile.sh Step #30 - "compile-libfuzzer-address-i386": config.status: creating config/profile.csh Step #30 - "compile-libfuzzer-address-i386": config.status: creating config.h Step #30 - "compile-libfuzzer-address-i386": config.status: executing depfiles commands Step #30 - "compile-libfuzzer-address-i386": config.status: executing po-directories commands Step #30 - "compile-libfuzzer-address-i386": config.status: creating po/POTFILES Step #30 - "compile-libfuzzer-address-i386": config.status: creating po/Makefile Step #30 - "compile-libfuzzer-address-i386": configure: Step #30 - "compile-libfuzzer-address-i386": ===================================================================== Step #30 - "compile-libfuzzer-address-i386": elfutils: 0.189 (eu_version: 189) Step #30 - "compile-libfuzzer-address-i386": ===================================================================== Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": Prefix : /usr/local Step #30 - "compile-libfuzzer-address-i386": Program prefix ("eu-" recommended) : eu- Step #30 - "compile-libfuzzer-address-i386": Source code location : . Step #30 - "compile-libfuzzer-address-i386": Maintainer mode : yes Step #30 - "compile-libfuzzer-address-i386": build arch : x86_64-pc-linux-gnu Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": CFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig Step #30 - "compile-libfuzzer-address-i386": CXXFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": RECOMMENDED FEATURES (should all be yes) Step #30 - "compile-libfuzzer-address-i386": gzip support : yes Step #30 - "compile-libfuzzer-address-i386": bzip2 support : no Step #30 - "compile-libfuzzer-address-i386": lzma/xz support : no Step #30 - "compile-libfuzzer-address-i386": zstd support : no Step #30 - "compile-libfuzzer-address-i386": zstd compression support : no Step #30 - "compile-libfuzzer-address-i386": libstdc++ demangle support : no Step #30 - "compile-libfuzzer-address-i386": File textrel check : yes Step #30 - "compile-libfuzzer-address-i386": Symbol versioning : yes Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": NOT RECOMMENDED FEATURES (should all be no) Step #30 - "compile-libfuzzer-address-i386": Experimental thread safety : no Step #30 - "compile-libfuzzer-address-i386": install elf.h : no Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": OTHER FEATURES Step #30 - "compile-libfuzzer-address-i386": Deterministic archives by default : false Step #30 - "compile-libfuzzer-address-i386": Native language support : yes Step #30 - "compile-libfuzzer-address-i386": Extra Valgrind annotations : no Step #30 - "compile-libfuzzer-address-i386": libdebuginfod client support : no Step #30 - "compile-libfuzzer-address-i386": Debuginfod server support : no Step #30 - "compile-libfuzzer-address-i386": Default DEBUGINFOD_URLS : Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": EXTRA TEST FEATURES (used with make check) Step #30 - "compile-libfuzzer-address-i386": have bunzip2 installed (required) : yes Step #30 - "compile-libfuzzer-address-i386": have zstd installed : no Step #30 - "compile-libfuzzer-address-i386": C++11 : yes Step #30 - "compile-libfuzzer-address-i386": debug branch prediction : no Step #30 - "compile-libfuzzer-address-i386": gprof support : no Step #30 - "compile-libfuzzer-address-i386": gcov support : no Step #30 - "compile-libfuzzer-address-i386": run all tests under valgrind : no Step #30 - "compile-libfuzzer-address-i386": gcc undefined behaviour sanitizer : no Step #30 - "compile-libfuzzer-address-i386": gcc address sanitizer : no Step #30 - "compile-libfuzzer-address-i386": clang memory sanitizer : no Step #30 - "compile-libfuzzer-address-i386": use rpath in tests : no Step #30 - "compile-libfuzzer-address-i386": test biarch : yes Step #30 - "compile-libfuzzer-address-i386": Step #30 - "compile-libfuzzer-address-i386": ++ nproc Step #30 - "compile-libfuzzer-address-i386": + make -C config -j32 V=1 Step #30 - "compile-libfuzzer-address-i386": make: Entering directory '/src/libbpf/elfutils/config' Step #30 - "compile-libfuzzer-address-i386": make: Nothing to be done for 'all'. Step #30 - "compile-libfuzzer-address-i386": make: Leaving directory '/src/libbpf/elfutils/config' Step #30 - "compile-libfuzzer-address-i386": ++ nproc Step #30 - "compile-libfuzzer-address-i386": + make -C lib -j32 V=1 Step #30 - "compile-libfuzzer-address-i386": make: Entering directory '/src/libbpf/elfutils/lib' Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xasprintf.o -MD -MP -MF .deps/xasprintf.Tpo -c -o xasprintf.o xasprintf.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xstrdup.o -MD -MP -MF .deps/xstrdup.Tpo -c -o xstrdup.o xstrdup.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xstrndup.o -MD -MP -MF .deps/xstrndup.Tpo -c -o xstrndup.o xstrndup.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT xmalloc.o -MD -MP -MF .deps/xmalloc.Tpo -c -o xmalloc.o xmalloc.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT next_prime.o -MD -MP -MF .deps/next_prime.Tpo -c -o next_prime.o next_prime.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT crc32.o -MD -MP -MF .deps/crc32.Tpo -c -o crc32.o crc32.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT crc32_file.o -MD -MP -MF .deps/crc32_file.Tpo -c -o crc32_file.o crc32_file.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT color.o -MD -MP -MF .deps/color.Tpo -c -o color.o color.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT error.o -MD -MP -MF .deps/error.Tpo -c -o error.o error.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT printversion.o -MD -MP -MF .deps/printversion.Tpo -c -o printversion.o printversion.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/error.Tpo .deps/error.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/next_prime.Tpo .deps/next_prime.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/xstrdup.Tpo .deps/xstrdup.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/printversion.Tpo .deps/printversion.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/xstrndup.Tpo .deps/xstrndup.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/crc32.Tpo .deps/crc32.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/xmalloc.Tpo .deps/xmalloc.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/xasprintf.Tpo .deps/xasprintf.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/crc32_file.Tpo .deps/crc32_file.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/color.Tpo .deps/color.Po Step #30 - "compile-libfuzzer-address-i386": rm -f libeu.a Step #30 - "compile-libfuzzer-address-i386": ar cr libeu.a xasprintf.o xstrdup.o xstrndup.o xmalloc.o next_prime.o crc32.o crc32_file.o color.o error.o printversion.o Step #30 - "compile-libfuzzer-address-i386": ranlib libeu.a Step #30 - "compile-libfuzzer-address-i386": make: Leaving directory '/src/libbpf/elfutils/lib' Step #30 - "compile-libfuzzer-address-i386": ++ nproc Step #30 - "compile-libfuzzer-address-i386": + make -C libelf -j32 V=1 Step #30 - "compile-libfuzzer-address-i386": make: Entering directory '/src/libbpf/elfutils/libelf' Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_version.o -MD -MP -MF .deps/elf_version.Tpo -c -o elf_version.o elf_version.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_hash.o -MD -MP -MF .deps/elf_hash.Tpo -c -o elf_hash.o elf_hash.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_error.o -MD -MP -MF .deps/elf_error.Tpo -c -o elf_error.o elf_error.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_fill.o -MD -MP -MF .deps/elf_fill.Tpo -c -o elf_fill.o elf_fill.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_begin.o -MD -MP -MF .deps/elf_begin.Tpo -c -o elf_begin.o elf_begin.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_next.o -MD -MP -MF .deps/elf_next.Tpo -c -o elf_next.o elf_next.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_rand.o -MD -MP -MF .deps/elf_rand.Tpo -c -o elf_rand.o elf_rand.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_end.o -MD -MP -MF .deps/elf_end.Tpo -c -o elf_end.o elf_end.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_kind.o -MD -MP -MF .deps/elf_kind.Tpo -c -o elf_kind.o elf_kind.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getclass.o -MD -MP -MF .deps/gelf_getclass.Tpo -c -o gelf_getclass.o gelf_getclass.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getbase.o -MD -MP -MF .deps/elf_getbase.Tpo -c -o elf_getbase.o elf_getbase.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getident.o -MD -MP -MF .deps/elf_getident.Tpo -c -o elf_getident.o elf_getident.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_fsize.o -MD -MP -MF .deps/elf32_fsize.Tpo -c -o elf32_fsize.o elf32_fsize.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_fsize.o -MD -MP -MF .deps/elf64_fsize.Tpo -c -o elf64_fsize.o elf64_fsize.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_fsize.o -MD -MP -MF .deps/gelf_fsize.Tpo -c -o gelf_fsize.o gelf_fsize.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_xlatetof.o -MD -MP -MF .deps/elf32_xlatetof.Tpo -c -o elf32_xlatetof.o elf32_xlatetof.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_xlatetom.o -MD -MP -MF .deps/elf32_xlatetom.Tpo -c -o elf32_xlatetom.o elf32_xlatetom.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_xlatetof.o -MD -MP -MF .deps/elf64_xlatetof.Tpo -c -o elf64_xlatetof.o elf64_xlatetof.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_xlatetom.o -MD -MP -MF .deps/elf64_xlatetom.Tpo -c -o elf64_xlatetom.o elf64_xlatetom.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_xlate.o -MD -MP -MF .deps/gelf_xlate.Tpo -c -o gelf_xlate.o gelf_xlate.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getehdr.o -MD -MP -MF .deps/elf32_getehdr.Tpo -c -o elf32_getehdr.o elf32_getehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getehdr.o -MD -MP -MF .deps/elf64_getehdr.Tpo -c -o elf64_getehdr.o elf64_getehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getehdr.o -MD -MP -MF .deps/gelf_getehdr.Tpo -c -o gelf_getehdr.o gelf_getehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_newehdr.o -MD -MP -MF .deps/elf32_newehdr.Tpo -c -o elf32_newehdr.o elf32_newehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_newehdr.o -MD -MP -MF .deps/elf64_newehdr.Tpo -c -o elf64_newehdr.o elf64_newehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_newehdr.o -MD -MP -MF .deps/gelf_newehdr.Tpo -c -o gelf_newehdr.o gelf_newehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_ehdr.o -MD -MP -MF .deps/gelf_update_ehdr.Tpo -c -o gelf_update_ehdr.o gelf_update_ehdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getphdr.o -MD -MP -MF .deps/elf32_getphdr.Tpo -c -o elf32_getphdr.o elf32_getphdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getphdr.o -MD -MP -MF .deps/elf64_getphdr.Tpo -c -o elf64_getphdr.o elf64_getphdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getphdr.o -MD -MP -MF .deps/gelf_getphdr.Tpo -c -o gelf_getphdr.o gelf_getphdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_newphdr.o -MD -MP -MF .deps/elf32_newphdr.Tpo -c -o elf32_newphdr.o elf32_newphdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_newphdr.o -MD -MP -MF .deps/elf64_newphdr.Tpo -c -o elf64_newphdr.o elf64_newphdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_fill.Tpo .deps/elf_fill.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_version.Tpo .deps/elf_version.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_newphdr.o -MD -MP -MF .deps/gelf_newphdr.Tpo -c -o gelf_newphdr.o gelf_newphdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_phdr.o -MD -MP -MF .deps/gelf_update_phdr.Tpo -c -o gelf_update_phdr.o gelf_update_phdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_fsize.Tpo .deps/elf32_fsize.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getbase.Tpo .deps/elf_getbase.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_kind.Tpo .deps/elf_kind.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getclass.Tpo .deps/gelf_getclass.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_fsize.Tpo .deps/elf64_fsize.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getarhdr.o -MD -MP -MF .deps/elf_getarhdr.Tpo -c -o elf_getarhdr.o elf_getarhdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getarsym.o -MD -MP -MF .deps/elf_getarsym.Tpo -c -o elf_getarsym.o elf_getarsym.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_rand.Tpo .deps/elf_rand.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_rawfile.o -MD -MP -MF .deps/elf_rawfile.Tpo -c -o elf_rawfile.o elf_rawfile.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getident.Tpo .deps/elf_getident.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_newehdr.Tpo .deps/gelf_newehdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_readall.o -MD -MP -MF .deps/elf_readall.Tpo -c -o elf_readall.o elf_readall.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_cntl.o -MD -MP -MF .deps/elf_cntl.Tpo -c -o elf_cntl.o elf_cntl.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getscn.o -MD -MP -MF .deps/elf_getscn.Tpo -c -o elf_getscn.o elf_getscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_nextscn.o -MD -MP -MF .deps/elf_nextscn.Tpo -c -o elf_nextscn.o elf_nextscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_ndxscn.o -MD -MP -MF .deps/elf_ndxscn.Tpo -c -o elf_ndxscn.o elf_ndxscn.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_next.Tpo .deps/elf_next.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_fsize.Tpo .deps/gelf_fsize.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_hash.Tpo .deps/elf_hash.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_error.Tpo .deps/elf_error.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_newscn.o -MD -MP -MF .deps/elf_newscn.Tpo -c -o elf_newscn.o elf_newscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getshdr.o -MD -MP -MF .deps/elf32_getshdr.Tpo -c -o elf32_getshdr.o elf32_getshdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getshdr.o -MD -MP -MF .deps/elf64_getshdr.Tpo -c -o elf64_getshdr.o elf64_getshdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_newehdr.Tpo .deps/elf32_newehdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getshdr.o -MD -MP -MF .deps/gelf_getshdr.Tpo -c -o gelf_getshdr.o gelf_getshdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_xlatetof.Tpo .deps/elf32_xlatetof.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_newehdr.Tpo .deps/elf64_newehdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_xlatetom.Tpo .deps/elf32_xlatetom.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_getehdr.Tpo .deps/elf32_getehdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_xlatetom.Tpo .deps/elf64_xlatetom.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_shdr.o -MD -MP -MF .deps/gelf_update_shdr.Tpo -c -o gelf_update_shdr.o gelf_update_shdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_strptr.o -MD -MP -MF .deps/elf_strptr.Tpo -c -o elf_strptr.o elf_strptr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_xlatetof.Tpo .deps/elf64_xlatetof.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_getehdr.Tpo .deps/elf64_getehdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_rawdata.o -MD -MP -MF .deps/elf_rawdata.Tpo -c -o elf_rawdata.o elf_rawdata.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getdata.o -MD -MP -MF .deps/elf_getdata.Tpo -c -o elf_getdata.o elf_getdata.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_newdata.o -MD -MP -MF .deps/elf_newdata.Tpo -c -o elf_newdata.o elf_newdata.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getdata_rawchunk.o -MD -MP -MF .deps/elf_getdata_rawchunk.Tpo -c -o elf_getdata_rawchunk.o elf_getdata_rawchunk.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagelf.o -MD -MP -MF .deps/elf_flagelf.Tpo -c -o elf_flagelf.o elf_flagelf.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagehdr.o -MD -MP -MF .deps/elf_flagehdr.Tpo -c -o elf_flagehdr.o elf_flagehdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getehdr.Tpo .deps/gelf_getehdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_ehdr.Tpo .deps/gelf_update_ehdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getphdr.Tpo .deps/gelf_getphdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagphdr.o -MD -MP -MF .deps/elf_flagphdr.Tpo -c -o elf_flagphdr.o elf_flagphdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagscn.o -MD -MP -MF .deps/elf_flagscn.Tpo -c -o elf_flagscn.o elf_flagscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagshdr.o -MD -MP -MF .deps/elf_flagshdr.Tpo -c -o elf_flagshdr.o elf_flagshdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_end.Tpo .deps/elf_end.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_newphdr.Tpo .deps/elf64_newphdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_newphdr.Tpo .deps/elf32_newphdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_newphdr.Tpo .deps/gelf_newphdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_flagdata.o -MD -MP -MF .deps/elf_flagdata.Tpo -c -o elf_flagdata.o elf_flagdata.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_memory.o -MD -MP -MF .deps/elf_memory.Tpo -c -o elf_memory.o elf_memory.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_update.o -MD -MP -MF .deps/elf_update.Tpo -c -o elf_update.o elf_update.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_updatenull.o -MD -MP -MF .deps/elf32_updatenull.Tpo -c -o elf32_updatenull.o elf32_updatenull.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_cntl.Tpo .deps/elf_cntl.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getarhdr.Tpo .deps/elf_getarhdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_rawfile.Tpo .deps/elf_rawfile.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_nextscn.Tpo .deps/elf_nextscn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_ndxscn.Tpo .deps/elf_ndxscn.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_updatenull.o -MD -MP -MF .deps/elf64_updatenull.Tpo -c -o elf64_updatenull.o elf64_updatenull.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_updatefile.o -MD -MP -MF .deps/elf32_updatefile.Tpo -c -o elf32_updatefile.o elf32_updatefile.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_updatefile.o -MD -MP -MF .deps/elf64_updatefile.Tpo -c -o elf64_updatefile.o elf64_updatefile.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getsym.o -MD -MP -MF .deps/gelf_getsym.Tpo -c -o gelf_getsym.o gelf_getsym.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_sym.o -MD -MP -MF .deps/gelf_update_sym.Tpo -c -o gelf_update_sym.o gelf_update_sym.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_flagelf.Tpo .deps/elf_flagelf.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getscn.Tpo .deps/elf_getscn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_rawdata.Tpo .deps/elf_rawdata.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getversym.o -MD -MP -MF .deps/gelf_getversym.Tpo -c -o gelf_getversym.o gelf_getversym.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getverneed.o -MD -MP -MF .deps/gelf_getverneed.Tpo -c -o gelf_getverneed.o gelf_getverneed.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getvernaux.o -MD -MP -MF .deps/gelf_getvernaux.Tpo -c -o gelf_getvernaux.o gelf_getvernaux.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_flagehdr.Tpo .deps/elf_flagehdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getverdef.o -MD -MP -MF .deps/gelf_getverdef.Tpo -c -o gelf_getverdef.o gelf_getverdef.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getshdr.Tpo .deps/gelf_getshdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_newdata.Tpo .deps/elf_newdata.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_getphdr.Tpo .deps/elf32_getphdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_phdr.Tpo .deps/gelf_update_phdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_newscn.Tpo .deps/elf_newscn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_shdr.Tpo .deps/gelf_update_shdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_flagscn.Tpo .deps/elf_flagscn.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getverdaux.o -MD -MP -MF .deps/gelf_getverdaux.Tpo -c -o gelf_getverdaux.o gelf_getverdaux.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getrel.o -MD -MP -MF .deps/gelf_getrel.Tpo -c -o gelf_getrel.o gelf_getrel.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_flagphdr.Tpo .deps/elf_flagphdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getrela.o -MD -MP -MF .deps/gelf_getrela.Tpo -c -o gelf_getrela.o gelf_getrela.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_rel.o -MD -MP -MF .deps/gelf_update_rel.Tpo -c -o gelf_update_rel.o gelf_update_rel.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_rela.o -MD -MP -MF .deps/gelf_update_rela.Tpo -c -o gelf_update_rela.o gelf_update_rela.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getdyn.o -MD -MP -MF .deps/gelf_getdyn.Tpo -c -o gelf_getdyn.o gelf_getdyn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_dyn.o -MD -MP -MF .deps/gelf_update_dyn.Tpo -c -o gelf_update_dyn.o gelf_update_dyn.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_flagshdr.Tpo .deps/elf_flagshdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getmove.o -MD -MP -MF .deps/gelf_getmove.Tpo -c -o gelf_getmove.o gelf_getmove.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_move.o -MD -MP -MF .deps/gelf_update_move.Tpo -c -o gelf_update_move.o gelf_update_move.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_getphdr.Tpo .deps/elf64_getphdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_memory.Tpo .deps/elf_memory.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_readall.Tpo .deps/elf_readall.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getsyminfo.o -MD -MP -MF .deps/gelf_getsyminfo.Tpo -c -o gelf_getsyminfo.o gelf_getsyminfo.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_syminfo.o -MD -MP -MF .deps/gelf_update_syminfo.Tpo -c -o gelf_update_syminfo.o gelf_update_syminfo.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_strptr.Tpo .deps/elf_strptr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getdata_rawchunk.Tpo .deps/elf_getdata_rawchunk.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getauxv.o -MD -MP -MF .deps/gelf_getauxv.Tpo -c -o gelf_getauxv.o gelf_getauxv.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_flagdata.Tpo .deps/elf_flagdata.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_auxv.o -MD -MP -MF .deps/gelf_update_auxv.Tpo -c -o gelf_update_auxv.o gelf_update_auxv.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getnote.o -MD -MP -MF .deps/gelf_getnote.Tpo -c -o gelf_getnote.o gelf_getnote.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_xlatetof.o -MD -MP -MF .deps/gelf_xlatetof.Tpo -c -o gelf_xlatetof.o gelf_xlatetof.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getversym.Tpo .deps/gelf_getversym.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getvernaux.Tpo .deps/gelf_getvernaux.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getverneed.Tpo .deps/gelf_getverneed.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_xlatetom.o -MD -MP -MF .deps/gelf_xlatetom.Tpo -c -o gelf_xlatetom.o gelf_xlatetom.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_sym.Tpo .deps/gelf_update_sym.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getsym.Tpo .deps/gelf_getsym.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getverdef.Tpo .deps/gelf_getverdef.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT nlist.o -MD -MP -MF .deps/nlist.Tpo -c -o nlist.o nlist.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getarsym.Tpo .deps/elf_getarsym.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getsymshndx.o -MD -MP -MF .deps/gelf_getsymshndx.Tpo -c -o gelf_getsymshndx.o gelf_getsymshndx.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_symshndx.o -MD -MP -MF .deps/gelf_update_symshndx.Tpo -c -o gelf_update_symshndx.o gelf_update_symshndx.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_versym.o -MD -MP -MF .deps/gelf_update_versym.Tpo -c -o gelf_update_versym.o gelf_update_versym.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_verneed.o -MD -MP -MF .deps/gelf_update_verneed.Tpo -c -o gelf_update_verneed.o gelf_update_verneed.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_vernaux.o -MD -MP -MF .deps/gelf_update_vernaux.Tpo -c -o gelf_update_vernaux.o gelf_update_vernaux.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_getshdr.Tpo .deps/elf32_getshdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_move.Tpo .deps/gelf_update_move.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getverdaux.Tpo .deps/gelf_getverdaux.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_verdef.o -MD -MP -MF .deps/gelf_update_verdef.Tpo -c -o gelf_update_verdef.o gelf_update_verdef.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_verdaux.o -MD -MP -MF .deps/gelf_update_verdaux.Tpo -c -o gelf_update_verdaux.o gelf_update_verdaux.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getrela.Tpo .deps/gelf_getrela.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_update.Tpo .deps/elf_update.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getrel.Tpo .deps/gelf_getrel.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_rel.Tpo .deps/gelf_update_rel.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getdyn.Tpo .deps/gelf_getdyn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_rela.Tpo .deps/gelf_update_rela.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_dyn.Tpo .deps/gelf_update_dyn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getmove.Tpo .deps/gelf_getmove.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getsyminfo.Tpo .deps/gelf_getsyminfo.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getphdrnum.o -MD -MP -MF .deps/elf_getphdrnum.Tpo -c -o elf_getphdrnum.o elf_getphdrnum.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getshdrnum.o -MD -MP -MF .deps/elf_getshdrnum.Tpo -c -o elf_getshdrnum.o elf_getshdrnum.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_syminfo.Tpo .deps/gelf_update_syminfo.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getshdrstrndx.o -MD -MP -MF .deps/elf_getshdrstrndx.Tpo -c -o elf_getshdrstrndx.o elf_getshdrstrndx.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_checksum.o -MD -MP -MF .deps/gelf_checksum.Tpo -c -o gelf_checksum.o gelf_checksum.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_checksum.o -MD -MP -MF .deps/elf32_checksum.Tpo -c -o elf32_checksum.o elf32_checksum.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_checksum.o -MD -MP -MF .deps/elf64_checksum.Tpo -c -o elf64_checksum.o elf64_checksum.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT libelf_crc32.o -MD -MP -MF .deps/libelf_crc32.Tpo -c -o libelf_crc32.o libelf_crc32.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT libelf_next_prime.o -MD -MP -MF .deps/libelf_next_prime.Tpo -c -o libelf_next_prime.o libelf_next_prime.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_clone.o -MD -MP -MF .deps/elf_clone.Tpo -c -o elf_clone.o elf_clone.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getlib.o -MD -MP -MF .deps/gelf_getlib.Tpo -c -o gelf_getlib.o gelf_getlib.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_update_lib.o -MD -MP -MF .deps/gelf_update_lib.Tpo -c -o gelf_update_lib.o gelf_update_lib.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getauxv.Tpo .deps/gelf_getauxv.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_auxv.Tpo .deps/gelf_update_auxv.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getnote.Tpo .deps/gelf_getnote.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_xlatetof.Tpo .deps/gelf_xlatetof.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_getshdr.Tpo .deps/elf64_getshdr.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_offscn.o -MD -MP -MF .deps/elf32_offscn.Tpo -c -o elf32_offscn.o elf32_offscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_offscn.o -MD -MP -MF .deps/elf64_offscn.Tpo -c -o elf64_offscn.o elf64_offscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_offscn.o -MD -MP -MF .deps/gelf_offscn.Tpo -c -o gelf_offscn.o gelf_offscn.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_getaroff.o -MD -MP -MF .deps/elf_getaroff.Tpo -c -o elf_getaroff.o elf_getaroff.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getdata.Tpo .deps/elf_getdata.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_gnu_hash.o -MD -MP -MF .deps/elf_gnu_hash.Tpo -c -o elf_gnu_hash.o elf_gnu_hash.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_scnshndx.o -MD -MP -MF .deps/elf_scnshndx.Tpo -c -o elf_scnshndx.o elf_scnshndx.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/libelf_next_prime.Tpo .deps/libelf_next_prime.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf32_getchdr.o -MD -MP -MF .deps/elf32_getchdr.Tpo -c -o elf32_getchdr.o elf32_getchdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_xlatetom.Tpo .deps/gelf_xlatetom.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf64_getchdr.o -MD -MP -MF .deps/elf64_getchdr.Tpo -c -o elf64_getchdr.o elf64_getchdr.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_vernaux.Tpo .deps/gelf_update_vernaux.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_versym.Tpo .deps/gelf_update_versym.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_verneed.Tpo .deps/gelf_update_verneed.Po Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT gelf_getchdr.o -MD -MP -MF .deps/gelf_getchdr.Tpo -c -o gelf_getchdr.o gelf_getchdr.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_compress.o -MD -MP -MF .deps/elf_compress.Tpo -c -o elf_compress.o elf_compress.c Step #30 - "compile-libfuzzer-address-i386": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -MT elf_compress_gnu.o -MD -MP -MF .deps/elf_compress_gnu.Tpo -c -o elf_compress_gnu.o elf_compress_gnu.c Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getsymshndx.Tpo .deps/gelf_getsymshndx.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_symshndx.Tpo .deps/gelf_update_symshndx.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_version.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_version.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_version.Tpo" `test -f 'elf_version.c' || echo './'`elf_version.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_version.Tpo" >> ".deps/elf_version.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_version.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_version.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/libelf_crc32.Tpo .deps/libelf_crc32.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_verdef.Tpo .deps/gelf_update_verdef.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_hash.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_hash.Tpo" `test -f 'elf_hash.c' || echo './'`elf_hash.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_hash.Tpo" >> ".deps/elf_hash.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_hash.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_hash.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_verdaux.Tpo .deps/gelf_update_verdaux.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_error.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_error.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_error.Tpo" `test -f 'elf_error.c' || echo './'`elf_error.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_error.Tpo" >> ".deps/elf_error.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_error.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_error.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_fill.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_fill.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_fill.Tpo" `test -f 'elf_fill.c' || echo './'`elf_fill.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_fill.Tpo" >> ".deps/elf_fill.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_fill.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_fill.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_next.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_next.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_next.Tpo" `test -f 'elf_next.c' || echo './'`elf_next.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_next.Tpo" >> ".deps/elf_next.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_next.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_next.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_checksum.Tpo .deps/gelf_checksum.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_rand.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rand.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_rand.Tpo" `test -f 'elf_rand.c' || echo './'`elf_rand.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_rand.Tpo" >> ".deps/elf_rand.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_rand.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_rand.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getshdrnum.Tpo .deps/elf_getshdrnum.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getlib.Tpo .deps/gelf_getlib.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_end.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_end.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_end.Tpo" `test -f 'elf_end.c' || echo './'`elf_end.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_end.Tpo" >> ".deps/elf_end.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_end.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_end.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_kind.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_kind.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_kind.Tpo" `test -f 'elf_kind.c' || echo './'`elf_kind.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_kind.Tpo" >> ".deps/elf_kind.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_kind.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_kind.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_offscn.Tpo .deps/gelf_offscn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_update_lib.Tpo .deps/gelf_update_lib.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_clone.Tpo .deps/elf_clone.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getclass.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getclass.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getclass.Tpo" `test -f 'gelf_getclass.c' || echo './'`gelf_getclass.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getclass.Tpo" >> ".deps/gelf_getclass.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getclass.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getclass.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getaroff.Tpo .deps/elf_getaroff.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getbase.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getbase.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getbase.Tpo" `test -f 'elf_getbase.c' || echo './'`elf_getbase.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getbase.Tpo" >> ".deps/elf_getbase.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getbase.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getbase.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getident.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getident.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getident.Tpo" `test -f 'elf_getident.c' || echo './'`elf_getident.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getident.Tpo" >> ".deps/elf_getident.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getident.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getident.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getphdrnum.Tpo .deps/elf_getphdrnum.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_checksum.Tpo .deps/elf64_checksum.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_fsize.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_fsize.Tpo" `test -f 'elf32_fsize.c' || echo './'`elf32_fsize.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_fsize.Tpo" >> ".deps/elf32_fsize.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_fsize.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_fsize.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_fsize.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_fsize.Tpo" `test -f 'elf64_fsize.c' || echo './'`elf64_fsize.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_fsize.Tpo" >> ".deps/elf64_fsize.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_fsize.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_fsize.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_checksum.Tpo .deps/elf32_checksum.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_gnu_hash.Tpo .deps/elf_gnu_hash.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_fsize.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_fsize.Tpo" `test -f 'gelf_fsize.c' || echo './'`gelf_fsize.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_fsize.Tpo" >> ".deps/gelf_fsize.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_fsize.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_fsize.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_scnshndx.Tpo .deps/elf_scnshndx.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_offscn.Tpo .deps/elf32_offscn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_offscn.Tpo .deps/elf64_offscn.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_getchdr.Tpo .deps/elf32_getchdr.Po Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_getchdr.Tpo .deps/elf64_getchdr.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetof.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_xlatetof.Tpo" `test -f 'elf32_xlatetof.c' || echo './'`elf32_xlatetof.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_xlatetof.Tpo" >> ".deps/elf32_xlatetof.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_xlatetof.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_xlatetof.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/nlist.Tpo .deps/nlist.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetom.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_xlatetom.Tpo" `test -f 'elf32_xlatetom.c' || echo './'`elf32_xlatetom.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_xlatetom.Tpo" >> ".deps/elf32_xlatetom.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_xlatetom.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_xlatetom.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_updatenull.Tpo .deps/elf32_updatenull.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetof.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_xlatetof.Tpo" `test -f 'elf64_xlatetof.c' || echo './'`elf64_xlatetof.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_xlatetof.Tpo" >> ".deps/elf64_xlatetof.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_xlatetof.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_xlatetof.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetom.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_xlatetom.Tpo" `test -f 'elf64_xlatetom.c' || echo './'`elf64_xlatetom.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_xlatetom.Tpo" >> ".deps/elf64_xlatetom.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_xlatetom.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_xlatetom.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_getehdr.Tpo" `test -f 'elf32_getehdr.c' || echo './'`elf32_getehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_getehdr.Tpo" >> ".deps/elf32_getehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_getehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_getehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_getehdr.Tpo" `test -f 'elf64_getehdr.c' || echo './'`elf64_getehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_getehdr.Tpo" >> ".deps/elf64_getehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_getehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_getehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getehdr.Tpo" `test -f 'gelf_getehdr.c' || echo './'`gelf_getehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getehdr.Tpo" >> ".deps/gelf_getehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_newehdr.Tpo" `test -f 'elf32_newehdr.c' || echo './'`elf32_newehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_newehdr.Tpo" >> ".deps/elf32_newehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_newehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_newehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_newehdr.Tpo" `test -f 'elf64_newehdr.c' || echo './'`elf64_newehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_newehdr.Tpo" >> ".deps/elf64_newehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_newehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_newehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_getshdrstrndx.Tpo .deps/elf_getshdrstrndx.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_newehdr.Tpo" `test -f 'gelf_newehdr.c' || echo './'`gelf_newehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_newehdr.Tpo" >> ".deps/gelf_newehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_newehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_newehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_getchdr.Tpo .deps/gelf_getchdr.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_ehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_ehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_ehdr.Tpo" `test -f 'gelf_update_ehdr.c' || echo './'`gelf_update_ehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_ehdr.Tpo" >> ".deps/gelf_update_ehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_ehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_ehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_getphdr.Tpo" `test -f 'elf32_getphdr.c' || echo './'`elf32_getphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_getphdr.Tpo" >> ".deps/elf32_getphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_getphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_getphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_getphdr.Tpo" `test -f 'elf64_getphdr.c' || echo './'`elf64_getphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_getphdr.Tpo" >> ".deps/elf64_getphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_getphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_getphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getphdr.Tpo" `test -f 'gelf_getphdr.c' || echo './'`gelf_getphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getphdr.Tpo" >> ".deps/gelf_getphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_newphdr.Tpo" `test -f 'elf32_newphdr.c' || echo './'`elf32_newphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_newphdr.Tpo" >> ".deps/elf32_newphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_newphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_newphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_updatenull.Tpo .deps/elf64_updatenull.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_newphdr.Tpo" `test -f 'elf64_newphdr.c' || echo './'`elf64_newphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_newphdr.Tpo" >> ".deps/elf64_newphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_newphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_newphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_newphdr.Tpo" `test -f 'gelf_newphdr.c' || echo './'`gelf_newphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_newphdr.Tpo" >> ".deps/gelf_newphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_newphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_newphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_phdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_phdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_phdr.Tpo" `test -f 'gelf_update_phdr.c' || echo './'`gelf_update_phdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_phdr.Tpo" >> ".deps/gelf_update_phdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_phdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_phdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getarhdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarhdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getarhdr.Tpo" `test -f 'elf_getarhdr.c' || echo './'`elf_getarhdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getarhdr.Tpo" >> ".deps/elf_getarhdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getarhdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getarhdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getarsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarsym.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getarsym.Tpo" `test -f 'elf_getarsym.c' || echo './'`elf_getarsym.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getarsym.Tpo" >> ".deps/elf_getarsym.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getarsym.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getarsym.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_compress_gnu.Tpo .deps/elf_compress_gnu.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_rawfile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawfile.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_rawfile.Tpo" `test -f 'elf_rawfile.c' || echo './'`elf_rawfile.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_rawfile.Tpo" >> ".deps/elf_rawfile.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_rawfile.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_rawfile.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_readall.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_readall.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_readall.Tpo" `test -f 'elf_readall.c' || echo './'`elf_readall.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_readall.Tpo" >> ".deps/elf_readall.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_readall.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_readall.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_cntl.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_cntl.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_cntl.Tpo" `test -f 'elf_cntl.c' || echo './'`elf_cntl.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_cntl.Tpo" >> ".deps/elf_cntl.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_cntl.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_cntl.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getscn.Tpo" `test -f 'elf_getscn.c' || echo './'`elf_getscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getscn.Tpo" >> ".deps/elf_getscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_nextscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_nextscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_nextscn.Tpo" `test -f 'elf_nextscn.c' || echo './'`elf_nextscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_nextscn.Tpo" >> ".deps/elf_nextscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_nextscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_nextscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_ndxscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_ndxscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_ndxscn.Tpo" `test -f 'elf_ndxscn.c' || echo './'`elf_ndxscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_ndxscn.Tpo" >> ".deps/elf_ndxscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_ndxscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_ndxscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_newscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_newscn.Tpo" `test -f 'elf_newscn.c' || echo './'`elf_newscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_newscn.Tpo" >> ".deps/elf_newscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_newscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_newscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getshdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_getshdr.Tpo" `test -f 'elf32_getshdr.c' || echo './'`elf32_getshdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_getshdr.Tpo" >> ".deps/elf32_getshdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_getshdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_getshdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getshdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_getshdr.Tpo" `test -f 'elf64_getshdr.c' || echo './'`elf64_getshdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_getshdr.Tpo" >> ".deps/elf64_getshdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_getshdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_getshdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getshdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getshdr.Tpo" `test -f 'gelf_getshdr.c' || echo './'`gelf_getshdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getshdr.Tpo" >> ".deps/gelf_getshdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getshdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getshdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_shdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_shdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_shdr.Tpo" `test -f 'gelf_update_shdr.c' || echo './'`gelf_update_shdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_shdr.Tpo" >> ".deps/gelf_update_shdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_shdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_shdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_strptr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_strptr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_strptr.Tpo" `test -f 'elf_strptr.c' || echo './'`elf_strptr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_strptr.Tpo" >> ".deps/elf_strptr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_strptr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_strptr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_rawdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawdata.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_rawdata.Tpo" `test -f 'elf_rawdata.c' || echo './'`elf_rawdata.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_rawdata.Tpo" >> ".deps/elf_rawdata.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_rawdata.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_rawdata.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getdata.Tpo" `test -f 'elf_getdata.c' || echo './'`elf_getdata.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getdata.Tpo" >> ".deps/elf_getdata.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getdata.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getdata.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_newdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newdata.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_newdata.Tpo" `test -f 'elf_newdata.c' || echo './'`elf_newdata.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_newdata.Tpo" >> ".deps/elf_newdata.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_newdata.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_newdata.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getdata_rawchunk.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata_rawchunk.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getdata_rawchunk.Tpo" `test -f 'elf_getdata_rawchunk.c' || echo './'`elf_getdata_rawchunk.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getdata_rawchunk.Tpo" >> ".deps/elf_getdata_rawchunk.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getdata_rawchunk.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getdata_rawchunk.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagelf.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagelf.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_flagelf.Tpo" `test -f 'elf_flagelf.c' || echo './'`elf_flagelf.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_flagelf.Tpo" >> ".deps/elf_flagelf.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_flagelf.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_flagelf.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagehdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_flagehdr.Tpo" `test -f 'elf_flagehdr.c' || echo './'`elf_flagehdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_flagehdr.Tpo" >> ".deps/elf_flagehdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_flagehdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_flagehdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagphdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_flagphdr.Tpo" `test -f 'elf_flagphdr.c' || echo './'`elf_flagphdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_flagphdr.Tpo" >> ".deps/elf_flagphdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_flagphdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_flagphdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_flagscn.Tpo" `test -f 'elf_flagscn.c' || echo './'`elf_flagscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_flagscn.Tpo" >> ".deps/elf_flagscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_flagscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_flagscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagshdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_flagshdr.Tpo" `test -f 'elf_flagshdr.c' || echo './'`elf_flagshdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_flagshdr.Tpo" >> ".deps/elf_flagshdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_flagshdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_flagshdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_flagdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagdata.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_flagdata.Tpo" `test -f 'elf_flagdata.c' || echo './'`elf_flagdata.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_flagdata.Tpo" >> ".deps/elf_flagdata.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_flagdata.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_flagdata.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_memory.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_memory.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_memory.Tpo" `test -f 'elf_memory.c' || echo './'`elf_memory.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_memory.Tpo" >> ".deps/elf_memory.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_memory.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_memory.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_update.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_update.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_update.Tpo" `test -f 'elf_update.c' || echo './'`elf_update.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_update.Tpo" >> ".deps/elf_update.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_update.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_update.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatenull.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_updatenull.Tpo" `test -f 'elf32_updatenull.c' || echo './'`elf32_updatenull.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_updatenull.Tpo" >> ".deps/elf32_updatenull.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_updatenull.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_updatenull.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatenull.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_updatenull.Tpo" `test -f 'elf64_updatenull.c' || echo './'`elf64_updatenull.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_updatenull.Tpo" >> ".deps/elf64_updatenull.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_updatenull.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_updatenull.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsym.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getsym.Tpo" `test -f 'gelf_getsym.c' || echo './'`gelf_getsym.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getsym.Tpo" >> ".deps/gelf_getsym.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getsym.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getsym.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_sym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_sym.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_sym.Tpo" `test -f 'gelf_update_sym.c' || echo './'`gelf_update_sym.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_sym.Tpo" >> ".deps/gelf_update_sym.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_sym.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_sym.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_begin.Tpo .deps/elf_begin.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getversym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getversym.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getversym.Tpo" `test -f 'gelf_getversym.c' || echo './'`gelf_getversym.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getversym.Tpo" >> ".deps/gelf_getversym.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getversym.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getversym.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getverneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverneed.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getverneed.Tpo" `test -f 'gelf_getverneed.c' || echo './'`gelf_getverneed.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getverneed.Tpo" >> ".deps/gelf_getverneed.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getverneed.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getverneed.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getvernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getvernaux.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getvernaux.Tpo" `test -f 'gelf_getvernaux.c' || echo './'`gelf_getvernaux.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getvernaux.Tpo" >> ".deps/gelf_getvernaux.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getvernaux.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getvernaux.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getverdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdef.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getverdef.Tpo" `test -f 'gelf_getverdef.c' || echo './'`gelf_getverdef.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getverdef.Tpo" >> ".deps/gelf_getverdef.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getverdef.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getverdef.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getverdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdaux.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getverdaux.Tpo" `test -f 'gelf_getverdaux.c' || echo './'`gelf_getverdaux.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getverdaux.Tpo" >> ".deps/gelf_getverdaux.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getverdaux.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getverdaux.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getrel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrel.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getrel.Tpo" `test -f 'gelf_getrel.c' || echo './'`gelf_getrel.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getrel.Tpo" >> ".deps/gelf_getrel.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getrel.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getrel.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getrela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrela.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getrela.Tpo" `test -f 'gelf_getrela.c' || echo './'`gelf_getrela.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getrela.Tpo" >> ".deps/gelf_getrela.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getrela.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getrela.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_rel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rel.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_rel.Tpo" `test -f 'gelf_update_rel.c' || echo './'`gelf_update_rel.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_rel.Tpo" >> ".deps/gelf_update_rel.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_rel.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_rel.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_rela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rela.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_rela.Tpo" `test -f 'gelf_update_rela.c' || echo './'`gelf_update_rela.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_rela.Tpo" >> ".deps/gelf_update_rela.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_rela.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_rela.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getdyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getdyn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getdyn.Tpo" `test -f 'gelf_getdyn.c' || echo './'`gelf_getdyn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getdyn.Tpo" >> ".deps/gelf_getdyn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getdyn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getdyn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_dyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_dyn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_dyn.Tpo" `test -f 'gelf_update_dyn.c' || echo './'`gelf_update_dyn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_dyn.Tpo" >> ".deps/gelf_update_dyn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_dyn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_dyn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf_compress.Tpo .deps/elf_compress.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getmove.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getmove.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getmove.Tpo" `test -f 'gelf_getmove.c' || echo './'`gelf_getmove.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getmove.Tpo" >> ".deps/gelf_getmove.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getmove.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getmove.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_move.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_move.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_move.Tpo" `test -f 'gelf_update_move.c' || echo './'`gelf_update_move.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_move.Tpo" >> ".deps/gelf_update_move.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_move.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_move.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getsyminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsyminfo.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getsyminfo.Tpo" `test -f 'gelf_getsyminfo.c' || echo './'`gelf_getsyminfo.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getsyminfo.Tpo" >> ".deps/gelf_getsyminfo.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getsyminfo.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getsyminfo.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_syminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_syminfo.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_syminfo.Tpo" `test -f 'gelf_update_syminfo.c' || echo './'`gelf_update_syminfo.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_syminfo.Tpo" >> ".deps/gelf_update_syminfo.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_syminfo.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_syminfo.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getauxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getauxv.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getauxv.Tpo" `test -f 'gelf_getauxv.c' || echo './'`gelf_getauxv.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getauxv.Tpo" >> ".deps/gelf_getauxv.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getauxv.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getauxv.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_auxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_auxv.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_auxv.Tpo" `test -f 'gelf_update_auxv.c' || echo './'`gelf_update_auxv.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_auxv.Tpo" >> ".deps/gelf_update_auxv.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_auxv.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_auxv.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getnote.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getnote.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getnote.Tpo" `test -f 'gelf_getnote.c' || echo './'`gelf_getnote.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getnote.Tpo" >> ".deps/gelf_getnote.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getnote.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getnote.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf32_updatefile.Tpo .deps/elf32_updatefile.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetof.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_xlatetof.Tpo" `test -f 'gelf_xlatetof.c' || echo './'`gelf_xlatetof.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_xlatetof.Tpo" >> ".deps/gelf_xlatetof.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_xlatetof.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_xlatetof.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/elf64_updatefile.Tpo .deps/elf64_updatefile.Po Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetom.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_xlatetom.Tpo" `test -f 'gelf_xlatetom.c' || echo './'`gelf_xlatetom.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_xlatetom.Tpo" >> ".deps/gelf_xlatetom.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_xlatetom.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_xlatetom.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o nlist.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT nlist.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/nlist.Tpo" `test -f 'nlist.c' || echo './'`nlist.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/nlist.Tpo" >> ".deps/nlist.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/nlist.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/nlist.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getsymshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsymshndx.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getsymshndx.Tpo" `test -f 'gelf_getsymshndx.c' || echo './'`gelf_getsymshndx.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getsymshndx.Tpo" >> ".deps/gelf_getsymshndx.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getsymshndx.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getsymshndx.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_symshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_symshndx.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_symshndx.Tpo" `test -f 'gelf_update_symshndx.c' || echo './'`gelf_update_symshndx.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_symshndx.Tpo" >> ".deps/gelf_update_symshndx.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_symshndx.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_symshndx.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_versym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_versym.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_versym.Tpo" `test -f 'gelf_update_versym.c' || echo './'`gelf_update_versym.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_versym.Tpo" >> ".deps/gelf_update_versym.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_versym.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_versym.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_verneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verneed.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_verneed.Tpo" `test -f 'gelf_update_verneed.c' || echo './'`gelf_update_verneed.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_verneed.Tpo" >> ".deps/gelf_update_verneed.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_verneed.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_verneed.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_vernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_vernaux.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_vernaux.Tpo" `test -f 'gelf_update_vernaux.c' || echo './'`gelf_update_vernaux.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_vernaux.Tpo" >> ".deps/gelf_update_vernaux.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_vernaux.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_vernaux.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_verdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdef.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_verdef.Tpo" `test -f 'gelf_update_verdef.c' || echo './'`gelf_update_verdef.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_verdef.Tpo" >> ".deps/gelf_update_verdef.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_verdef.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_verdef.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_verdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdaux.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_verdaux.Tpo" `test -f 'gelf_update_verdaux.c' || echo './'`gelf_update_verdaux.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_verdaux.Tpo" >> ".deps/gelf_update_verdaux.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_verdaux.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_verdaux.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getphdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getphdrnum.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getphdrnum.Tpo" `test -f 'elf_getphdrnum.c' || echo './'`elf_getphdrnum.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getphdrnum.Tpo" >> ".deps/elf_getphdrnum.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getphdrnum.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getphdrnum.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getshdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrnum.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getshdrnum.Tpo" `test -f 'elf_getshdrnum.c' || echo './'`elf_getshdrnum.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getshdrnum.Tpo" >> ".deps/elf_getshdrnum.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getshdrnum.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getshdrnum.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getshdrstrndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrstrndx.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getshdrstrndx.Tpo" `test -f 'elf_getshdrstrndx.c' || echo './'`elf_getshdrstrndx.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getshdrstrndx.Tpo" >> ".deps/elf_getshdrstrndx.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getshdrstrndx.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getshdrstrndx.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_checksum.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_checksum.Tpo" `test -f 'gelf_checksum.c' || echo './'`gelf_checksum.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_checksum.Tpo" >> ".deps/gelf_checksum.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_checksum.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_checksum.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_checksum.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_checksum.Tpo" `test -f 'elf32_checksum.c' || echo './'`elf32_checksum.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_checksum.Tpo" >> ".deps/elf32_checksum.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_checksum.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_checksum.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_checksum.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_checksum.Tpo" `test -f 'elf64_checksum.c' || echo './'`elf64_checksum.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_checksum.Tpo" >> ".deps/elf64_checksum.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_checksum.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_checksum.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o libelf_crc32.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_crc32.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/libelf_crc32.Tpo" `test -f 'libelf_crc32.c' || echo './'`libelf_crc32.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/libelf_crc32.Tpo" >> ".deps/libelf_crc32.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/libelf_crc32.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/libelf_crc32.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o libelf_next_prime.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_next_prime.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/libelf_next_prime.Tpo" `test -f 'libelf_next_prime.c' || echo './'`libelf_next_prime.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/libelf_next_prime.Tpo" >> ".deps/libelf_next_prime.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/libelf_next_prime.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/libelf_next_prime.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_clone.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_clone.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_clone.Tpo" `test -f 'elf_clone.c' || echo './'`elf_clone.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_clone.Tpo" >> ".deps/elf_clone.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_clone.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_clone.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getlib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getlib.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getlib.Tpo" `test -f 'gelf_getlib.c' || echo './'`gelf_getlib.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getlib.Tpo" >> ".deps/gelf_getlib.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getlib.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getlib.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_update_lib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_lib.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_update_lib.Tpo" `test -f 'gelf_update_lib.c' || echo './'`gelf_update_lib.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_update_lib.Tpo" >> ".deps/gelf_update_lib.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_update_lib.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_update_lib.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_offscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_offscn.Tpo" `test -f 'elf32_offscn.c' || echo './'`elf32_offscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_offscn.Tpo" >> ".deps/elf32_offscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_offscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_offscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_offscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_offscn.Tpo" `test -f 'elf64_offscn.c' || echo './'`elf64_offscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_offscn.Tpo" >> ".deps/elf64_offscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_offscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_offscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_offscn.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_offscn.Tpo" `test -f 'gelf_offscn.c' || echo './'`gelf_offscn.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_offscn.Tpo" >> ".deps/gelf_offscn.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_offscn.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_offscn.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_getaroff.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getaroff.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_getaroff.Tpo" `test -f 'elf_getaroff.c' || echo './'`elf_getaroff.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_getaroff.Tpo" >> ".deps/elf_getaroff.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_getaroff.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_getaroff.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_gnu_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_gnu_hash.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_gnu_hash.Tpo" `test -f 'elf_gnu_hash.c' || echo './'`elf_gnu_hash.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_gnu_hash.Tpo" >> ".deps/elf_gnu_hash.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_gnu_hash.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_gnu_hash.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_scnshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_scnshndx.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_scnshndx.Tpo" `test -f 'elf_scnshndx.c' || echo './'`elf_scnshndx.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_scnshndx.Tpo" >> ".deps/elf_scnshndx.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_scnshndx.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_scnshndx.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getchdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_getchdr.Tpo" `test -f 'elf32_getchdr.c' || echo './'`elf32_getchdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_getchdr.Tpo" >> ".deps/elf32_getchdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_getchdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_getchdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getchdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_getchdr.Tpo" `test -f 'elf64_getchdr.c' || echo './'`elf64_getchdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_getchdr.Tpo" >> ".deps/elf64_getchdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_getchdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_getchdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getchdr.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_getchdr.Tpo" `test -f 'gelf_getchdr.c' || echo './'`gelf_getchdr.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_getchdr.Tpo" >> ".deps/gelf_getchdr.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_getchdr.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_getchdr.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_compress.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_compress.Tpo" `test -f 'elf_compress.c' || echo './'`elf_compress.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_compress.Tpo" >> ".deps/elf_compress.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_compress.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_compress.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_compress_gnu.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress_gnu.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_compress_gnu.Tpo" `test -f 'elf_compress_gnu.c' || echo './'`elf_compress_gnu.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_compress_gnu.Tpo" >> ".deps/elf_compress_gnu.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_compress_gnu.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_compress_gnu.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf_begin.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_begin.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf_begin.Tpo" `test -f 'elf_begin.c' || echo './'`elf_begin.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf_begin.Tpo" >> ".deps/elf_begin.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf_begin.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf_begin.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf32_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatefile.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf32_updatefile.Tpo" `test -f 'elf32_updatefile.c' || echo './'`elf32_updatefile.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf32_updatefile.Tpo" >> ".deps/elf32_updatefile.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf32_updatefile.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf32_updatefile.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o elf64_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatefile.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/elf64_updatefile.Tpo" `test -f 'elf64_updatefile.c' || echo './'`elf64_updatefile.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/elf64_updatefile.Tpo" >> ".deps/elf64_updatefile.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/elf64_updatefile.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/elf64_updatefile.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": mv -f .deps/gelf_xlate.Tpo .deps/gelf_xlate.Po Step #30 - "compile-libfuzzer-address-i386": rm -f libelf.a Step #30 - "compile-libfuzzer-address-i386": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -c -o gelf_xlate.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlate.os -MD -MP \ Step #30 - "compile-libfuzzer-address-i386": -MF ".deps/gelf_xlate.Tpo" `test -f 'gelf_xlate.c' || echo './'`gelf_xlate.c; \ Step #30 - "compile-libfuzzer-address-i386": then cat ".deps/gelf_xlate.Tpo" >> ".deps/gelf_xlate.Po"; \ Step #30 - "compile-libfuzzer-address-i386": rm -f ".deps/gelf_xlate.Tpo"; \ Step #30 - "compile-libfuzzer-address-i386": else rm -f ".deps/gelf_xlate.Tpo"; exit 1; \ Step #30 - "compile-libfuzzer-address-i386": fi Step #30 - "compile-libfuzzer-address-i386": ar cr libelf.a elf_version.o elf_hash.o elf_error.o elf_fill.o elf_begin.o elf_next.o elf_rand.o elf_end.o elf_kind.o gelf_getclass.o elf_getbase.o elf_getident.o elf32_fsize.o elf64_fsize.o gelf_fsize.o elf32_xlatetof.o elf32_xlatetom.o elf64_xlatetof.o elf64_xlatetom.o gelf_xlate.o elf32_getehdr.o elf64_getehdr.o gelf_getehdr.o elf32_newehdr.o elf64_newehdr.o gelf_newehdr.o gelf_update_ehdr.o elf32_getphdr.o elf64_getphdr.o gelf_getphdr.o elf32_newphdr.o elf64_newphdr.o gelf_newphdr.o gelf_update_phdr.o elf_getarhdr.o elf_getarsym.o elf_rawfile.o elf_readall.o elf_cntl.o elf_getscn.o elf_nextscn.o elf_ndxscn.o elf_newscn.o elf32_getshdr.o elf64_getshdr.o gelf_getshdr.o gelf_update_shdr.o elf_strptr.o elf_rawdata.o elf_getdata.o elf_newdata.o elf_getdata_rawchunk.o elf_flagelf.o elf_flagehdr.o elf_flagphdr.o elf_flagscn.o elf_flagshdr.o elf_flagdata.o elf_memory.o elf_update.o elf32_updatenull.o elf64_updatenull.o elf32_updatefile.o elf64_updatefile.o gelf_getsym.o gelf_update_sym.o gelf_getversym.o gelf_getverneed.o gelf_getvernaux.o gelf_getverdef.o gelf_getverdaux.o gelf_getrel.o gelf_getrela.o gelf_update_rel.o gelf_update_rela.o gelf_getdyn.o gelf_update_dyn.o gelf_getmove.o gelf_update_move.o gelf_getsyminfo.o gelf_update_syminfo.o gelf_getauxv.o gelf_update_auxv.o gelf_getnote.o gelf_xlatetof.o gelf_xlatetom.o nlist.o gelf_getsymshndx.o gelf_update_symshndx.o gelf_update_versym.o gelf_update_verneed.o gelf_update_vernaux.o gelf_update_verdef.o gelf_update_verdaux.o elf_getphdrnum.o elf_getshdrnum.o elf_getshdrstrndx.o gelf_checksum.o elf32_checksum.o elf64_checksum.o libelf_crc32.o libelf_next_prime.o elf_clone.o gelf_getlib.o gelf_update_lib.o elf32_offscn.o elf64_offscn.o gelf_offscn.o elf_getaroff.o elf_gnu_hash.o elf_scnshndx.o elf32_getchdr.o elf64_getchdr.o gelf_getchdr.o elf_compress.o elf_compress_gnu.o Step #30 - "compile-libfuzzer-address-i386": ranlib libelf.a Step #30 - "compile-libfuzzer-address-i386": rm -f libelf_pic.a Step #30 - "compile-libfuzzer-address-i386": ar cr libelf_pic.a elf_version.os elf_hash.os elf_error.os elf_fill.os elf_begin.os elf_next.os elf_rand.os elf_end.os elf_kind.os gelf_getclass.os elf_getbase.os elf_getident.os elf32_fsize.os elf64_fsize.os gelf_fsize.os elf32_xlatetof.os elf32_xlatetom.os elf64_xlatetof.os elf64_xlatetom.os gelf_xlate.os elf32_getehdr.os elf64_getehdr.os gelf_getehdr.os elf32_newehdr.os elf64_newehdr.os gelf_newehdr.os gelf_update_ehdr.os elf32_getphdr.os elf64_getphdr.os gelf_getphdr.os elf32_newphdr.os elf64_newphdr.os gelf_newphdr.os gelf_update_phdr.os elf_getarhdr.os elf_getarsym.os elf_rawfile.os elf_readall.os elf_cntl.os elf_getscn.os elf_nextscn.os elf_ndxscn.os elf_newscn.os elf32_getshdr.os elf64_getshdr.os gelf_getshdr.os gelf_update_shdr.os elf_strptr.os elf_rawdata.os elf_getdata.os elf_newdata.os elf_getdata_rawchunk.os elf_flagelf.os elf_flagehdr.os elf_flagphdr.os elf_flagscn.os elf_flagshdr.os elf_flagdata.os elf_memory.os elf_update.os elf32_updatenull.os elf64_updatenull.os elf32_updatefile.os elf64_updatefile.os gelf_getsym.os gelf_update_sym.os gelf_getversym.os gelf_getverneed.os gelf_getvernaux.os gelf_getverdef.os gelf_getverdaux.os gelf_getrel.os gelf_getrela.os gelf_update_rel.os gelf_update_rela.os gelf_getdyn.os gelf_update_dyn.os gelf_getmove.os gelf_update_move.os gelf_getsyminfo.os gelf_update_syminfo.os gelf_getauxv.os gelf_update_auxv.os gelf_getnote.os gelf_xlatetof.os gelf_xlatetom.os nlist.os gelf_getsymshndx.os gelf_update_symshndx.os gelf_update_versym.os gelf_update_verneed.os gelf_update_vernaux.os gelf_update_verdef.os gelf_update_verdaux.os elf_getphdrnum.os elf_getshdrnum.os elf_getshdrstrndx.os gelf_checksum.os elf32_checksum.os elf64_checksum.os libelf_crc32.os libelf_next_prime.os elf_clone.os gelf_getlib.os gelf_update_lib.os elf32_offscn.os elf64_offscn.os gelf_offscn.os elf_getaroff.os elf_gnu_hash.os elf_scnshndx.os elf32_getchdr.os elf64_getchdr.os gelf_getchdr.os elf_compress.os elf_compress_gnu.os Step #30 - "compile-libfuzzer-address-i386": ranlib libelf_pic.a Step #30 - "compile-libfuzzer-address-i386": clang -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-addrsig -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -Wl,--build-id -o libelf.so -shared -Wl,-z,relro -o libelf.so \ Step #30 - "compile-libfuzzer-address-i386": -Wl,--soname,libelf.so.1 \ Step #30 - "compile-libfuzzer-address-i386": -Wl,--version-script,libelf.map \ Step #30 - "compile-libfuzzer-address-i386": \ Step #30 - "compile-libfuzzer-address-i386": -Wl,--whole-archive libelf_pic.a -Wl,--no-whole-archive \ Step #30 - "compile-libfuzzer-address-i386": ../lib/libeu.a -lz Step #30 - "compile-libfuzzer-address-i386": ln -fs libelf.so libelf.so.1 Step #30 - "compile-libfuzzer-address-i386": make: Leaving directory '/src/libbpf/elfutils/libelf' Step #30 - "compile-libfuzzer-address-i386": + make -C src BUILD_STATIC_ONLY=y V=1 clean Step #30 - "compile-libfuzzer-address-i386": make: Entering directory '/src/libbpf/src' Step #30 - "compile-libfuzzer-address-i386": Package libelf was not found in the pkg-config search path. Step #30 - "compile-libfuzzer-address-i386": Perhaps you should add the directory containing `libelf.pc' Step #30 - "compile-libfuzzer-address-i386": to the PKG_CONFIG_PATH environment variable Step #30 - "compile-libfuzzer-address-i386": No package 'libelf' found Step #30 - "compile-libfuzzer-address-i386": rm -rf *.o *.a *.so *.so.* *.pc ./sharedobjs ./staticobjs Step #30 - "compile-libfuzzer-address-i386": make: Leaving directory '/src/libbpf/src' Step #30 - "compile-libfuzzer-address-i386": ++ nproc Step #30 - "compile-libfuzzer-address-i386": ++ pwd Step #30 - "compile-libfuzzer-address-i386": + make -C src -j32 'CFLAGS=-I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' BUILD_STATIC_ONLY=y V=1 Step #30 - "compile-libfuzzer-address-i386": make: Entering directory '/src/libbpf/src' Step #30 - "compile-libfuzzer-address-i386": Package libelf was not found in the pkg-config search path. Step #30 - "compile-libfuzzer-address-i386": Perhaps you should add the directory containing `libelf.pc' Step #30 - "compile-libfuzzer-address-i386": to the PKG_CONFIG_PATH environment variable Step #30 - "compile-libfuzzer-address-i386": No package 'libelf' found Step #30 - "compile-libfuzzer-address-i386": mkdir -p staticobjs Step #30 - "compile-libfuzzer-address-i386": sed -e "s|@PREFIX@|/usr|" \ Step #30 - "compile-libfuzzer-address-i386": -e "s|@LIBDIR@|$\{prefix\}/lib64|" \ Step #30 - "compile-libfuzzer-address-i386": -e "s|@VERSION@|1.4.0|" \ Step #30 - "compile-libfuzzer-address-i386": < libbpf.pc.template > libbpf.pc Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf.c -o staticobjs/bpf.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf.c -o staticobjs/btf.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf.c -o staticobjs/libbpf.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_errno.c -o staticobjs/libbpf_errno.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c netlink.c -o staticobjs/netlink.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c nlattr.c -o staticobjs/nlattr.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c str_error.c -o staticobjs/str_error.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_probes.c -o staticobjs/libbpf_probes.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf_prog_linfo.c -o staticobjs/bpf_prog_linfo.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf_dump.c -o staticobjs/btf_dump.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c hashmap.c -o staticobjs/hashmap.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c ringbuf.c -o staticobjs/ringbuf.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c strset.c -o staticobjs/strset.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c linker.c -o staticobjs/linker.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c gen_loader.c -o staticobjs/gen_loader.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c relo_core.c -o staticobjs/relo_core.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c usdt.c -o staticobjs/usdt.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c zip.c -o staticobjs/zip.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c elf.c -o staticobjs/elf.o Step #30 - "compile-libfuzzer-address-i386": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c features.c -o staticobjs/features.o Step #30 - "compile-libfuzzer-address-i386": ar rcs libbpf.a staticobjs/bpf.o staticobjs/btf.o staticobjs/libbpf.o staticobjs/libbpf_errno.o staticobjs/netlink.o staticobjs/nlattr.o staticobjs/str_error.o staticobjs/libbpf_probes.o staticobjs/bpf_prog_linfo.o staticobjs/btf_dump.o staticobjs/hashmap.o staticobjs/ringbuf.o staticobjs/strset.o staticobjs/linker.o staticobjs/gen_loader.o staticobjs/relo_core.o staticobjs/usdt.o staticobjs/zip.o staticobjs/elf.o staticobjs/features.o Step #30 - "compile-libfuzzer-address-i386": make: Leaving directory '/src/libbpf/src' Step #30 - "compile-libfuzzer-address-i386": + clang -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o Step #30 - "compile-libfuzzer-address-i386": ++ pwd Step #30 - "compile-libfuzzer-address-i386": + clang++ -m32 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer bpf-object-fuzzer.o src/libbpf.a /src/libbpf/elfutils/libelf/libelf.a -l:libz.a -o /workspace/out/libfuzzer-address-i386/bpf-object-fuzzer Step #30 - "compile-libfuzzer-address-i386": + cp fuzz/bpf-object-fuzzer_seed_corpus.zip /workspace/out/libfuzzer-address-i386 Finished Step #30 - "compile-libfuzzer-address-i386" Starting Step #31 - "build-check-libfuzzer-address-i386" Step #31 - "build-check-libfuzzer-address-i386": Already have image (with digest): gcr.io/cloud-builders/docker Step #31 - "build-check-libfuzzer-address-i386": INFO: performing bad build checks for /tmp/not-out/tmpbpyi71vv/bpf-object-fuzzer Finished Step #31 - "build-check-libfuzzer-address-i386" Starting Step #32 Step #32: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #32 Starting Step #33 Step #33: Already have image: gcr.io/oss-fuzz/libbpf Step #33: adding: bpf-object-fuzzer (deflated 63%) Step #33: adding: bpf-object-fuzzer_seed_corpus.zip (stored 0%) Step #33: adding: llvm-symbolizer (deflated 64%) Finished Step #33 Starting Step #34 Step #34: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #34: % Total % Received % Xferd Average Speed Time Time Time Current Step #34: Dload Upload Total Spent Left Speed Step #34: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 147 0 0 100 147 0 684 --:--:-- --:--:-- --:--:-- 686 Finished Step #34 Starting Step #35 Step #35: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #35: % Total % Received % Xferd Average Speed Time Time Time Current Step #35: Dload Upload Total Spent Left Speed Step #35: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4324k 0 0 100 4324k 0 14.4M --:--:-- --:--:-- --:--:-- 14.4M Finished Step #35 Starting Step #36 Step #36: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #36: % Total % Received % Xferd Average Speed Time Time Time Current Step #36: Dload Upload Total Spent Left Speed Step #36: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 18 0 0 100 18 0 67 --:--:-- --:--:-- --:--:-- 67 Finished Step #36 Starting Step #37 Step #37: Already have image (with digest): gcr.io/cloud-builders/curl Step #37: % Total % Received % Xferd Average Speed Time Time Time Current Step #37: Dload Upload Total Spent Left Speed Step #37: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 170 --:--:-- --:--:-- --:--:-- 169 100 31 0 0 100 31 0 170 --:--:-- --:--:-- --:--:-- 169 Finished Step #37 Starting Step #38 Step #38: Already have image: gcr.io/oss-fuzz/libbpf Finished Step #38 Starting Step #39 - "compile-libfuzzer-memory-x86_64" Step #39 - "compile-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #39 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-memory-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #39 - "compile-libfuzzer-memory-x86_64": Building without MSan instrumented libraries. Step #39 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-memory-x86_64": CC=clang Step #39 - "compile-libfuzzer-memory-x86_64": CXX=clang++ Step #39 - "compile-libfuzzer-memory-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link Step #39 - "compile-libfuzzer-memory-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ Step #39 - "compile-libfuzzer-memory-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=memory -Cdebuginfo=1 -Cforce-frame-pointers Step #39 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-memory-x86_64": + ./scripts/build-fuzzers.sh Step #39 - "compile-libfuzzer-memory-x86_64": + SANITIZER=memory Step #39 - "compile-libfuzzer-memory-x86_64": + flags='-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize=fuzzer-no-link' Step #39 - "compile-libfuzzer-memory-x86_64": + export CC=clang Step #39 - "compile-libfuzzer-memory-x86_64": + CC=clang Step #39 - "compile-libfuzzer-memory-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link' Step #39 - "compile-libfuzzer-memory-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link' Step #39 - "compile-libfuzzer-memory-x86_64": + export CXX=clang++ Step #39 - "compile-libfuzzer-memory-x86_64": + CXX=clang++ Step #39 - "compile-libfuzzer-memory-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++' Step #39 - "compile-libfuzzer-memory-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++' Step #39 - "compile-libfuzzer-memory-x86_64": ++ dirname -- ./scripts/build-fuzzers.sh Step #39 - "compile-libfuzzer-memory-x86_64": + cd ./scripts/.. Step #39 - "compile-libfuzzer-memory-x86_64": + export OUT=/workspace/out/libfuzzer-memory-x86_64 Step #39 - "compile-libfuzzer-memory-x86_64": + OUT=/workspace/out/libfuzzer-memory-x86_64 Step #39 - "compile-libfuzzer-memory-x86_64": + mkdir -p /workspace/out/libfuzzer-memory-x86_64 Step #39 - "compile-libfuzzer-memory-x86_64": + export LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #39 - "compile-libfuzzer-memory-x86_64": + LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #39 - "compile-libfuzzer-memory-x86_64": + [[ memory == memory ]] Step #39 - "compile-libfuzzer-memory-x86_64": + CFLAGS+=' -U_FORTIFY_SOURCE' Step #39 - "compile-libfuzzer-memory-x86_64": + CXXFLAGS+=' -U_FORTIFY_SOURCE' Step #39 - "compile-libfuzzer-memory-x86_64": + [[ memory == undefined ]] Step #39 - "compile-libfuzzer-memory-x86_64": + rm -rf elfutils Step #39 - "compile-libfuzzer-memory-x86_64": + git clone https://sourceware.org/git/elfutils.git Step #39 - "compile-libfuzzer-memory-x86_64": Cloning into 'elfutils'... Step #39 - "compile-libfuzzer-memory-x86_64": remote: Enumerating objects: 38615, done. Step #39 - "compile-libfuzzer-memory-x86_64": remote: Counting objects: 0% (1/38615) remote: Counting objects: 1% (387/38615) remote: Counting objects: 2% (773/38615) remote: Counting objects: 3% (1159/38615) remote: Counting objects: 4% (1545/38615) remote: Counting objects: 5% (1931/38615) remote: Counting objects: 6% (2317/38615) remote: Counting objects: 7% (2704/38615) remote: Counting objects: 8% (3090/38615) remote: Counting objects: 9% (3476/38615) remote: Counting objects: 10% (3862/38615) remote: Counting objects: 11% (4248/38615) remote: Counting objects: 12% (4634/38615) remote: Counting objects: 13% (5020/38615) remote: Counting objects: 14% (5407/38615) remote: Counting objects: 15% (5793/38615) remote: Counting objects: 16% (6179/38615) remote: Counting objects: 17% (6565/38615) remote: Counting objects: 18% (6951/38615) remote: Counting objects: 19% (7337/38615) remote: Counting objects: 20% (7723/38615) remote: Counting objects: 21% (8110/38615) remote: Counting objects: 22% (8496/38615) remote: Counting objects: 23% (8882/38615) remote: Counting objects: 24% (9268/38615) remote: Counting objects: 25% (9654/38615) remote: Counting objects: 26% (10040/38615) remote: Counting objects: 27% (10427/38615) remote: Counting objects: 28% (10813/38615) remote: Counting objects: 29% (11199/38615) remote: Counting objects: 30% (11585/38615) remote: Counting objects: 31% (11971/38615) remote: Counting objects: 32% (12357/38615) remote: Counting objects: 33% (12743/38615) remote: Counting objects: 34% (13130/38615) remote: Counting objects: 35% (13516/38615) remote: Counting objects: 36% (13902/38615) remote: Counting objects: 37% (14288/38615) remote: Counting objects: 38% (14674/38615) remote: Counting objects: 39% (15060/38615) remote: Counting objects: 40% (15446/38615) remote: Counting objects: 41% (15833/38615) remote: Counting objects: 42% (16219/38615) remote: Counting objects: 43% (16605/38615) remote: Counting objects: 44% (16991/38615) remote: Counting objects: 45% (17377/38615) remote: Counting objects: 46% (17763/38615) remote: Counting objects: 47% (18150/38615) remote: Counting objects: 48% (18536/38615) remote: Counting objects: 49% (18922/38615) remote: Counting objects: 50% (19308/38615) remote: Counting objects: 51% (19694/38615) remote: Counting objects: 52% (20080/38615) remote: Counting objects: 53% (20466/38615) remote: Counting objects: 54% (20853/38615) remote: Counting objects: 55% (21239/38615) remote: Counting objects: 56% (21625/38615) remote: Counting objects: 57% (22011/38615) remote: Counting objects: 58% (22397/38615) remote: Counting objects: 59% (22783/38615) remote: Counting objects: 60% (23169/38615) remote: Counting objects: 61% (23556/38615) remote: Counting objects: 62% (23942/38615) remote: Counting objects: 63% (24328/38615) remote: Counting objects: 64% (24714/38615) remote: Counting objects: 65% (25100/38615) remote: Counting objects: 66% (25486/38615) remote: Counting objects: 67% (25873/38615) remote: Counting objects: 68% (26259/38615) remote: Counting objects: 69% (26645/38615) remote: Counting objects: 70% (27031/38615) remote: Counting objects: 71% (27417/38615) remote: Counting objects: 72% (27803/38615) remote: Counting objects: 73% (28189/38615) remote: Counting objects: 74% (28576/38615) remote: Counting objects: 75% (28962/38615) remote: Counting objects: 76% (29348/38615) remote: Counting objects: 77% (29734/38615) remote: Counting objects: 78% (30120/38615) remote: Counting objects: 79% (30506/38615) remote: Counting objects: 80% (30892/38615) remote: Counting objects: 81% (31279/38615) remote: Counting objects: 82% (31665/38615) remote: Counting objects: 83% (32051/38615) remote: Counting objects: 84% (32437/38615) remote: Counting objects: 85% (32823/38615) remote: Counting objects: 86% (33209/38615) remote: Counting objects: 87% (33596/38615) remote: Counting objects: 88% (33982/38615) remote: Counting objects: 89% (34368/38615) remote: Counting objects: 90% (34754/38615) remote: Counting objects: 91% (35140/38615) remote: Counting objects: 92% (35526/38615) remote: Counting objects: 93% (35912/38615) remote: Counting objects: 94% (36299/38615) remote: Counting objects: 95% (36685/38615) remote: Counting objects: 96% (37071/38615) remote: Counting objects: 97% (37457/38615) remote: Counting objects: 98% (37843/38615) remote: Counting objects: 99% (38229/38615) remote: Counting objects: 100% (38615/38615) remote: Counting objects: 100% (38615/38615), done. Step #39 - "compile-libfuzzer-memory-x86_64": remote: Compressing objects: 0% (1/7338) remote: Compressing objects: 1% (74/7338) remote: Compressing objects: 2% (147/7338) remote: Compressing objects: 3% (221/7338) remote: Compressing objects: 4% (294/7338) remote: Compressing objects: 5% (367/7338) remote: Compressing objects: 6% (441/7338) remote: Compressing objects: 7% (514/7338) remote: Compressing objects: 8% (588/7338) remote: Compressing objects: 9% (661/7338) remote: Compressing objects: 10% (734/7338) remote: Compressing objects: 11% (808/7338) remote: Compressing objects: 12% (881/7338) remote: Compressing objects: 13% (954/7338) remote: Compressing objects: 14% (1028/7338) remote: Compressing objects: 15% (1101/7338) remote: Compressing objects: 16% (1175/7338) remote: Compressing objects: 17% (1248/7338) remote: Compressing objects: 18% (1321/7338) remote: Compressing objects: 19% (1395/7338) remote: Compressing objects: 20% (1468/7338) remote: Compressing objects: 21% (1541/7338) remote: Compressing objects: 22% (1615/7338) remote: Compressing objects: 23% (1688/7338) remote: Compressing objects: 24% (1762/7338) remote: Compressing objects: 25% (1835/7338) remote: Compressing objects: 26% (1908/7338) remote: Compressing objects: 27% (1982/7338) remote: Compressing objects: 28% (2055/7338) remote: Compressing objects: 29% (2129/7338) remote: Compressing objects: 30% (2202/7338) remote: Compressing objects: 31% (2275/7338) remote: Compressing objects: 32% (2349/7338) remote: Compressing objects: 33% (2422/7338) remote: Compressing objects: 34% (2495/7338) remote: Compressing objects: 35% (2569/7338) remote: Compressing objects: 36% (2642/7338) remote: Compressing objects: 37% (2716/7338) remote: Compressing objects: 38% (2789/7338) remote: Compressing objects: 39% (2862/7338) remote: Compressing objects: 40% (2936/7338) remote: Compressing objects: 41% (3009/7338) remote: Compressing objects: 42% (3082/7338) remote: Compressing objects: 43% (3156/7338) remote: Compressing objects: 44% (3229/7338) remote: Compressing objects: 45% (3303/7338) remote: Compressing objects: 46% (3376/7338) remote: Compressing objects: 47% (3449/7338) remote: Compressing objects: 48% (3523/7338) remote: Compressing objects: 49% (3596/7338) remote: Compressing objects: 50% (3669/7338) remote: Compressing objects: 51% (3743/7338) remote: Compressing objects: 52% (3816/7338) remote: Compressing objects: 53% (3890/7338) remote: Compressing objects: 54% (3963/7338) remote: Compressing objects: 55% (4036/7338) remote: Compressing objects: 56% (4110/7338) remote: Compressing objects: 57% (4183/7338) remote: Compressing objects: 58% (4257/7338) remote: Compressing objects: 59% (4330/7338) remote: Compressing objects: 60% (4403/7338) remote: Compressing objects: 61% (4477/7338) remote: Compressing objects: 62% (4550/7338) remote: Compressing objects: 63% (4623/7338) remote: Compressing objects: 64% (4697/7338) remote: Compressing objects: 65% (4770/7338) remote: Compressing objects: 66% (4844/7338) remote: Compressing objects: 67% (4917/7338) remote: Compressing objects: 68% (4990/7338) remote: Compressing objects: 69% (5064/7338) remote: Compressing objects: 70% (5137/7338) remote: Compressing objects: 71% (5210/7338) remote: Compressing objects: 72% (5284/7338) remote: Compressing objects: 73% (5357/7338) remote: Compressing objects: 74% (5431/7338) remote: Compressing objects: 75% (5504/7338) remote: Compressing objects: 76% (5577/7338) remote: Compressing objects: 77% (5651/7338) remote: Compressing objects: 78% (5724/7338) remote: Compressing objects: 79% (5798/7338) remote: Compressing objects: 80% (5871/7338) remote: Compressing objects: 81% (5944/7338) remote: Compressing objects: 82% (6018/7338) remote: Compressing objects: 83% (6091/7338) remote: Compressing objects: 84% (6164/7338) remote: Compressing objects: 85% (6238/7338) remote: Compressing objects: 86% (6311/7338) remote: Compressing objects: 87% (6385/7338) remote: Compressing objects: 88% (6458/7338) remote: Compressing objects: 89% (6531/7338) remote: Compressing objects: 90% (6605/7338) remote: Compressing objects: 91% (6678/7338) remote: Compressing objects: 92% (6751/7338) remote: Compressing objects: 93% (6825/7338) remote: Compressing objects: 94% (6898/7338) remote: Compressing objects: 95% (6972/7338) remote: Compressing objects: 96% (7045/7338) remote: Compressing objects: 97% (7118/7338) remote: Compressing objects: 98% (7192/7338) remote: Compressing objects: 99% (7265/7338) remote: Compressing objects: 100% (7338/7338) remote: Compressing objects: 100% (7338/7338), done. Step #39 - "compile-libfuzzer-memory-x86_64": Receiving objects: 0% (1/38615) Receiving objects: 1% (387/38615) Receiving objects: 2% (773/38615) Receiving objects: 3% (1159/38615) Receiving objects: 4% (1545/38615) Receiving objects: 5% (1931/38615) Receiving objects: 6% (2317/38615) Receiving objects: 7% (2704/38615) Receiving objects: 8% (3090/38615) Receiving objects: 9% (3476/38615) Receiving objects: 10% (3862/38615) Receiving objects: 11% (4248/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 12% (4634/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 13% (5020/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 14% (5407/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 15% (5793/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 16% (6179/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 17% (6565/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 18% (6951/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 19% (7337/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 20% (7723/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 21% (8110/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 22% (8496/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 23% (8882/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 24% (9268/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 25% (9654/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 26% (10040/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 27% (10427/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 28% (10813/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 29% (11199/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 30% (11585/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 31% (11971/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 32% (12357/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 33% (12743/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 33% (12790/38615), 1.12 MiB | 2.22 MiB/s Receiving objects: 34% (13130/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 35% (13516/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 36% (13902/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 37% (14288/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 38% (14674/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 39% (15060/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 40% (15446/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 41% (15833/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 42% (16219/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 43% (16605/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 44% (16991/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 45% (17377/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 46% (17763/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 47% (18150/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 48% (18536/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 49% (18922/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 50% (19308/38615), 3.14 MiB | 3.12 MiB/s Receiving objects: 51% (19694/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 52% (20080/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 53% (20466/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 54% (20853/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 55% (21239/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 56% (21625/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 57% (22011/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 58% (22397/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 59% (22783/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 59% (22809/38615), 6.89 MiB | 4.58 MiB/s Receiving objects: 60% (23169/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 61% (23556/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 62% (23942/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 63% (24328/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 64% (24714/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 65% (25100/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 66% (25486/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 67% (25873/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 68% (26259/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 69% (26645/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 70% (27031/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 71% (27417/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 72% (27803/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 73% (28189/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 74% (28576/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 75% (28962/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 76% (29348/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 77% (29734/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 78% (30120/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 79% (30506/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 80% (30892/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 81% (31279/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 82% (31665/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 83% (32051/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 84% (32437/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 85% (32823/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 86% (33209/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 87% (33596/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 88% (33982/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 89% (34368/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 90% (34754/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 91% (35140/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 92% (35526/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 93% (35912/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 94% (36299/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 95% (36685/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 96% (37071/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 97% (37457/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 98% (37843/38615), 13.25 MiB | 6.55 MiB/s remote: Total 38615 (delta 32218), reused 37478 (delta 31234), pack-reused 0 Step #39 - "compile-libfuzzer-memory-x86_64": Receiving objects: 99% (38229/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 100% (38615/38615), 13.25 MiB | 6.55 MiB/s Receiving objects: 100% (38615/38615), 21.52 MiB | 8.82 MiB/s, done. Step #39 - "compile-libfuzzer-memory-x86_64": Resolving deltas: 0% (0/32218) Resolving deltas: 1% (447/32218) Resolving deltas: 3% (977/32218) Resolving deltas: 4% (1360/32218) Resolving deltas: 5% (1622/32218) Resolving deltas: 6% (2038/32218) Resolving deltas: 7% (2290/32218) Resolving deltas: 8% (2605/32218) Resolving deltas: 9% (2916/32218) Resolving deltas: 10% (3320/32218) Resolving deltas: 11% (3615/32218) Resolving deltas: 12% (3918/32218) Resolving deltas: 13% (4232/32218) Resolving deltas: 14% (4602/32218) Resolving deltas: 15% (4833/32218) Resolving deltas: 17% (5538/32218) Resolving deltas: 18% (5825/32218) Resolving deltas: 19% (6159/32218) Resolving deltas: 20% (6487/32218) Resolving deltas: 22% (7209/32218) Resolving deltas: 26% (8417/32218) Resolving deltas: 27% (8716/32218) Resolving deltas: 28% (9278/32218) Resolving deltas: 30% (9881/32218) Resolving deltas: 32% (10312/32218) Resolving deltas: 33% (10641/32218) Resolving deltas: 34% (11084/32218) Resolving deltas: 35% (11414/32218) Resolving deltas: 36% (11694/32218) Resolving deltas: 37% (11968/32218) Resolving deltas: 39% (12660/32218) Resolving deltas: 40% (12893/32218) Resolving deltas: 41% (13222/32218) Resolving deltas: 42% (13539/32218) Resolving deltas: 43% (13870/32218) Resolving deltas: 44% (14179/32218) Resolving deltas: 46% (14828/32218) Resolving deltas: 47% (15195/32218) Resolving deltas: 48% (15631/32218) Resolving deltas: 49% (15791/32218) Resolving deltas: 50% (16174/32218) Resolving deltas: 51% (16454/32218) Resolving deltas: 52% (16755/32218) Resolving deltas: 53% (17109/32218) Resolving deltas: 54% (17412/32218) Resolving deltas: 55% (17767/32218) Resolving deltas: 56% (18223/32218) Resolving deltas: 57% (18491/32218) Resolving deltas: 58% (18722/32218) Resolving deltas: 59% (19033/32218) Resolving deltas: 60% (19334/32218) Resolving deltas: 61% (19667/32218) Resolving deltas: 62% (20063/32218) Resolving deltas: 63% (20316/32218) Resolving deltas: 64% (20661/32218) Resolving deltas: 65% (20947/32218) Resolving deltas: 66% (21266/32218) Resolving deltas: 67% (21650/32218) Resolving deltas: 68% (21914/32218) Resolving deltas: 69% (22422/32218) Resolving deltas: 70% (22564/32218) Resolving deltas: 71% (23032/32218) Resolving deltas: 72% (23230/32218) Resolving deltas: 73% (23536/32218) Resolving deltas: 74% (23879/32218) Resolving deltas: 75% (24441/32218) Resolving deltas: 76% (24496/32218) Resolving deltas: 77% (24940/32218) Resolving deltas: 78% (25297/32218) Resolving deltas: 79% (25490/32218) Resolving deltas: 80% (25868/32218) Resolving deltas: 81% (26394/32218) Resolving deltas: 82% (26444/32218) Resolving deltas: 83% (26758/32218) Resolving deltas: 84% (27108/32218) Resolving deltas: 85% (27391/32218) Resolving deltas: 86% (27714/32218) Resolving deltas: 87% (28032/32218) Resolving deltas: 88% (28354/32218) Resolving deltas: 89% (28692/32218) Resolving deltas: 90% (29048/32218) Resolving deltas: 91% (29323/32218) Resolving deltas: 92% (29749/32218) Resolving deltas: 93% (30193/32218) Resolving deltas: 94% (30369/32218) Resolving deltas: 94% (30607/32218) Resolving deltas: 95% (30610/32218) Resolving deltas: 96% (30958/32218) Resolving deltas: 97% (31255/32218) Resolving deltas: 98% (31578/32218) Resolving deltas: 99% (32022/32218) Resolving deltas: 100% (32218/32218) Resolving deltas: 100% (32218/32218), done. Step #39 - "compile-libfuzzer-memory-x86_64": + cd elfutils Step #39 - "compile-libfuzzer-memory-x86_64": + git checkout 67a187d4c1790058fc7fd218317851cb68bb087c Step #39 - "compile-libfuzzer-memory-x86_64": Note: switching to '67a187d4c1790058fc7fd218317851cb68bb087c'. Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #39 - "compile-libfuzzer-memory-x86_64": changes and commit them, and you can discard any commits you make in this Step #39 - "compile-libfuzzer-memory-x86_64": state without impacting any branches by switching back to a branch. Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": If you want to create a new branch to retain commits you create, you may Step #39 - "compile-libfuzzer-memory-x86_64": do so (now or later) by using -c with the switch command. Example: Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": git switch -c Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": Or undo this operation with: Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": git switch - Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": HEAD is now at 67a187d4 Prepare for 0.189 Step #39 - "compile-libfuzzer-memory-x86_64": + git log --oneline -1 Step #39 - "compile-libfuzzer-memory-x86_64": [?1h= 67a187d4 (HEAD, tag: elfutils-0.189) Prepare for 0.189 Step #39 - "compile-libfuzzer-memory-x86_64": [?1l>+ sed -i 's/^\(NO_UNDEFINED=\).*/\1/' configure.ac Step #39 - "compile-libfuzzer-memory-x86_64": + sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac Step #39 - "compile-libfuzzer-memory-x86_64": + [[ memory == undefined ]] Step #39 - "compile-libfuzzer-memory-x86_64": + autoreconf -i -f Step #39 - "compile-libfuzzer-memory-x86_64": autopoint: using AM_GNU_GETTEXT_REQUIRE_VERSION instead of AM_GNU_GETTEXT_VERSION Step #39 - "compile-libfuzzer-memory-x86_64": Copying file ABOUT-NLS Step #39 - "compile-libfuzzer-memory-x86_64": Copying file config/config.rpath Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/codeset.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/extern-inline.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/fcntl-o.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/gettext.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/glibc2.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/glibc21.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/iconv.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/intdiv0.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/intl.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/intldir.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/intlmacosx.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/intmax.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/inttypes-pri.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/inttypes_h.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/lcmessage.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/lib-ld.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/lib-link.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/lib-prefix.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/lock.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/longlong.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/nls.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/po.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/printf-posix.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/progtest.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/size_max.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/stdint_h.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/threadlib.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/uintmax_t.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/visibility.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/wchar_t.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/wint_t.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file m4/xsize.m4 Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/Makefile.in.in Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/Makevars.template Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/Rules-quot Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/boldquot.sed Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/en@boldquot.header Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/en@quot.header Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/insert-header.sin Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/quot.sed Step #39 - "compile-libfuzzer-memory-x86_64": Copying file po/remove-potcdate.sin Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac:97: installing 'config/ar-lib' Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac:91: installing 'config/compile' Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac:67: installing 'config/config.guess' Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac:67: installing 'config/config.sub' Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac:52: installing 'config/install-sh' Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac:52: installing 'config/missing' Step #39 - "compile-libfuzzer-memory-x86_64": Makefile.am: installing './INSTALL' Step #39 - "compile-libfuzzer-memory-x86_64": backends/Makefile.am: installing 'config/depcomp' Step #39 - "compile-libfuzzer-memory-x86_64": configure.ac: installing 'config/ylwrap' Step #39 - "compile-libfuzzer-memory-x86_64": parallel-tests: installing 'config/test-driver' Step #39 - "compile-libfuzzer-memory-x86_64": + ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod --disable-demangler --without-bzlib --without-lzma --without-zstd CC=clang 'CFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE' CXX=clang++ 'CXXFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ -U_FORTIFY_SOURCE' 'LDFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE' Step #39 - "compile-libfuzzer-memory-x86_64": configure: No --program-prefix given, using "eu-" Step #39 - "compile-libfuzzer-memory-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #39 - "compile-libfuzzer-memory-x86_64": checking whether build environment is sane... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #39 - "compile-libfuzzer-memory-x86_64": checking for gawk... gawk Step #39 - "compile-libfuzzer-memory-x86_64": checking whether make sets $(MAKE)... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether make supports nested variables... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether make supports nested variables... (cached) yes Step #39 - "compile-libfuzzer-memory-x86_64": checking build system type... x86_64-pc-linux-gnu Step #39 - "compile-libfuzzer-memory-x86_64": checking host system type... x86_64-pc-linux-gnu Step #39 - "compile-libfuzzer-memory-x86_64": checking whether make supports the include directive... yes (GNU style) Step #39 - "compile-libfuzzer-memory-x86_64": checking for gcc... clang Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the C compiler works... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for C compiler default output file name... a.out Step #39 - "compile-libfuzzer-memory-x86_64": checking for suffix of executables... Step #39 - "compile-libfuzzer-memory-x86_64": checking whether we are cross compiling... no Step #39 - "compile-libfuzzer-memory-x86_64": checking for suffix of object files... o Step #39 - "compile-libfuzzer-memory-x86_64": checking whether we are using the GNU C compiler... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether clang accepts -g... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for clang option to accept ISO C89... none needed Step #39 - "compile-libfuzzer-memory-x86_64": checking whether clang understands -c and -o together... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking dependency style of clang... gcc3 Step #39 - "compile-libfuzzer-memory-x86_64": checking for clang option to accept ISO C99... none needed Step #39 - "compile-libfuzzer-memory-x86_64": checking whether we are using the GNU C++ compiler... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether clang++ accepts -g... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking dependency style of clang++... gcc3 Step #39 - "compile-libfuzzer-memory-x86_64": checking for ranlib... ranlib Step #39 - "compile-libfuzzer-memory-x86_64": checking for bison... bison -y Step #39 - "compile-libfuzzer-memory-x86_64": checking for flex... flex Step #39 - "compile-libfuzzer-memory-x86_64": checking lex output file root... lex.yy Step #39 - "compile-libfuzzer-memory-x86_64": checking lex library... none needed Step #39 - "compile-libfuzzer-memory-x86_64": checking whether yytext is a pointer... no Step #39 - "compile-libfuzzer-memory-x86_64": checking for ar... ar Step #39 - "compile-libfuzzer-memory-x86_64": checking the archiver (ar) interface... ar Step #39 - "compile-libfuzzer-memory-x86_64": checking for readelf... readelf Step #39 - "compile-libfuzzer-memory-x86_64": checking for nm... nm Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc supports __attribute__((visibility()))... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc supports __attribute__((gcc_struct))... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc supports -fPIC... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc supports -fPIE... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc supports ... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the compiler generates build-ids... no Step #39 - "compile-libfuzzer-memory-x86_64": configure: WARNING: compiler doesn't generate build-id by default Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc supports -Wl,-z,relro... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for __thread support... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc provides stdatomic.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for special C compiler options needed for large files... no Step #39 - "compile-libfuzzer-memory-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether fts.h is bad when included (with LFS)... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether to add -D_FORTIFY_SOURCE=2 or =3 to CFLAGS... yes -D_FORTIFY_SOURCE=3 Step #39 - "compile-libfuzzer-memory-x86_64": checking for library containing gzdirect... -lz Step #39 - "compile-libfuzzer-memory-x86_64": checking whether memrchr is declared... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether rawmemchr is declared... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether powerof2 is declared... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether mempcpy is declared... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether reallocarray is declared... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for process_vm_readv... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for mremap... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking how to run the C preprocessor... clang -E Step #39 - "compile-libfuzzer-memory-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #39 - "compile-libfuzzer-memory-x86_64": checking for egrep... /usr/bin/grep -E Step #39 - "compile-libfuzzer-memory-x86_64": checking for ANSI C header files... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for sys/types.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for sys/stat.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for stdlib.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for string.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for memory.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for strings.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for inttypes.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for stdint.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for unistd.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking error.h usability... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking error.h presence... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for error.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking err.h usability... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking err.h presence... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for err.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking sched.h usability... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking sched.h presence... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for sched.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for sched_getaffinity... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking sys/resource.h usability... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking sys/resource.h presence... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for sys/resource.h... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for getrlimit... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether strerror_r is declared... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for strerror_r... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether strerror_r returns char *... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether symbol versioning is supported... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc accepts -Wstack-usage... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc has a sane -Wlogical-op... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc accepts -Wduplicated-cond... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc accepts -Wnull-dereference... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether gcc accepts -Wimplicit-fallthrough... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the compiler accepts -Wimplicit-fallthrough=5... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the compiler accepts -Wtrampolines... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the compiler accepts -Wno-packed-not-aligned... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the compiler accepts -Wuse-after-free=3... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether the compiler accepts -fno-addrsig... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for library containing argp_parse... none required Step #39 - "compile-libfuzzer-memory-x86_64": checking for library containing fts_close... none required Step #39 - "compile-libfuzzer-memory-x86_64": checking for library containing _obstack_free... none required Step #39 - "compile-libfuzzer-memory-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #39 - "compile-libfuzzer-memory-x86_64": checking whether NLS is requested... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for msgfmt... /usr/bin/msgfmt Step #39 - "compile-libfuzzer-memory-x86_64": checking for gmsgfmt... /usr/bin/msgfmt Step #39 - "compile-libfuzzer-memory-x86_64": checking for xgettext... /usr/bin/xgettext Step #39 - "compile-libfuzzer-memory-x86_64": checking for msgmerge... /usr/bin/msgmerge Step #39 - "compile-libfuzzer-memory-x86_64": checking for ld used by clang... /usr/bin/ld Step #39 - "compile-libfuzzer-memory-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for shared library run path origin... done Step #39 - "compile-libfuzzer-memory-x86_64": checking for CFPreferencesCopyAppValue... no Step #39 - "compile-libfuzzer-memory-x86_64": checking for CFLocaleCopyCurrent... no Step #39 - "compile-libfuzzer-memory-x86_64": checking for GNU gettext in libc... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether to use NLS... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking where the gettext function comes from... libc Step #39 - "compile-libfuzzer-memory-x86_64": checking size of long... 8 Step #39 - "compile-libfuzzer-memory-x86_64": checking for struct user_regs_struct... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking clang option for 32-bit word size... -m32 Step #39 - "compile-libfuzzer-memory-x86_64": checking for 64-bit host... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking whether clang -m32 makes executables we can run... no Step #39 - "compile-libfuzzer-memory-x86_64": configure: WARNING: not running biarch tests, clang -m32 does not work Step #39 - "compile-libfuzzer-memory-x86_64": checking for flex... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for bison... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for gawk... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for bunzip2... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for zstd... no Step #39 - "compile-libfuzzer-memory-x86_64": checking whether clang++ supports C++11 features with -std=c++11... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking for pthread_setname_np in -lpthread... yes Step #39 - "compile-libfuzzer-memory-x86_64": checking that generated files are newer than configure... done Step #39 - "compile-libfuzzer-memory-x86_64": configure: creating ./config.status Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating elfutils.spec Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating debuginfod/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating debuginfod/debuginfod.h Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating doc/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating lib/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libelf/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libebl/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libdwelf/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libdw/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libdwfl/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libcpu/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating libasm/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating backends/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating src/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating po/Makefile.in Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating tests/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config/libelf.pc Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config/libdw.pc Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config/libdebuginfod.pc Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating version.h Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config/profile.sh Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config/profile.csh Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating config.h Step #39 - "compile-libfuzzer-memory-x86_64": config.status: executing depfiles commands Step #39 - "compile-libfuzzer-memory-x86_64": config.status: executing po-directories commands Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating po/POTFILES Step #39 - "compile-libfuzzer-memory-x86_64": config.status: creating po/Makefile Step #39 - "compile-libfuzzer-memory-x86_64": configure: Step #39 - "compile-libfuzzer-memory-x86_64": ===================================================================== Step #39 - "compile-libfuzzer-memory-x86_64": elfutils: 0.189 (eu_version: 189) Step #39 - "compile-libfuzzer-memory-x86_64": ===================================================================== Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": Prefix : /usr/local Step #39 - "compile-libfuzzer-memory-x86_64": Program prefix ("eu-" recommended) : eu- Step #39 - "compile-libfuzzer-memory-x86_64": Source code location : . Step #39 - "compile-libfuzzer-memory-x86_64": Maintainer mode : yes Step #39 - "compile-libfuzzer-memory-x86_64": build arch : x86_64-pc-linux-gnu Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": CFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig Step #39 - "compile-libfuzzer-memory-x86_64": CXXFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ -U_FORTIFY_SOURCE Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": RECOMMENDED FEATURES (should all be yes) Step #39 - "compile-libfuzzer-memory-x86_64": gzip support : yes Step #39 - "compile-libfuzzer-memory-x86_64": bzip2 support : no Step #39 - "compile-libfuzzer-memory-x86_64": lzma/xz support : no Step #39 - "compile-libfuzzer-memory-x86_64": zstd support : no Step #39 - "compile-libfuzzer-memory-x86_64": zstd compression support : no Step #39 - "compile-libfuzzer-memory-x86_64": libstdc++ demangle support : no Step #39 - "compile-libfuzzer-memory-x86_64": File textrel check : yes Step #39 - "compile-libfuzzer-memory-x86_64": Symbol versioning : yes Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": NOT RECOMMENDED FEATURES (should all be no) Step #39 - "compile-libfuzzer-memory-x86_64": Experimental thread safety : no Step #39 - "compile-libfuzzer-memory-x86_64": install elf.h : no Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": OTHER FEATURES Step #39 - "compile-libfuzzer-memory-x86_64": Deterministic archives by default : false Step #39 - "compile-libfuzzer-memory-x86_64": Native language support : yes Step #39 - "compile-libfuzzer-memory-x86_64": Extra Valgrind annotations : no Step #39 - "compile-libfuzzer-memory-x86_64": libdebuginfod client support : no Step #39 - "compile-libfuzzer-memory-x86_64": Debuginfod server support : no Step #39 - "compile-libfuzzer-memory-x86_64": Default DEBUGINFOD_URLS : Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": EXTRA TEST FEATURES (used with make check) Step #39 - "compile-libfuzzer-memory-x86_64": have bunzip2 installed (required) : yes Step #39 - "compile-libfuzzer-memory-x86_64": have zstd installed : no Step #39 - "compile-libfuzzer-memory-x86_64": C++11 : yes Step #39 - "compile-libfuzzer-memory-x86_64": debug branch prediction : no Step #39 - "compile-libfuzzer-memory-x86_64": gprof support : no Step #39 - "compile-libfuzzer-memory-x86_64": gcov support : no Step #39 - "compile-libfuzzer-memory-x86_64": run all tests under valgrind : no Step #39 - "compile-libfuzzer-memory-x86_64": gcc undefined behaviour sanitizer : no Step #39 - "compile-libfuzzer-memory-x86_64": gcc address sanitizer : no Step #39 - "compile-libfuzzer-memory-x86_64": clang memory sanitizer : no Step #39 - "compile-libfuzzer-memory-x86_64": use rpath in tests : no Step #39 - "compile-libfuzzer-memory-x86_64": test biarch : no Step #39 - "compile-libfuzzer-memory-x86_64": Step #39 - "compile-libfuzzer-memory-x86_64": ++ nproc Step #39 - "compile-libfuzzer-memory-x86_64": + make -C config -j32 V=1 Step #39 - "compile-libfuzzer-memory-x86_64": make: Entering directory '/src/libbpf/elfutils/config' Step #39 - "compile-libfuzzer-memory-x86_64": make: Nothing to be done for 'all'. Step #39 - "compile-libfuzzer-memory-x86_64": make: Leaving directory '/src/libbpf/elfutils/config' Step #39 - "compile-libfuzzer-memory-x86_64": ++ nproc Step #39 - "compile-libfuzzer-memory-x86_64": + make -C lib -j32 V=1 Step #39 - "compile-libfuzzer-memory-x86_64": make: Entering directory '/src/libbpf/elfutils/lib' Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT xasprintf.o -MD -MP -MF .deps/xasprintf.Tpo -c -o xasprintf.o xasprintf.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT xstrdup.o -MD -MP -MF .deps/xstrdup.Tpo -c -o xstrdup.o xstrdup.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT xstrndup.o -MD -MP -MF .deps/xstrndup.Tpo -c -o xstrndup.o xstrndup.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT xmalloc.o -MD -MP -MF .deps/xmalloc.Tpo -c -o xmalloc.o xmalloc.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT next_prime.o -MD -MP -MF .deps/next_prime.Tpo -c -o next_prime.o next_prime.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT crc32.o -MD -MP -MF .deps/crc32.Tpo -c -o crc32.o crc32.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT crc32_file.o -MD -MP -MF .deps/crc32_file.Tpo -c -o crc32_file.o crc32_file.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT color.o -MD -MP -MF .deps/color.Tpo -c -o color.o color.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT error.o -MD -MP -MF .deps/error.Tpo -c -o error.o error.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT printversion.o -MD -MP -MF .deps/printversion.Tpo -c -o printversion.o printversion.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/error.Tpo .deps/error.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/next_prime.Tpo .deps/next_prime.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/xstrdup.Tpo .deps/xstrdup.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/printversion.Tpo .deps/printversion.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/xstrndup.Tpo .deps/xstrndup.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/crc32.Tpo .deps/crc32.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/xasprintf.Tpo .deps/xasprintf.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/xmalloc.Tpo .deps/xmalloc.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/crc32_file.Tpo .deps/crc32_file.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/color.Tpo .deps/color.Po Step #39 - "compile-libfuzzer-memory-x86_64": rm -f libeu.a Step #39 - "compile-libfuzzer-memory-x86_64": ar cr libeu.a xasprintf.o xstrdup.o xstrndup.o xmalloc.o next_prime.o crc32.o crc32_file.o color.o error.o printversion.o Step #39 - "compile-libfuzzer-memory-x86_64": ranlib libeu.a Step #39 - "compile-libfuzzer-memory-x86_64": make: Leaving directory '/src/libbpf/elfutils/lib' Step #39 - "compile-libfuzzer-memory-x86_64": ++ nproc Step #39 - "compile-libfuzzer-memory-x86_64": + make -C libelf -j32 V=1 Step #39 - "compile-libfuzzer-memory-x86_64": make: Entering directory '/src/libbpf/elfutils/libelf' Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_version.o -MD -MP -MF .deps/elf_version.Tpo -c -o elf_version.o elf_version.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_hash.o -MD -MP -MF .deps/elf_hash.Tpo -c -o elf_hash.o elf_hash.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_error.o -MD -MP -MF .deps/elf_error.Tpo -c -o elf_error.o elf_error.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_fill.o -MD -MP -MF .deps/elf_fill.Tpo -c -o elf_fill.o elf_fill.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_begin.o -MD -MP -MF .deps/elf_begin.Tpo -c -o elf_begin.o elf_begin.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_next.o -MD -MP -MF .deps/elf_next.Tpo -c -o elf_next.o elf_next.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_rand.o -MD -MP -MF .deps/elf_rand.Tpo -c -o elf_rand.o elf_rand.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_end.o -MD -MP -MF .deps/elf_end.Tpo -c -o elf_end.o elf_end.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_kind.o -MD -MP -MF .deps/elf_kind.Tpo -c -o elf_kind.o elf_kind.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getclass.o -MD -MP -MF .deps/gelf_getclass.Tpo -c -o gelf_getclass.o gelf_getclass.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getbase.o -MD -MP -MF .deps/elf_getbase.Tpo -c -o elf_getbase.o elf_getbase.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getident.o -MD -MP -MF .deps/elf_getident.Tpo -c -o elf_getident.o elf_getident.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_fsize.o -MD -MP -MF .deps/elf32_fsize.Tpo -c -o elf32_fsize.o elf32_fsize.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_fsize.o -MD -MP -MF .deps/elf64_fsize.Tpo -c -o elf64_fsize.o elf64_fsize.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_fsize.o -MD -MP -MF .deps/gelf_fsize.Tpo -c -o gelf_fsize.o gelf_fsize.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_xlatetof.o -MD -MP -MF .deps/elf32_xlatetof.Tpo -c -o elf32_xlatetof.o elf32_xlatetof.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_xlatetom.o -MD -MP -MF .deps/elf32_xlatetom.Tpo -c -o elf32_xlatetom.o elf32_xlatetom.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_xlatetof.o -MD -MP -MF .deps/elf64_xlatetof.Tpo -c -o elf64_xlatetof.o elf64_xlatetof.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_xlatetom.o -MD -MP -MF .deps/elf64_xlatetom.Tpo -c -o elf64_xlatetom.o elf64_xlatetom.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_xlate.o -MD -MP -MF .deps/gelf_xlate.Tpo -c -o gelf_xlate.o gelf_xlate.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_getehdr.o -MD -MP -MF .deps/elf32_getehdr.Tpo -c -o elf32_getehdr.o elf32_getehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_getehdr.o -MD -MP -MF .deps/elf64_getehdr.Tpo -c -o elf64_getehdr.o elf64_getehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getehdr.o -MD -MP -MF .deps/gelf_getehdr.Tpo -c -o gelf_getehdr.o gelf_getehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_newehdr.o -MD -MP -MF .deps/elf32_newehdr.Tpo -c -o elf32_newehdr.o elf32_newehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_newehdr.o -MD -MP -MF .deps/elf64_newehdr.Tpo -c -o elf64_newehdr.o elf64_newehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_newehdr.o -MD -MP -MF .deps/gelf_newehdr.Tpo -c -o gelf_newehdr.o gelf_newehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_ehdr.o -MD -MP -MF .deps/gelf_update_ehdr.Tpo -c -o gelf_update_ehdr.o gelf_update_ehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_getphdr.o -MD -MP -MF .deps/elf32_getphdr.Tpo -c -o elf32_getphdr.o elf32_getphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_getphdr.o -MD -MP -MF .deps/elf64_getphdr.Tpo -c -o elf64_getphdr.o elf64_getphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getphdr.o -MD -MP -MF .deps/gelf_getphdr.Tpo -c -o gelf_getphdr.o gelf_getphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_newphdr.o -MD -MP -MF .deps/elf32_newphdr.Tpo -c -o elf32_newphdr.o elf32_newphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_newphdr.o -MD -MP -MF .deps/elf64_newphdr.Tpo -c -o elf64_newphdr.o elf64_newphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_fill.Tpo .deps/elf_fill.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_version.Tpo .deps/elf_version.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getbase.Tpo .deps/elf_getbase.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_newphdr.o -MD -MP -MF .deps/gelf_newphdr.Tpo -c -o gelf_newphdr.o gelf_newphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_kind.Tpo .deps/elf_kind.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_phdr.o -MD -MP -MF .deps/gelf_update_phdr.Tpo -c -o gelf_update_phdr.o gelf_update_phdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getarhdr.o -MD -MP -MF .deps/elf_getarhdr.Tpo -c -o elf_getarhdr.o elf_getarhdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getclass.Tpo .deps/gelf_getclass.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getarsym.o -MD -MP -MF .deps/elf_getarsym.Tpo -c -o elf_getarsym.o elf_getarsym.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_fsize.Tpo .deps/elf64_fsize.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getident.Tpo .deps/elf_getident.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_rand.Tpo .deps/elf_rand.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_rawfile.o -MD -MP -MF .deps/elf_rawfile.Tpo -c -o elf_rawfile.o elf_rawfile.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_readall.o -MD -MP -MF .deps/elf_readall.Tpo -c -o elf_readall.o elf_readall.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_cntl.o -MD -MP -MF .deps/elf_cntl.Tpo -c -o elf_cntl.o elf_cntl.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_next.Tpo .deps/elf_next.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_fsize.Tpo .deps/elf32_fsize.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_fsize.Tpo .deps/gelf_fsize.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getscn.o -MD -MP -MF .deps/elf_getscn.Tpo -c -o elf_getscn.o elf_getscn.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_nextscn.o -MD -MP -MF .deps/elf_nextscn.Tpo -c -o elf_nextscn.o elf_nextscn.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_ndxscn.o -MD -MP -MF .deps/elf_ndxscn.Tpo -c -o elf_ndxscn.o elf_ndxscn.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_newehdr.Tpo .deps/gelf_newehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_newscn.o -MD -MP -MF .deps/elf_newscn.Tpo -c -o elf_newscn.o elf_newscn.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_hash.Tpo .deps/elf_hash.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_getshdr.o -MD -MP -MF .deps/elf32_getshdr.Tpo -c -o elf32_getshdr.o elf32_getshdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_error.Tpo .deps/elf_error.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_getshdr.o -MD -MP -MF .deps/elf64_getshdr.Tpo -c -o elf64_getshdr.o elf64_getshdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_newehdr.Tpo .deps/elf64_newehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_newehdr.Tpo .deps/elf32_newehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_xlatetof.Tpo .deps/elf64_xlatetof.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_xlatetom.Tpo .deps/elf32_xlatetom.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_xlatetof.Tpo .deps/elf32_xlatetof.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getshdr.o -MD -MP -MF .deps/gelf_getshdr.Tpo -c -o gelf_getshdr.o gelf_getshdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_shdr.o -MD -MP -MF .deps/gelf_update_shdr.Tpo -c -o gelf_update_shdr.o gelf_update_shdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_strptr.o -MD -MP -MF .deps/elf_strptr.Tpo -c -o elf_strptr.o elf_strptr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_rawdata.o -MD -MP -MF .deps/elf_rawdata.Tpo -c -o elf_rawdata.o elf_rawdata.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_getehdr.Tpo .deps/elf32_getehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getdata.o -MD -MP -MF .deps/elf_getdata.Tpo -c -o elf_getdata.o elf_getdata.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_newdata.o -MD -MP -MF .deps/elf_newdata.Tpo -c -o elf_newdata.o elf_newdata.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_xlatetom.Tpo .deps/elf64_xlatetom.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_getehdr.Tpo .deps/elf64_getehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getdata_rawchunk.o -MD -MP -MF .deps/elf_getdata_rawchunk.Tpo -c -o elf_getdata_rawchunk.o elf_getdata_rawchunk.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_flagelf.o -MD -MP -MF .deps/elf_flagelf.Tpo -c -o elf_flagelf.o elf_flagelf.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_flagehdr.o -MD -MP -MF .deps/elf_flagehdr.Tpo -c -o elf_flagehdr.o elf_flagehdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_ehdr.Tpo .deps/gelf_update_ehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_flagphdr.o -MD -MP -MF .deps/elf_flagphdr.Tpo -c -o elf_flagphdr.o elf_flagphdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getehdr.Tpo .deps/gelf_getehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_flagscn.o -MD -MP -MF .deps/elf_flagscn.Tpo -c -o elf_flagscn.o elf_flagscn.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getphdr.Tpo .deps/gelf_getphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_newphdr.Tpo .deps/gelf_newphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_flagshdr.o -MD -MP -MF .deps/elf_flagshdr.Tpo -c -o elf_flagshdr.o elf_flagshdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_flagdata.o -MD -MP -MF .deps/elf_flagdata.Tpo -c -o elf_flagdata.o elf_flagdata.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_newphdr.Tpo .deps/elf32_newphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_newphdr.Tpo .deps/elf64_newphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getarhdr.Tpo .deps/elf_getarhdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_cntl.Tpo .deps/elf_cntl.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_ndxscn.Tpo .deps/elf_ndxscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_memory.o -MD -MP -MF .deps/elf_memory.Tpo -c -o elf_memory.o elf_memory.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_update.o -MD -MP -MF .deps/elf_update.Tpo -c -o elf_update.o elf_update.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_updatenull.o -MD -MP -MF .deps/elf32_updatenull.Tpo -c -o elf32_updatenull.o elf32_updatenull.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_rawfile.Tpo .deps/elf_rawfile.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_updatenull.o -MD -MP -MF .deps/elf64_updatenull.Tpo -c -o elf64_updatenull.o elf64_updatenull.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_updatefile.o -MD -MP -MF .deps/elf32_updatefile.Tpo -c -o elf32_updatefile.o elf32_updatefile.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_end.Tpo .deps/elf_end.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_nextscn.Tpo .deps/elf_nextscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_updatefile.o -MD -MP -MF .deps/elf64_updatefile.Tpo -c -o elf64_updatefile.o elf64_updatefile.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getsym.o -MD -MP -MF .deps/gelf_getsym.Tpo -c -o gelf_getsym.o gelf_getsym.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_sym.o -MD -MP -MF .deps/gelf_update_sym.Tpo -c -o gelf_update_sym.o gelf_update_sym.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_rawdata.Tpo .deps/elf_rawdata.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getversym.o -MD -MP -MF .deps/gelf_getversym.Tpo -c -o gelf_getversym.o gelf_getversym.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_flagehdr.Tpo .deps/elf_flagehdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getscn.Tpo .deps/elf_getscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_flagelf.Tpo .deps/elf_flagelf.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getverneed.o -MD -MP -MF .deps/gelf_getverneed.Tpo -c -o gelf_getverneed.o gelf_getverneed.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getvernaux.o -MD -MP -MF .deps/gelf_getvernaux.Tpo -c -o gelf_getvernaux.o gelf_getvernaux.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getshdr.Tpo .deps/gelf_getshdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getverdef.o -MD -MP -MF .deps/gelf_getverdef.Tpo -c -o gelf_getverdef.o gelf_getverdef.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getverdaux.o -MD -MP -MF .deps/gelf_getverdaux.Tpo -c -o gelf_getverdaux.o gelf_getverdaux.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_newdata.Tpo .deps/elf_newdata.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_newscn.Tpo .deps/elf_newscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_flagphdr.Tpo .deps/elf_flagphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_getphdr.Tpo .deps/elf32_getphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getrel.o -MD -MP -MF .deps/gelf_getrel.Tpo -c -o gelf_getrel.o gelf_getrel.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getrela.o -MD -MP -MF .deps/gelf_getrela.Tpo -c -o gelf_getrela.o gelf_getrela.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_rel.o -MD -MP -MF .deps/gelf_update_rel.Tpo -c -o gelf_update_rel.o gelf_update_rel.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_rela.o -MD -MP -MF .deps/gelf_update_rela.Tpo -c -o gelf_update_rela.o gelf_update_rela.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_shdr.Tpo .deps/gelf_update_shdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_phdr.Tpo .deps/gelf_update_phdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getdyn.o -MD -MP -MF .deps/gelf_getdyn.Tpo -c -o gelf_getdyn.o gelf_getdyn.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_dyn.o -MD -MP -MF .deps/gelf_update_dyn.Tpo -c -o gelf_update_dyn.o gelf_update_dyn.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_flagscn.Tpo .deps/elf_flagscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_getphdr.Tpo .deps/elf64_getphdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_flagshdr.Tpo .deps/elf_flagshdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_flagdata.Tpo .deps/elf_flagdata.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_readall.Tpo .deps/elf_readall.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getmove.o -MD -MP -MF .deps/gelf_getmove.Tpo -c -o gelf_getmove.o gelf_getmove.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_move.o -MD -MP -MF .deps/gelf_update_move.Tpo -c -o gelf_update_move.o gelf_update_move.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getsyminfo.o -MD -MP -MF .deps/gelf_getsyminfo.Tpo -c -o gelf_getsyminfo.o gelf_getsyminfo.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_syminfo.o -MD -MP -MF .deps/gelf_update_syminfo.Tpo -c -o gelf_update_syminfo.o gelf_update_syminfo.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getauxv.o -MD -MP -MF .deps/gelf_getauxv.Tpo -c -o gelf_getauxv.o gelf_getauxv.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_memory.Tpo .deps/elf_memory.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_auxv.o -MD -MP -MF .deps/gelf_update_auxv.Tpo -c -o gelf_update_auxv.o gelf_update_auxv.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getsym.Tpo .deps/gelf_getsym.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getversym.Tpo .deps/gelf_getversym.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getnote.o -MD -MP -MF .deps/gelf_getnote.Tpo -c -o gelf_getnote.o gelf_getnote.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_xlatetof.o -MD -MP -MF .deps/gelf_xlatetof.Tpo -c -o gelf_xlatetof.o gelf_xlatetof.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_sym.Tpo .deps/gelf_update_sym.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_strptr.Tpo .deps/elf_strptr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getverdef.Tpo .deps/gelf_getverdef.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getvernaux.Tpo .deps/gelf_getvernaux.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getverneed.Tpo .deps/gelf_getverneed.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_xlatetom.o -MD -MP -MF .deps/gelf_xlatetom.Tpo -c -o gelf_xlatetom.o gelf_xlatetom.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT nlist.o -MD -MP -MF .deps/nlist.Tpo -c -o nlist.o nlist.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getsymshndx.o -MD -MP -MF .deps/gelf_getsymshndx.Tpo -c -o gelf_getsymshndx.o gelf_getsymshndx.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_symshndx.o -MD -MP -MF .deps/gelf_update_symshndx.Tpo -c -o gelf_update_symshndx.o gelf_update_symshndx.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_versym.o -MD -MP -MF .deps/gelf_update_versym.Tpo -c -o gelf_update_versym.o gelf_update_versym.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getdata_rawchunk.Tpo .deps/elf_getdata_rawchunk.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_verneed.o -MD -MP -MF .deps/gelf_update_verneed.Tpo -c -o gelf_update_verneed.o gelf_update_verneed.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getverdaux.Tpo .deps/gelf_getverdaux.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getrel.Tpo .deps/gelf_getrel.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getrela.Tpo .deps/gelf_getrela.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_dyn.Tpo .deps/gelf_update_dyn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_rel.Tpo .deps/gelf_update_rel.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_vernaux.o -MD -MP -MF .deps/gelf_update_vernaux.Tpo -c -o gelf_update_vernaux.o gelf_update_vernaux.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getdyn.Tpo .deps/gelf_getdyn.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_verdef.o -MD -MP -MF .deps/gelf_update_verdef.Tpo -c -o gelf_update_verdef.o gelf_update_verdef.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_verdaux.o -MD -MP -MF .deps/gelf_update_verdaux.Tpo -c -o gelf_update_verdaux.o gelf_update_verdaux.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getphdrnum.o -MD -MP -MF .deps/elf_getphdrnum.Tpo -c -o elf_getphdrnum.o elf_getphdrnum.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_rela.Tpo .deps/gelf_update_rela.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getshdrnum.o -MD -MP -MF .deps/elf_getshdrnum.Tpo -c -o elf_getshdrnum.o elf_getshdrnum.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getmove.Tpo .deps/gelf_getmove.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getshdrstrndx.o -MD -MP -MF .deps/elf_getshdrstrndx.Tpo -c -o elf_getshdrstrndx.o elf_getshdrstrndx.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_move.Tpo .deps/gelf_update_move.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_checksum.o -MD -MP -MF .deps/gelf_checksum.Tpo -c -o gelf_checksum.o gelf_checksum.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_checksum.o -MD -MP -MF .deps/elf32_checksum.Tpo -c -o elf32_checksum.o elf32_checksum.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_checksum.o -MD -MP -MF .deps/elf64_checksum.Tpo -c -o elf64_checksum.o elf64_checksum.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_syminfo.Tpo .deps/gelf_update_syminfo.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getsyminfo.Tpo .deps/gelf_getsyminfo.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT libelf_crc32.o -MD -MP -MF .deps/libelf_crc32.Tpo -c -o libelf_crc32.o libelf_crc32.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT libelf_next_prime.o -MD -MP -MF .deps/libelf_next_prime.Tpo -c -o libelf_next_prime.o libelf_next_prime.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_getshdr.Tpo .deps/elf32_getshdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getarsym.Tpo .deps/elf_getarsym.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getauxv.Tpo .deps/gelf_getauxv.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_clone.o -MD -MP -MF .deps/elf_clone.Tpo -c -o elf_clone.o elf_clone.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getlib.o -MD -MP -MF .deps/gelf_getlib.Tpo -c -o gelf_getlib.o gelf_getlib.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_update_lib.o -MD -MP -MF .deps/gelf_update_lib.Tpo -c -o gelf_update_lib.o gelf_update_lib.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_xlatetof.Tpo .deps/gelf_xlatetof.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_auxv.Tpo .deps/gelf_update_auxv.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_getshdr.Tpo .deps/elf64_getshdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_update.Tpo .deps/elf_update.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_xlatetom.Tpo .deps/gelf_xlatetom.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_versym.Tpo .deps/gelf_update_versym.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_offscn.o -MD -MP -MF .deps/elf32_offscn.Tpo -c -o elf32_offscn.o elf32_offscn.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_verneed.Tpo .deps/gelf_update_verneed.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_offscn.o -MD -MP -MF .deps/elf64_offscn.Tpo -c -o elf64_offscn.o elf64_offscn.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_offscn.o -MD -MP -MF .deps/gelf_offscn.Tpo -c -o gelf_offscn.o gelf_offscn.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_getaroff.o -MD -MP -MF .deps/elf_getaroff.Tpo -c -o elf_getaroff.o elf_getaroff.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_gnu_hash.o -MD -MP -MF .deps/elf_gnu_hash.Tpo -c -o elf_gnu_hash.o elf_gnu_hash.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/libelf_next_prime.Tpo .deps/libelf_next_prime.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_scnshndx.o -MD -MP -MF .deps/elf_scnshndx.Tpo -c -o elf_scnshndx.o elf_scnshndx.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf32_getchdr.o -MD -MP -MF .deps/elf32_getchdr.Tpo -c -o elf32_getchdr.o elf32_getchdr.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getnote.Tpo .deps/gelf_getnote.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getsymshndx.Tpo .deps/gelf_getsymshndx.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf64_getchdr.o -MD -MP -MF .deps/elf64_getchdr.Tpo -c -o elf64_getchdr.o elf64_getchdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT gelf_getchdr.o -MD -MP -MF .deps/gelf_getchdr.Tpo -c -o gelf_getchdr.o gelf_getchdr.c Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_compress.o -MD -MP -MF .deps/elf_compress.Tpo -c -o elf_compress.o elf_compress.c Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_checksum.Tpo .deps/gelf_checksum.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_vernaux.Tpo .deps/gelf_update_vernaux.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_verdef.Tpo .deps/gelf_update_verdef.Po Step #39 - "compile-libfuzzer-memory-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -MT elf_compress_gnu.o -MD -MP -MF .deps/elf_compress_gnu.Tpo -c -o elf_compress_gnu.o elf_compress_gnu.c Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_version.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_version.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_version.Tpo" `test -f 'elf_version.c' || echo './'`elf_version.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_version.Tpo" >> ".deps/elf_version.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_version.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_version.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getshdrnum.Tpo .deps/elf_getshdrnum.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_hash.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_hash.Tpo" `test -f 'elf_hash.c' || echo './'`elf_hash.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_hash.Tpo" >> ".deps/elf_hash.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_hash.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_hash.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_verdaux.Tpo .deps/gelf_update_verdaux.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_symshndx.Tpo .deps/gelf_update_symshndx.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/libelf_crc32.Tpo .deps/libelf_crc32.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_error.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_error.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_error.Tpo" `test -f 'elf_error.c' || echo './'`elf_error.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_error.Tpo" >> ".deps/elf_error.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_error.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_error.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_fill.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_fill.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_fill.Tpo" `test -f 'elf_fill.c' || echo './'`elf_fill.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_fill.Tpo" >> ".deps/elf_fill.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_fill.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_fill.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_update_lib.Tpo .deps/gelf_update_lib.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_next.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_next.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_next.Tpo" `test -f 'elf_next.c' || echo './'`elf_next.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_next.Tpo" >> ".deps/elf_next.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_next.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_next.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_rand.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rand.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_rand.Tpo" `test -f 'elf_rand.c' || echo './'`elf_rand.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_rand.Tpo" >> ".deps/elf_rand.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_rand.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_rand.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getlib.Tpo .deps/gelf_getlib.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_end.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_end.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_end.Tpo" `test -f 'elf_end.c' || echo './'`elf_end.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_end.Tpo" >> ".deps/elf_end.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_end.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_end.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_kind.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_kind.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_kind.Tpo" `test -f 'elf_kind.c' || echo './'`elf_kind.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_kind.Tpo" >> ".deps/elf_kind.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_kind.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_kind.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getaroff.Tpo .deps/elf_getaroff.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getdata.Tpo .deps/elf_getdata.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getphdrnum.Tpo .deps/elf_getphdrnum.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_checksum.Tpo .deps/elf32_checksum.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_checksum.Tpo .deps/elf64_checksum.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_clone.Tpo .deps/elf_clone.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_offscn.Tpo .deps/gelf_offscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_gnu_hash.Tpo .deps/elf_gnu_hash.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_scnshndx.Tpo .deps/elf_scnshndx.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getclass.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getclass.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getclass.Tpo" `test -f 'gelf_getclass.c' || echo './'`gelf_getclass.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getclass.Tpo" >> ".deps/gelf_getclass.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getclass.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getclass.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getbase.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getbase.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getbase.Tpo" `test -f 'elf_getbase.c' || echo './'`elf_getbase.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getbase.Tpo" >> ".deps/elf_getbase.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getbase.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getbase.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getident.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getident.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getident.Tpo" `test -f 'elf_getident.c' || echo './'`elf_getident.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getident.Tpo" >> ".deps/elf_getident.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getident.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getident.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_fsize.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_fsize.Tpo" `test -f 'elf32_fsize.c' || echo './'`elf32_fsize.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_fsize.Tpo" >> ".deps/elf32_fsize.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_fsize.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_fsize.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_fsize.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_fsize.Tpo" `test -f 'elf64_fsize.c' || echo './'`elf64_fsize.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_fsize.Tpo" >> ".deps/elf64_fsize.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_fsize.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_fsize.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_fsize.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_fsize.Tpo" `test -f 'gelf_fsize.c' || echo './'`gelf_fsize.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_fsize.Tpo" >> ".deps/gelf_fsize.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_fsize.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_fsize.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetof.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_xlatetof.Tpo" `test -f 'elf32_xlatetof.c' || echo './'`elf32_xlatetof.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_xlatetof.Tpo" >> ".deps/elf32_xlatetof.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_xlatetof.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_xlatetof.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetom.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_xlatetom.Tpo" `test -f 'elf32_xlatetom.c' || echo './'`elf32_xlatetom.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_xlatetom.Tpo" >> ".deps/elf32_xlatetom.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_xlatetom.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_xlatetom.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_getshdrstrndx.Tpo .deps/elf_getshdrstrndx.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetof.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_xlatetof.Tpo" `test -f 'elf64_xlatetof.c' || echo './'`elf64_xlatetof.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_xlatetof.Tpo" >> ".deps/elf64_xlatetof.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_xlatetof.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_xlatetof.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetom.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_xlatetom.Tpo" `test -f 'elf64_xlatetom.c' || echo './'`elf64_xlatetom.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_xlatetom.Tpo" >> ".deps/elf64_xlatetom.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_xlatetom.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_xlatetom.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_getchdr.Tpo .deps/elf32_getchdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_getehdr.Tpo" `test -f 'elf32_getehdr.c' || echo './'`elf32_getehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_getehdr.Tpo" >> ".deps/elf32_getehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_getehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_getehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_getehdr.Tpo" `test -f 'elf64_getehdr.c' || echo './'`elf64_getehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_getehdr.Tpo" >> ".deps/elf64_getehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_getehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_getehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_offscn.Tpo .deps/elf64_offscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_offscn.Tpo .deps/elf32_offscn.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_getchdr.Tpo .deps/gelf_getchdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_getchdr.Tpo .deps/elf64_getchdr.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getehdr.Tpo" `test -f 'gelf_getehdr.c' || echo './'`gelf_getehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getehdr.Tpo" >> ".deps/gelf_getehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_newehdr.Tpo" `test -f 'elf32_newehdr.c' || echo './'`elf32_newehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_newehdr.Tpo" >> ".deps/elf32_newehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_newehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_newehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_newehdr.Tpo" `test -f 'elf64_newehdr.c' || echo './'`elf64_newehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_newehdr.Tpo" >> ".deps/elf64_newehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_newehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_newehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_newehdr.Tpo" `test -f 'gelf_newehdr.c' || echo './'`gelf_newehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_newehdr.Tpo" >> ".deps/gelf_newehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_newehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_newehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_ehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_ehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_ehdr.Tpo" `test -f 'gelf_update_ehdr.c' || echo './'`gelf_update_ehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_ehdr.Tpo" >> ".deps/gelf_update_ehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_ehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_ehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_getphdr.Tpo" `test -f 'elf32_getphdr.c' || echo './'`elf32_getphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_getphdr.Tpo" >> ".deps/elf32_getphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_getphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_getphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_getphdr.Tpo" `test -f 'elf64_getphdr.c' || echo './'`elf64_getphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_getphdr.Tpo" >> ".deps/elf64_getphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_getphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_getphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getphdr.Tpo" `test -f 'gelf_getphdr.c' || echo './'`gelf_getphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getphdr.Tpo" >> ".deps/gelf_getphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/nlist.Tpo .deps/nlist.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_newphdr.Tpo" `test -f 'elf32_newphdr.c' || echo './'`elf32_newphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_newphdr.Tpo" >> ".deps/elf32_newphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_newphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_newphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_newphdr.Tpo" `test -f 'elf64_newphdr.c' || echo './'`elf64_newphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_newphdr.Tpo" >> ".deps/elf64_newphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_newphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_newphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_newphdr.Tpo" `test -f 'gelf_newphdr.c' || echo './'`gelf_newphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_newphdr.Tpo" >> ".deps/gelf_newphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_newphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_newphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_phdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_phdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_phdr.Tpo" `test -f 'gelf_update_phdr.c' || echo './'`gelf_update_phdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_phdr.Tpo" >> ".deps/gelf_update_phdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_phdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_phdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_compress_gnu.Tpo .deps/elf_compress_gnu.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getarhdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarhdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getarhdr.Tpo" `test -f 'elf_getarhdr.c' || echo './'`elf_getarhdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getarhdr.Tpo" >> ".deps/elf_getarhdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getarhdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getarhdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getarsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarsym.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getarsym.Tpo" `test -f 'elf_getarsym.c' || echo './'`elf_getarsym.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getarsym.Tpo" >> ".deps/elf_getarsym.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getarsym.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getarsym.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_rawfile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawfile.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_rawfile.Tpo" `test -f 'elf_rawfile.c' || echo './'`elf_rawfile.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_rawfile.Tpo" >> ".deps/elf_rawfile.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_rawfile.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_rawfile.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_readall.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_readall.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_readall.Tpo" `test -f 'elf_readall.c' || echo './'`elf_readall.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_readall.Tpo" >> ".deps/elf_readall.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_readall.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_readall.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_cntl.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_cntl.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_cntl.Tpo" `test -f 'elf_cntl.c' || echo './'`elf_cntl.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_cntl.Tpo" >> ".deps/elf_cntl.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_cntl.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_cntl.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getscn.Tpo" `test -f 'elf_getscn.c' || echo './'`elf_getscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getscn.Tpo" >> ".deps/elf_getscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_nextscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_nextscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_nextscn.Tpo" `test -f 'elf_nextscn.c' || echo './'`elf_nextscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_nextscn.Tpo" >> ".deps/elf_nextscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_nextscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_nextscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_ndxscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_ndxscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_ndxscn.Tpo" `test -f 'elf_ndxscn.c' || echo './'`elf_ndxscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_ndxscn.Tpo" >> ".deps/elf_ndxscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_ndxscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_ndxscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_newscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_newscn.Tpo" `test -f 'elf_newscn.c' || echo './'`elf_newscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_newscn.Tpo" >> ".deps/elf_newscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_newscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_newscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getshdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_getshdr.Tpo" `test -f 'elf32_getshdr.c' || echo './'`elf32_getshdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_getshdr.Tpo" >> ".deps/elf32_getshdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_getshdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_getshdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getshdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_getshdr.Tpo" `test -f 'elf64_getshdr.c' || echo './'`elf64_getshdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_getshdr.Tpo" >> ".deps/elf64_getshdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_getshdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_getshdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getshdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getshdr.Tpo" `test -f 'gelf_getshdr.c' || echo './'`gelf_getshdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getshdr.Tpo" >> ".deps/gelf_getshdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getshdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getshdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_shdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_shdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_shdr.Tpo" `test -f 'gelf_update_shdr.c' || echo './'`gelf_update_shdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_shdr.Tpo" >> ".deps/gelf_update_shdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_shdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_shdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_strptr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_strptr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_strptr.Tpo" `test -f 'elf_strptr.c' || echo './'`elf_strptr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_strptr.Tpo" >> ".deps/elf_strptr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_strptr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_strptr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_rawdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawdata.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_rawdata.Tpo" `test -f 'elf_rawdata.c' || echo './'`elf_rawdata.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_rawdata.Tpo" >> ".deps/elf_rawdata.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_rawdata.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_rawdata.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_updatenull.Tpo .deps/elf32_updatenull.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getdata.Tpo" `test -f 'elf_getdata.c' || echo './'`elf_getdata.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getdata.Tpo" >> ".deps/elf_getdata.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getdata.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getdata.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_newdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newdata.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_newdata.Tpo" `test -f 'elf_newdata.c' || echo './'`elf_newdata.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_newdata.Tpo" >> ".deps/elf_newdata.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_newdata.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_newdata.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_updatenull.Tpo .deps/elf64_updatenull.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getdata_rawchunk.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata_rawchunk.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getdata_rawchunk.Tpo" `test -f 'elf_getdata_rawchunk.c' || echo './'`elf_getdata_rawchunk.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getdata_rawchunk.Tpo" >> ".deps/elf_getdata_rawchunk.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getdata_rawchunk.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getdata_rawchunk.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_flagelf.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagelf.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_flagelf.Tpo" `test -f 'elf_flagelf.c' || echo './'`elf_flagelf.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_flagelf.Tpo" >> ".deps/elf_flagelf.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_flagelf.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_flagelf.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_flagehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagehdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_flagehdr.Tpo" `test -f 'elf_flagehdr.c' || echo './'`elf_flagehdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_flagehdr.Tpo" >> ".deps/elf_flagehdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_flagehdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_flagehdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_flagphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagphdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_flagphdr.Tpo" `test -f 'elf_flagphdr.c' || echo './'`elf_flagphdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_flagphdr.Tpo" >> ".deps/elf_flagphdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_flagphdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_flagphdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_flagscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_flagscn.Tpo" `test -f 'elf_flagscn.c' || echo './'`elf_flagscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_flagscn.Tpo" >> ".deps/elf_flagscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_flagscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_flagscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_flagshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagshdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_flagshdr.Tpo" `test -f 'elf_flagshdr.c' || echo './'`elf_flagshdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_flagshdr.Tpo" >> ".deps/elf_flagshdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_flagshdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_flagshdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_flagdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagdata.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_flagdata.Tpo" `test -f 'elf_flagdata.c' || echo './'`elf_flagdata.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_flagdata.Tpo" >> ".deps/elf_flagdata.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_flagdata.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_flagdata.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_memory.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_memory.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_memory.Tpo" `test -f 'elf_memory.c' || echo './'`elf_memory.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_memory.Tpo" >> ".deps/elf_memory.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_memory.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_memory.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_update.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_update.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_update.Tpo" `test -f 'elf_update.c' || echo './'`elf_update.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_update.Tpo" >> ".deps/elf_update.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_update.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_update.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatenull.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_updatenull.Tpo" `test -f 'elf32_updatenull.c' || echo './'`elf32_updatenull.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_updatenull.Tpo" >> ".deps/elf32_updatenull.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_updatenull.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_updatenull.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatenull.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_updatenull.Tpo" `test -f 'elf64_updatenull.c' || echo './'`elf64_updatenull.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_updatenull.Tpo" >> ".deps/elf64_updatenull.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_updatenull.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_updatenull.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsym.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getsym.Tpo" `test -f 'gelf_getsym.c' || echo './'`gelf_getsym.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getsym.Tpo" >> ".deps/gelf_getsym.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getsym.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getsym.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_sym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_sym.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_sym.Tpo" `test -f 'gelf_update_sym.c' || echo './'`gelf_update_sym.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_sym.Tpo" >> ".deps/gelf_update_sym.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_sym.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_sym.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getversym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getversym.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getversym.Tpo" `test -f 'gelf_getversym.c' || echo './'`gelf_getversym.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getversym.Tpo" >> ".deps/gelf_getversym.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getversym.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getversym.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getverneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverneed.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getverneed.Tpo" `test -f 'gelf_getverneed.c' || echo './'`gelf_getverneed.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getverneed.Tpo" >> ".deps/gelf_getverneed.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getverneed.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getverneed.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getvernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getvernaux.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getvernaux.Tpo" `test -f 'gelf_getvernaux.c' || echo './'`gelf_getvernaux.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getvernaux.Tpo" >> ".deps/gelf_getvernaux.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getvernaux.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getvernaux.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getverdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdef.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getverdef.Tpo" `test -f 'gelf_getverdef.c' || echo './'`gelf_getverdef.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getverdef.Tpo" >> ".deps/gelf_getverdef.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getverdef.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getverdef.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getverdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdaux.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getverdaux.Tpo" `test -f 'gelf_getverdaux.c' || echo './'`gelf_getverdaux.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getverdaux.Tpo" >> ".deps/gelf_getverdaux.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getverdaux.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getverdaux.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getrel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrel.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getrel.Tpo" `test -f 'gelf_getrel.c' || echo './'`gelf_getrel.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getrel.Tpo" >> ".deps/gelf_getrel.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getrel.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getrel.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getrela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrela.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getrela.Tpo" `test -f 'gelf_getrela.c' || echo './'`gelf_getrela.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getrela.Tpo" >> ".deps/gelf_getrela.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getrela.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getrela.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_rel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rel.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_rel.Tpo" `test -f 'gelf_update_rel.c' || echo './'`gelf_update_rel.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_rel.Tpo" >> ".deps/gelf_update_rel.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_rel.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_rel.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_rela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rela.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_rela.Tpo" `test -f 'gelf_update_rela.c' || echo './'`gelf_update_rela.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_rela.Tpo" >> ".deps/gelf_update_rela.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_rela.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_rela.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getdyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getdyn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getdyn.Tpo" `test -f 'gelf_getdyn.c' || echo './'`gelf_getdyn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getdyn.Tpo" >> ".deps/gelf_getdyn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getdyn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getdyn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_dyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_dyn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_dyn.Tpo" `test -f 'gelf_update_dyn.c' || echo './'`gelf_update_dyn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_dyn.Tpo" >> ".deps/gelf_update_dyn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_dyn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_dyn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getmove.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getmove.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getmove.Tpo" `test -f 'gelf_getmove.c' || echo './'`gelf_getmove.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getmove.Tpo" >> ".deps/gelf_getmove.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getmove.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getmove.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_move.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_move.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_move.Tpo" `test -f 'gelf_update_move.c' || echo './'`gelf_update_move.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_move.Tpo" >> ".deps/gelf_update_move.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_move.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_move.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getsyminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsyminfo.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getsyminfo.Tpo" `test -f 'gelf_getsyminfo.c' || echo './'`gelf_getsyminfo.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getsyminfo.Tpo" >> ".deps/gelf_getsyminfo.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getsyminfo.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getsyminfo.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_syminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_syminfo.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_syminfo.Tpo" `test -f 'gelf_update_syminfo.c' || echo './'`gelf_update_syminfo.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_syminfo.Tpo" >> ".deps/gelf_update_syminfo.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_syminfo.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_syminfo.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getauxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getauxv.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getauxv.Tpo" `test -f 'gelf_getauxv.c' || echo './'`gelf_getauxv.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getauxv.Tpo" >> ".deps/gelf_getauxv.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getauxv.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getauxv.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_auxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_auxv.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_auxv.Tpo" `test -f 'gelf_update_auxv.c' || echo './'`gelf_update_auxv.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_auxv.Tpo" >> ".deps/gelf_update_auxv.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_auxv.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_auxv.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getnote.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getnote.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getnote.Tpo" `test -f 'gelf_getnote.c' || echo './'`gelf_getnote.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getnote.Tpo" >> ".deps/gelf_getnote.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getnote.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getnote.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetof.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_xlatetof.Tpo" `test -f 'gelf_xlatetof.c' || echo './'`gelf_xlatetof.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_xlatetof.Tpo" >> ".deps/gelf_xlatetof.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_xlatetof.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_xlatetof.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetom.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_xlatetom.Tpo" `test -f 'gelf_xlatetom.c' || echo './'`gelf_xlatetom.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_xlatetom.Tpo" >> ".deps/gelf_xlatetom.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_xlatetom.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_xlatetom.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o nlist.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT nlist.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/nlist.Tpo" `test -f 'nlist.c' || echo './'`nlist.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/nlist.Tpo" >> ".deps/nlist.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/nlist.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/nlist.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_compress.Tpo .deps/elf_compress.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getsymshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsymshndx.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getsymshndx.Tpo" `test -f 'gelf_getsymshndx.c' || echo './'`gelf_getsymshndx.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getsymshndx.Tpo" >> ".deps/gelf_getsymshndx.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getsymshndx.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getsymshndx.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_symshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_symshndx.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_symshndx.Tpo" `test -f 'gelf_update_symshndx.c' || echo './'`gelf_update_symshndx.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_symshndx.Tpo" >> ".deps/gelf_update_symshndx.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_symshndx.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_symshndx.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_versym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_versym.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_versym.Tpo" `test -f 'gelf_update_versym.c' || echo './'`gelf_update_versym.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_versym.Tpo" >> ".deps/gelf_update_versym.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_versym.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_versym.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_verneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verneed.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_verneed.Tpo" `test -f 'gelf_update_verneed.c' || echo './'`gelf_update_verneed.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_verneed.Tpo" >> ".deps/gelf_update_verneed.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_verneed.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_verneed.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_vernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_vernaux.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_vernaux.Tpo" `test -f 'gelf_update_vernaux.c' || echo './'`gelf_update_vernaux.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_vernaux.Tpo" >> ".deps/gelf_update_vernaux.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_vernaux.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_vernaux.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_verdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdef.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_verdef.Tpo" `test -f 'gelf_update_verdef.c' || echo './'`gelf_update_verdef.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_verdef.Tpo" >> ".deps/gelf_update_verdef.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_verdef.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_verdef.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_verdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdaux.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_verdaux.Tpo" `test -f 'gelf_update_verdaux.c' || echo './'`gelf_update_verdaux.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_verdaux.Tpo" >> ".deps/gelf_update_verdaux.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_verdaux.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_verdaux.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getphdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getphdrnum.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getphdrnum.Tpo" `test -f 'elf_getphdrnum.c' || echo './'`elf_getphdrnum.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getphdrnum.Tpo" >> ".deps/elf_getphdrnum.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getphdrnum.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getphdrnum.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getshdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrnum.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getshdrnum.Tpo" `test -f 'elf_getshdrnum.c' || echo './'`elf_getshdrnum.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getshdrnum.Tpo" >> ".deps/elf_getshdrnum.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getshdrnum.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getshdrnum.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getshdrstrndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrstrndx.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getshdrstrndx.Tpo" `test -f 'elf_getshdrstrndx.c' || echo './'`elf_getshdrstrndx.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getshdrstrndx.Tpo" >> ".deps/elf_getshdrstrndx.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getshdrstrndx.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getshdrstrndx.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_checksum.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_checksum.Tpo" `test -f 'gelf_checksum.c' || echo './'`gelf_checksum.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_checksum.Tpo" >> ".deps/gelf_checksum.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_checksum.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_checksum.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_checksum.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_checksum.Tpo" `test -f 'elf32_checksum.c' || echo './'`elf32_checksum.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_checksum.Tpo" >> ".deps/elf32_checksum.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_checksum.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_checksum.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_checksum.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_checksum.Tpo" `test -f 'elf64_checksum.c' || echo './'`elf64_checksum.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_checksum.Tpo" >> ".deps/elf64_checksum.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_checksum.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_checksum.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o libelf_crc32.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_crc32.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/libelf_crc32.Tpo" `test -f 'libelf_crc32.c' || echo './'`libelf_crc32.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/libelf_crc32.Tpo" >> ".deps/libelf_crc32.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/libelf_crc32.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/libelf_crc32.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o libelf_next_prime.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_next_prime.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/libelf_next_prime.Tpo" `test -f 'libelf_next_prime.c' || echo './'`libelf_next_prime.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/libelf_next_prime.Tpo" >> ".deps/libelf_next_prime.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/libelf_next_prime.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/libelf_next_prime.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_clone.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_clone.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_clone.Tpo" `test -f 'elf_clone.c' || echo './'`elf_clone.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_clone.Tpo" >> ".deps/elf_clone.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_clone.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_clone.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getlib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getlib.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getlib.Tpo" `test -f 'gelf_getlib.c' || echo './'`gelf_getlib.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getlib.Tpo" >> ".deps/gelf_getlib.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getlib.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getlib.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_update_lib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_lib.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_update_lib.Tpo" `test -f 'gelf_update_lib.c' || echo './'`gelf_update_lib.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_update_lib.Tpo" >> ".deps/gelf_update_lib.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_update_lib.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_update_lib.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_offscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_offscn.Tpo" `test -f 'elf32_offscn.c' || echo './'`elf32_offscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_offscn.Tpo" >> ".deps/elf32_offscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_offscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_offscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_offscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_offscn.Tpo" `test -f 'elf64_offscn.c' || echo './'`elf64_offscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_offscn.Tpo" >> ".deps/elf64_offscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_offscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_offscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_offscn.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_offscn.Tpo" `test -f 'gelf_offscn.c' || echo './'`gelf_offscn.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_offscn.Tpo" >> ".deps/gelf_offscn.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_offscn.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_offscn.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_getaroff.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getaroff.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_getaroff.Tpo" `test -f 'elf_getaroff.c' || echo './'`elf_getaroff.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_getaroff.Tpo" >> ".deps/elf_getaroff.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_getaroff.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_getaroff.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_gnu_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_gnu_hash.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_gnu_hash.Tpo" `test -f 'elf_gnu_hash.c' || echo './'`elf_gnu_hash.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_gnu_hash.Tpo" >> ".deps/elf_gnu_hash.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_gnu_hash.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_gnu_hash.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_scnshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_scnshndx.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_scnshndx.Tpo" `test -f 'elf_scnshndx.c' || echo './'`elf_scnshndx.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_scnshndx.Tpo" >> ".deps/elf_scnshndx.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_scnshndx.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_scnshndx.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getchdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_getchdr.Tpo" `test -f 'elf32_getchdr.c' || echo './'`elf32_getchdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_getchdr.Tpo" >> ".deps/elf32_getchdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_getchdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_getchdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getchdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_getchdr.Tpo" `test -f 'elf64_getchdr.c' || echo './'`elf64_getchdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_getchdr.Tpo" >> ".deps/elf64_getchdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_getchdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_getchdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getchdr.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_getchdr.Tpo" `test -f 'gelf_getchdr.c' || echo './'`gelf_getchdr.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_getchdr.Tpo" >> ".deps/gelf_getchdr.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_getchdr.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_getchdr.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_compress.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_compress.Tpo" `test -f 'elf_compress.c' || echo './'`elf_compress.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_compress.Tpo" >> ".deps/elf_compress.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_compress.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_compress.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_compress_gnu.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress_gnu.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_compress_gnu.Tpo" `test -f 'elf_compress_gnu.c' || echo './'`elf_compress_gnu.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_compress_gnu.Tpo" >> ".deps/elf_compress_gnu.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_compress_gnu.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_compress_gnu.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf_begin.Tpo .deps/elf_begin.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf_begin.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_begin.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf_begin.Tpo" `test -f 'elf_begin.c' || echo './'`elf_begin.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf_begin.Tpo" >> ".deps/elf_begin.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf_begin.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf_begin.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf32_updatefile.Tpo .deps/elf32_updatefile.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf32_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatefile.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf32_updatefile.Tpo" `test -f 'elf32_updatefile.c' || echo './'`elf32_updatefile.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf32_updatefile.Tpo" >> ".deps/elf32_updatefile.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf32_updatefile.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf32_updatefile.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/gelf_xlate.Tpo .deps/gelf_xlate.Po Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o gelf_xlate.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlate.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/gelf_xlate.Tpo" `test -f 'gelf_xlate.c' || echo './'`gelf_xlate.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/gelf_xlate.Tpo" >> ".deps/gelf_xlate.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/gelf_xlate.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/gelf_xlate.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": mv -f .deps/elf64_updatefile.Tpo .deps/elf64_updatefile.Po Step #39 - "compile-libfuzzer-memory-x86_64": rm -f libelf.a Step #39 - "compile-libfuzzer-memory-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -c -o elf64_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatefile.os -MD -MP \ Step #39 - "compile-libfuzzer-memory-x86_64": -MF ".deps/elf64_updatefile.Tpo" `test -f 'elf64_updatefile.c' || echo './'`elf64_updatefile.c; \ Step #39 - "compile-libfuzzer-memory-x86_64": then cat ".deps/elf64_updatefile.Tpo" >> ".deps/elf64_updatefile.Po"; \ Step #39 - "compile-libfuzzer-memory-x86_64": rm -f ".deps/elf64_updatefile.Tpo"; \ Step #39 - "compile-libfuzzer-memory-x86_64": else rm -f ".deps/elf64_updatefile.Tpo"; exit 1; \ Step #39 - "compile-libfuzzer-memory-x86_64": fi Step #39 - "compile-libfuzzer-memory-x86_64": ar cr libelf.a elf_version.o elf_hash.o elf_error.o elf_fill.o elf_begin.o elf_next.o elf_rand.o elf_end.o elf_kind.o gelf_getclass.o elf_getbase.o elf_getident.o elf32_fsize.o elf64_fsize.o gelf_fsize.o elf32_xlatetof.o elf32_xlatetom.o elf64_xlatetof.o elf64_xlatetom.o gelf_xlate.o elf32_getehdr.o elf64_getehdr.o gelf_getehdr.o elf32_newehdr.o elf64_newehdr.o gelf_newehdr.o gelf_update_ehdr.o elf32_getphdr.o elf64_getphdr.o gelf_getphdr.o elf32_newphdr.o elf64_newphdr.o gelf_newphdr.o gelf_update_phdr.o elf_getarhdr.o elf_getarsym.o elf_rawfile.o elf_readall.o elf_cntl.o elf_getscn.o elf_nextscn.o elf_ndxscn.o elf_newscn.o elf32_getshdr.o elf64_getshdr.o gelf_getshdr.o gelf_update_shdr.o elf_strptr.o elf_rawdata.o elf_getdata.o elf_newdata.o elf_getdata_rawchunk.o elf_flagelf.o elf_flagehdr.o elf_flagphdr.o elf_flagscn.o elf_flagshdr.o elf_flagdata.o elf_memory.o elf_update.o elf32_updatenull.o elf64_updatenull.o elf32_updatefile.o elf64_updatefile.o gelf_getsym.o gelf_update_sym.o gelf_getversym.o gelf_getverneed.o gelf_getvernaux.o gelf_getverdef.o gelf_getverdaux.o gelf_getrel.o gelf_getrela.o gelf_update_rel.o gelf_update_rela.o gelf_getdyn.o gelf_update_dyn.o gelf_getmove.o gelf_update_move.o gelf_getsyminfo.o gelf_update_syminfo.o gelf_getauxv.o gelf_update_auxv.o gelf_getnote.o gelf_xlatetof.o gelf_xlatetom.o nlist.o gelf_getsymshndx.o gelf_update_symshndx.o gelf_update_versym.o gelf_update_verneed.o gelf_update_vernaux.o gelf_update_verdef.o gelf_update_verdaux.o elf_getphdrnum.o elf_getshdrnum.o elf_getshdrstrndx.o gelf_checksum.o elf32_checksum.o elf64_checksum.o libelf_crc32.o libelf_next_prime.o elf_clone.o gelf_getlib.o gelf_update_lib.o elf32_offscn.o elf64_offscn.o gelf_offscn.o elf_getaroff.o elf_gnu_hash.o elf_scnshndx.o elf32_getchdr.o elf64_getchdr.o gelf_getchdr.o elf_compress.o elf_compress_gnu.o Step #39 - "compile-libfuzzer-memory-x86_64": ranlib libelf.a Step #39 - "compile-libfuzzer-memory-x86_64": rm -f libelf_pic.a Step #39 - "compile-libfuzzer-memory-x86_64": ar cr libelf_pic.a elf_version.os elf_hash.os elf_error.os elf_fill.os elf_begin.os elf_next.os elf_rand.os elf_end.os elf_kind.os gelf_getclass.os elf_getbase.os elf_getident.os elf32_fsize.os elf64_fsize.os gelf_fsize.os elf32_xlatetof.os elf32_xlatetom.os elf64_xlatetof.os elf64_xlatetom.os gelf_xlate.os elf32_getehdr.os elf64_getehdr.os gelf_getehdr.os elf32_newehdr.os elf64_newehdr.os gelf_newehdr.os gelf_update_ehdr.os elf32_getphdr.os elf64_getphdr.os gelf_getphdr.os elf32_newphdr.os elf64_newphdr.os gelf_newphdr.os gelf_update_phdr.os elf_getarhdr.os elf_getarsym.os elf_rawfile.os elf_readall.os elf_cntl.os elf_getscn.os elf_nextscn.os elf_ndxscn.os elf_newscn.os elf32_getshdr.os elf64_getshdr.os gelf_getshdr.os gelf_update_shdr.os elf_strptr.os elf_rawdata.os elf_getdata.os elf_newdata.os elf_getdata_rawchunk.os elf_flagelf.os elf_flagehdr.os elf_flagphdr.os elf_flagscn.os elf_flagshdr.os elf_flagdata.os elf_memory.os elf_update.os elf32_updatenull.os elf64_updatenull.os elf32_updatefile.os elf64_updatefile.os gelf_getsym.os gelf_update_sym.os gelf_getversym.os gelf_getverneed.os gelf_getvernaux.os gelf_getverdef.os gelf_getverdaux.os gelf_getrel.os gelf_getrela.os gelf_update_rel.os gelf_update_rela.os gelf_getdyn.os gelf_update_dyn.os gelf_getmove.os gelf_update_move.os gelf_getsyminfo.os gelf_update_syminfo.os gelf_getauxv.os gelf_update_auxv.os gelf_getnote.os gelf_xlatetof.os gelf_xlatetom.os nlist.os gelf_getsymshndx.os gelf_update_symshndx.os gelf_update_versym.os gelf_update_verneed.os gelf_update_vernaux.os gelf_update_verdef.os gelf_update_verdaux.os elf_getphdrnum.os elf_getshdrnum.os elf_getshdrstrndx.os gelf_checksum.os elf32_checksum.os elf64_checksum.os libelf_crc32.os libelf_next_prime.os elf_clone.os gelf_getlib.os gelf_update_lib.os elf32_offscn.os elf64_offscn.os gelf_offscn.os elf_getaroff.os elf_gnu_hash.os elf_scnshndx.os elf32_getchdr.os elf64_getchdr.os gelf_getchdr.os elf_compress.os elf_compress_gnu.os Step #39 - "compile-libfuzzer-memory-x86_64": ranlib libelf_pic.a Step #39 - "compile-libfuzzer-memory-x86_64": clang -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -fno-addrsig -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -Wl,--build-id -o libelf.so -shared -Wl,-z,relro -o libelf.so \ Step #39 - "compile-libfuzzer-memory-x86_64": -Wl,--soname,libelf.so.1 \ Step #39 - "compile-libfuzzer-memory-x86_64": -Wl,--version-script,libelf.map \ Step #39 - "compile-libfuzzer-memory-x86_64": \ Step #39 - "compile-libfuzzer-memory-x86_64": -Wl,--whole-archive libelf_pic.a -Wl,--no-whole-archive \ Step #39 - "compile-libfuzzer-memory-x86_64": ../lib/libeu.a -lz Step #39 - "compile-libfuzzer-memory-x86_64": ln -fs libelf.so libelf.so.1 Step #39 - "compile-libfuzzer-memory-x86_64": make: Leaving directory '/src/libbpf/elfutils/libelf' Step #39 - "compile-libfuzzer-memory-x86_64": + make -C src BUILD_STATIC_ONLY=y V=1 clean Step #39 - "compile-libfuzzer-memory-x86_64": make: Entering directory '/src/libbpf/src' Step #39 - "compile-libfuzzer-memory-x86_64": Package libelf was not found in the pkg-config search path. Step #39 - "compile-libfuzzer-memory-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #39 - "compile-libfuzzer-memory-x86_64": to the PKG_CONFIG_PATH environment variable Step #39 - "compile-libfuzzer-memory-x86_64": No package 'libelf' found Step #39 - "compile-libfuzzer-memory-x86_64": rm -rf *.o *.a *.so *.so.* *.pc ./sharedobjs ./staticobjs Step #39 - "compile-libfuzzer-memory-x86_64": make: Leaving directory '/src/libbpf/src' Step #39 - "compile-libfuzzer-memory-x86_64": ++ nproc Step #39 - "compile-libfuzzer-memory-x86_64": ++ pwd Step #39 - "compile-libfuzzer-memory-x86_64": + make -C src -j32 'CFLAGS=-I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE' BUILD_STATIC_ONLY=y V=1 Step #39 - "compile-libfuzzer-memory-x86_64": make: Entering directory '/src/libbpf/src' Step #39 - "compile-libfuzzer-memory-x86_64": Package libelf was not found in the pkg-config search path. Step #39 - "compile-libfuzzer-memory-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #39 - "compile-libfuzzer-memory-x86_64": to the PKG_CONFIG_PATH environment variable Step #39 - "compile-libfuzzer-memory-x86_64": No package 'libelf' found Step #39 - "compile-libfuzzer-memory-x86_64": mkdir -p staticobjs Step #39 - "compile-libfuzzer-memory-x86_64": sed -e "s|@PREFIX@|/usr|" \ Step #39 - "compile-libfuzzer-memory-x86_64": -e "s|@LIBDIR@|$\{prefix\}/lib64|" \ Step #39 - "compile-libfuzzer-memory-x86_64": -e "s|@VERSION@|1.4.0|" \ Step #39 - "compile-libfuzzer-memory-x86_64": < libbpf.pc.template > libbpf.pc Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf.c -o staticobjs/bpf.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf.c -o staticobjs/btf.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf.c -o staticobjs/libbpf.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_errno.c -o staticobjs/libbpf_errno.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c netlink.c -o staticobjs/netlink.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c nlattr.c -o staticobjs/nlattr.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c str_error.c -o staticobjs/str_error.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_probes.c -o staticobjs/libbpf_probes.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf_prog_linfo.c -o staticobjs/bpf_prog_linfo.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf_dump.c -o staticobjs/btf_dump.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c hashmap.c -o staticobjs/hashmap.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c ringbuf.c -o staticobjs/ringbuf.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c strset.c -o staticobjs/strset.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c linker.c -o staticobjs/linker.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c gen_loader.c -o staticobjs/gen_loader.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c relo_core.c -o staticobjs/relo_core.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c usdt.c -o staticobjs/usdt.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c zip.c -o staticobjs/zip.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c elf.c -o staticobjs/elf.o Step #39 - "compile-libfuzzer-memory-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c features.c -o staticobjs/features.o Step #39 - "compile-libfuzzer-memory-x86_64": ar rcs libbpf.a staticobjs/bpf.o staticobjs/btf.o staticobjs/libbpf.o staticobjs/libbpf_errno.o staticobjs/netlink.o staticobjs/nlattr.o staticobjs/str_error.o staticobjs/libbpf_probes.o staticobjs/bpf_prog_linfo.o staticobjs/btf_dump.o staticobjs/hashmap.o staticobjs/ringbuf.o staticobjs/strset.o staticobjs/linker.o staticobjs/gen_loader.o staticobjs/relo_core.o staticobjs/usdt.o staticobjs/zip.o staticobjs/elf.o staticobjs/features.o Step #39 - "compile-libfuzzer-memory-x86_64": make: Leaving directory '/src/libbpf/src' Step #39 - "compile-libfuzzer-memory-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -U_FORTIFY_SOURCE -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o Step #39 - "compile-libfuzzer-memory-x86_64": ++ pwd Step #39 - "compile-libfuzzer-memory-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ -U_FORTIFY_SOURCE -fsanitize=fuzzer bpf-object-fuzzer.o src/libbpf.a /src/libbpf/elfutils/libelf/libelf.a -l:libz.a -o /workspace/out/libfuzzer-memory-x86_64/bpf-object-fuzzer Step #39 - "compile-libfuzzer-memory-x86_64": + cp fuzz/bpf-object-fuzzer_seed_corpus.zip /workspace/out/libfuzzer-memory-x86_64 Finished Step #39 - "compile-libfuzzer-memory-x86_64" Starting Step #40 - "build-check-libfuzzer-memory-x86_64" Step #40 - "build-check-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #40 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpxu8czx7e/bpf-object-fuzzer Finished Step #40 - "build-check-libfuzzer-memory-x86_64" Starting Step #41 Step #41: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #41 Starting Step #42 Step #42: Already have image: gcr.io/oss-fuzz/libbpf Step #42: adding: bpf-object-fuzzer (deflated 61%) Step #42: adding: bpf-object-fuzzer_seed_corpus.zip (stored 0%) Step #42: adding: llvm-symbolizer (deflated 64%) Finished Step #42 Starting Step #43 Step #43: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #43: % Total % Received % Xferd Average Speed Time Time Time Current Step #43: Dload Upload Total Spent Left Speed Step #43: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 147 0 0 100 147 0 658 --:--:-- --:--:-- --:--:-- 659 Finished Step #43 Starting Step #44 Step #44: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #44: % Total % Received % Xferd Average Speed Time Time Time Current Step #44: Dload Upload Total Spent Left Speed Step #44: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4539k 0 0 100 4539k 0 15.0M --:--:-- --:--:-- --:--:-- 15.1M Finished Step #44 Starting Step #45 Step #45: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #45: % Total % Received % Xferd Average Speed Time Time Time Current Step #45: Dload Upload Total Spent Left Speed Step #45: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 18 0 0 100 18 0 60 --:--:-- --:--:-- --:--:-- 60 Finished Step #45 Starting Step #46 Step #46: Already have image (with digest): gcr.io/cloud-builders/curl Step #46: % Total % Received % Xferd Average Speed Time Time Time Current Step #46: Dload Upload Total Spent Left Speed Step #46: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 30 0 0 100 30 0 134 --:--:-- --:--:-- --:--:-- 134 Finished Step #46 Starting Step #47 Step #47: Already have image: gcr.io/oss-fuzz/libbpf Finished Step #47 Starting Step #48 - "compile-libfuzzer-undefined-x86_64" Step #48 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #48 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #48 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #48 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #48 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #48 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #48 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link Step #48 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ Step #48 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #48 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #48 - "compile-libfuzzer-undefined-x86_64": + ./scripts/build-fuzzers.sh Step #48 - "compile-libfuzzer-undefined-x86_64": + SANITIZER=undefined Step #48 - "compile-libfuzzer-undefined-x86_64": + flags='-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=undefined -fsanitize=fuzzer-no-link' Step #48 - "compile-libfuzzer-undefined-x86_64": + export CC=clang Step #48 - "compile-libfuzzer-undefined-x86_64": + CC=clang Step #48 - "compile-libfuzzer-undefined-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link' Step #48 - "compile-libfuzzer-undefined-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link' Step #48 - "compile-libfuzzer-undefined-x86_64": + export CXX=clang++ Step #48 - "compile-libfuzzer-undefined-x86_64": + CXX=clang++ Step #48 - "compile-libfuzzer-undefined-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++' Step #48 - "compile-libfuzzer-undefined-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++' Step #48 - "compile-libfuzzer-undefined-x86_64": ++ dirname -- ./scripts/build-fuzzers.sh Step #48 - "compile-libfuzzer-undefined-x86_64": + cd ./scripts/.. Step #48 - "compile-libfuzzer-undefined-x86_64": + export OUT=/workspace/out/libfuzzer-undefined-x86_64 Step #48 - "compile-libfuzzer-undefined-x86_64": + OUT=/workspace/out/libfuzzer-undefined-x86_64 Step #48 - "compile-libfuzzer-undefined-x86_64": + mkdir -p /workspace/out/libfuzzer-undefined-x86_64 Step #48 - "compile-libfuzzer-undefined-x86_64": + export LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #48 - "compile-libfuzzer-undefined-x86_64": + LIB_FUZZING_ENGINE=-fsanitize=fuzzer Step #48 - "compile-libfuzzer-undefined-x86_64": + [[ undefined == memory ]] Step #48 - "compile-libfuzzer-undefined-x86_64": + [[ undefined == undefined ]] Step #48 - "compile-libfuzzer-undefined-x86_64": + additional_ubsan_checks=alignment Step #48 - "compile-libfuzzer-undefined-x86_64": + UBSAN_FLAGS='-fsanitize=alignment -fno-sanitize-recover=alignment' Step #48 - "compile-libfuzzer-undefined-x86_64": + CFLAGS+=' -fsanitize=alignment -fno-sanitize-recover=alignment' Step #48 - "compile-libfuzzer-undefined-x86_64": + CXXFLAGS+=' -fsanitize=alignment -fno-sanitize-recover=alignment' Step #48 - "compile-libfuzzer-undefined-x86_64": + rm -rf elfutils Step #48 - "compile-libfuzzer-undefined-x86_64": + git clone https://sourceware.org/git/elfutils.git Step #48 - "compile-libfuzzer-undefined-x86_64": Cloning into 'elfutils'... Step #48 - "compile-libfuzzer-undefined-x86_64": remote: Enumerating objects: 38615, done. Step #48 - "compile-libfuzzer-undefined-x86_64": remote: Counting objects: 0% (1/38615) remote: Counting objects: 1% (387/38615) remote: Counting objects: 2% (773/38615) remote: Counting objects: 3% (1159/38615) remote: Counting objects: 4% (1545/38615) remote: Counting objects: 5% (1931/38615) remote: Counting objects: 6% (2317/38615) remote: Counting objects: 7% (2704/38615) remote: Counting objects: 8% (3090/38615) remote: Counting objects: 9% (3476/38615) remote: Counting objects: 10% (3862/38615) remote: Counting objects: 11% (4248/38615) remote: Counting objects: 12% (4634/38615) remote: Counting objects: 13% (5020/38615) remote: Counting objects: 14% (5407/38615) remote: Counting objects: 15% (5793/38615) remote: Counting objects: 16% (6179/38615) remote: Counting objects: 17% (6565/38615) remote: Counting objects: 18% (6951/38615) remote: Counting objects: 19% (7337/38615) remote: Counting objects: 20% (7723/38615) remote: Counting objects: 21% (8110/38615) remote: Counting objects: 22% (8496/38615) remote: Counting objects: 23% (8882/38615) remote: Counting objects: 24% (9268/38615) remote: Counting objects: 25% (9654/38615) remote: Counting objects: 26% (10040/38615) remote: Counting objects: 27% (10427/38615) remote: Counting objects: 28% (10813/38615) remote: Counting objects: 29% (11199/38615) remote: Counting objects: 30% (11585/38615) remote: Counting objects: 31% (11971/38615) remote: Counting objects: 32% (12357/38615) remote: Counting objects: 33% (12743/38615) remote: Counting objects: 34% (13130/38615) remote: Counting objects: 35% (13516/38615) remote: Counting objects: 36% (13902/38615) remote: Counting objects: 37% (14288/38615) remote: Counting objects: 38% (14674/38615) remote: Counting objects: 39% (15060/38615) remote: Counting objects: 40% (15446/38615) remote: Counting objects: 41% (15833/38615) remote: Counting objects: 42% (16219/38615) remote: Counting objects: 43% (16605/38615) remote: Counting objects: 44% (16991/38615) remote: Counting objects: 45% (17377/38615) remote: Counting objects: 46% (17763/38615) remote: Counting objects: 47% (18150/38615) remote: Counting objects: 48% (18536/38615) remote: Counting objects: 49% (18922/38615) remote: Counting objects: 50% (19308/38615) remote: Counting objects: 51% (19694/38615) remote: Counting objects: 52% (20080/38615) remote: Counting objects: 53% (20466/38615) remote: Counting objects: 54% (20853/38615) remote: Counting objects: 55% (21239/38615) remote: Counting objects: 56% (21625/38615) remote: Counting objects: 57% (22011/38615) remote: Counting objects: 58% (22397/38615) remote: Counting objects: 59% (22783/38615) remote: Counting objects: 60% (23169/38615) remote: Counting objects: 61% (23556/38615) remote: Counting objects: 62% (23942/38615) remote: Counting objects: 63% (24328/38615) remote: Counting objects: 64% (24714/38615) remote: Counting objects: 65% (25100/38615) remote: Counting objects: 66% (25486/38615) remote: Counting objects: 67% (25873/38615) remote: Counting objects: 68% (26259/38615) remote: Counting objects: 69% (26645/38615) remote: Counting objects: 70% (27031/38615) remote: Counting objects: 71% (27417/38615) remote: Counting objects: 72% (27803/38615) remote: Counting objects: 73% (28189/38615) remote: Counting objects: 74% (28576/38615) remote: Counting objects: 75% (28962/38615) remote: Counting objects: 76% (29348/38615) remote: Counting objects: 77% (29734/38615) remote: Counting objects: 78% (30120/38615) remote: Counting objects: 79% (30506/38615) remote: Counting objects: 80% (30892/38615) remote: Counting objects: 81% (31279/38615) remote: Counting objects: 82% (31665/38615) remote: Counting objects: 83% (32051/38615) remote: Counting objects: 84% (32437/38615) remote: Counting objects: 85% (32823/38615) remote: Counting objects: 86% (33209/38615) remote: Counting objects: 87% (33596/38615) remote: Counting objects: 88% (33982/38615) remote: Counting objects: 89% (34368/38615) remote: Counting objects: 90% (34754/38615) remote: Counting objects: 91% (35140/38615) remote: Counting objects: 92% (35526/38615) remote: Counting objects: 93% (35912/38615) remote: Counting objects: 94% (36299/38615) remote: Counting objects: 95% (36685/38615) remote: Counting objects: 96% (37071/38615) remote: Counting objects: 97% (37457/38615) remote: Counting objects: 98% (37843/38615) remote: Counting objects: 99% (38229/38615) remote: Counting objects: 100% (38615/38615) remote: Counting objects: 100% (38615/38615), done. Step #48 - "compile-libfuzzer-undefined-x86_64": remote: Compressing objects: 0% (1/7338) remote: Compressing objects: 1% (74/7338) remote: Compressing objects: 2% (147/7338) remote: Compressing objects: 3% (221/7338) remote: Compressing objects: 4% (294/7338) remote: Compressing objects: 5% (367/7338) remote: Compressing objects: 6% (441/7338) remote: Compressing objects: 7% (514/7338) remote: Compressing objects: 8% (588/7338) remote: Compressing objects: 9% (661/7338) remote: Compressing objects: 10% (734/7338) remote: Compressing objects: 11% (808/7338) remote: Compressing objects: 12% (881/7338) remote: Compressing objects: 13% (954/7338) remote: Compressing objects: 14% (1028/7338) remote: Compressing objects: 15% (1101/7338) remote: Compressing objects: 16% (1175/7338) remote: Compressing objects: 17% (1248/7338) remote: Compressing objects: 18% (1321/7338) remote: Compressing objects: 19% (1395/7338) remote: Compressing objects: 20% (1468/7338) remote: Compressing objects: 21% (1541/7338) remote: Compressing objects: 22% (1615/7338) remote: Compressing objects: 23% (1688/7338) remote: Compressing objects: 24% (1762/7338) remote: Compressing objects: 25% (1835/7338) remote: Compressing objects: 26% (1908/7338) remote: Compressing objects: 27% (1982/7338) remote: Compressing objects: 28% (2055/7338) remote: Compressing objects: 29% (2129/7338) remote: Compressing objects: 30% (2202/7338) remote: Compressing objects: 31% (2275/7338) remote: Compressing objects: 32% (2349/7338) remote: Compressing objects: 33% (2422/7338) remote: Compressing objects: 34% (2495/7338) remote: Compressing objects: 35% (2569/7338) remote: Compressing objects: 36% (2642/7338) remote: Compressing objects: 37% (2716/7338) remote: Compressing objects: 38% (2789/7338) remote: Compressing objects: 39% (2862/7338) remote: Compressing objects: 40% (2936/7338) remote: Compressing objects: 41% (3009/7338) remote: Compressing objects: 42% (3082/7338) remote: Compressing objects: 43% (3156/7338) remote: Compressing objects: 44% (3229/7338) remote: Compressing objects: 45% (3303/7338) remote: Compressing objects: 46% (3376/7338) remote: Compressing objects: 47% (3449/7338) remote: Compressing objects: 48% (3523/7338) remote: Compressing objects: 49% (3596/7338) remote: Compressing objects: 50% (3669/7338) remote: Compressing objects: 51% (3743/7338) remote: Compressing objects: 52% (3816/7338) remote: Compressing objects: 53% (3890/7338) remote: Compressing objects: 54% (3963/7338) remote: Compressing objects: 55% (4036/7338) remote: Compressing objects: 56% (4110/7338) remote: Compressing objects: 57% (4183/7338) remote: Compressing objects: 58% (4257/7338) remote: Compressing objects: 59% (4330/7338) remote: Compressing objects: 60% (4403/7338) remote: Compressing objects: 61% (4477/7338) remote: Compressing objects: 62% (4550/7338) remote: Compressing objects: 63% (4623/7338) remote: Compressing objects: 64% (4697/7338) remote: Compressing objects: 65% (4770/7338) remote: Compressing objects: 66% (4844/7338) remote: Compressing objects: 67% (4917/7338) remote: Compressing objects: 68% (4990/7338) remote: Compressing objects: 69% (5064/7338) remote: Compressing objects: 70% (5137/7338) remote: Compressing objects: 71% (5210/7338) remote: Compressing objects: 72% (5284/7338) remote: Compressing objects: 73% (5357/7338) remote: Compressing objects: 74% (5431/7338) remote: Compressing objects: 75% (5504/7338) remote: Compressing objects: 76% (5577/7338) remote: Compressing objects: 77% (5651/7338) remote: Compressing objects: 78% (5724/7338) remote: Compressing objects: 79% (5798/7338) remote: Compressing objects: 80% (5871/7338) remote: Compressing objects: 81% (5944/7338) remote: Compressing objects: 82% (6018/7338) remote: Compressing objects: 83% (6091/7338) remote: Compressing objects: 84% (6164/7338) remote: Compressing objects: 85% (6238/7338) remote: Compressing objects: 86% (6311/7338) remote: Compressing objects: 87% (6385/7338) remote: Compressing objects: 88% (6458/7338) remote: Compressing objects: 89% (6531/7338) remote: Compressing objects: 90% (6605/7338) remote: Compressing objects: 91% (6678/7338) remote: Compressing objects: 92% (6751/7338) remote: Compressing objects: 93% (6825/7338) remote: Compressing objects: 94% (6898/7338) remote: Compressing objects: 95% (6972/7338) remote: Compressing objects: 96% (7045/7338) remote: Compressing objects: 97% (7118/7338) remote: Compressing objects: 98% (7192/7338) remote: Compressing objects: 99% (7265/7338) remote: Compressing objects: 100% (7338/7338) remote: Compressing objects: 100% (7338/7338), done. Step #48 - "compile-libfuzzer-undefined-x86_64": Receiving objects: 0% (1/38615) Receiving objects: 1% (387/38615) Receiving objects: 2% (773/38615) Receiving objects: 3% (1159/38615) Receiving objects: 4% (1545/38615) Receiving objects: 5% (1931/38615) Receiving objects: 6% (2317/38615) Receiving objects: 7% (2704/38615) Receiving objects: 8% (3090/38615) Receiving objects: 9% (3476/38615) Receiving objects: 10% (3862/38615) Receiving objects: 11% (4248/38615) Receiving objects: 12% (4634/38615) Receiving objects: 13% (5020/38615) Receiving objects: 14% (5407/38615) Receiving objects: 15% (5793/38615) Receiving objects: 16% (6179/38615) Receiving objects: 17% (6565/38615) Receiving objects: 18% (6951/38615) Receiving objects: 19% (7337/38615) Receiving objects: 20% (7723/38615) Receiving objects: 21% (8110/38615) Receiving objects: 22% (8496/38615) Receiving objects: 23% (8882/38615) Receiving objects: 24% (9268/38615) Receiving objects: 25% (9654/38615) Receiving objects: 26% (10040/38615) Receiving objects: 27% (10427/38615) Receiving objects: 28% (10813/38615) Receiving objects: 29% (11199/38615) Receiving objects: 30% (11585/38615) Receiving objects: 31% (11971/38615) Receiving objects: 32% (12357/38615) Receiving objects: 33% (12743/38615) Receiving objects: 34% (13130/38615) Receiving objects: 35% (13516/38615) Receiving objects: 36% (13902/38615) Receiving objects: 37% (14288/38615) Receiving objects: 38% (14674/38615) Receiving objects: 39% (15060/38615) Receiving objects: 40% (15446/38615) Receiving objects: 41% (15833/38615) Receiving objects: 42% (16219/38615) Receiving objects: 43% (16605/38615) Receiving objects: 44% (16991/38615) Receiving objects: 45% (17377/38615) Receiving objects: 46% (17763/38615) Receiving objects: 47% (18150/38615) Receiving objects: 48% (18536/38615) Receiving objects: 49% (18922/38615) Receiving objects: 50% (19308/38615) Receiving objects: 51% (19694/38615) Receiving objects: 52% (20080/38615) Receiving objects: 53% (20466/38615) Receiving objects: 54% (20853/38615) Receiving objects: 55% (21239/38615) Receiving objects: 56% (21625/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 57% (22011/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 58% (22397/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 59% (22783/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 60% (23169/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 61% (23556/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 62% (23942/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 63% (24328/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 64% (24714/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 65% (25100/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 66% (25486/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 67% (25873/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 68% (26259/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 69% (26645/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 70% (27031/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 71% (27417/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 72% (27803/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 73% (28189/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 74% (28576/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 75% (28962/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 76% (29348/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 77% (29734/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 78% (30120/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 79% (30506/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 80% (30892/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 81% (31279/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 82% (31665/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 83% (32051/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 84% (32437/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 85% (32823/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 86% (33209/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 87% (33596/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 88% (33982/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 89% (34368/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 90% (34754/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 91% (35140/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 92% (35526/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 93% (35912/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 94% (36299/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 95% (36685/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 96% (37071/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 97% (37457/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 98% (37843/38615), 11.64 MiB | 23.27 MiB/s remote: Total 38615 (delta 32217), reused 37479 (delta 31234), pack-reused 0 Step #48 - "compile-libfuzzer-undefined-x86_64": Receiving objects: 99% (38229/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 100% (38615/38615), 11.64 MiB | 23.27 MiB/s Receiving objects: 100% (38615/38615), 21.53 MiB | 30.03 MiB/s, done. Step #48 - "compile-libfuzzer-undefined-x86_64": Resolving deltas: 0% (0/32217) Resolving deltas: 1% (432/32217) Resolving deltas: 2% (958/32217) Resolving deltas: 3% (1078/32217) Resolving deltas: 4% (1355/32217) Resolving deltas: 5% (1619/32217) Resolving deltas: 6% (2029/32217) Resolving deltas: 7% (2273/32217) Resolving deltas: 8% (2655/32217) Resolving deltas: 9% (2907/32217) Resolving deltas: 10% (3310/32217) Resolving deltas: 11% (3555/32217) Resolving deltas: 12% (3889/32217) Resolving deltas: 13% (4191/32217) Resolving deltas: 14% (4575/32217) Resolving deltas: 15% (4892/32217) Resolving deltas: 17% (5638/32217) Resolving deltas: 18% (5803/32217) Resolving deltas: 19% (6217/32217) Resolving deltas: 20% (6496/32217) Resolving deltas: 22% (7329/32217) Resolving deltas: 23% (7436/32217) Resolving deltas: 26% (8437/32217) Resolving deltas: 27% (8777/32217) Resolving deltas: 28% (9289/32217) Resolving deltas: 29% (9409/32217) Resolving deltas: 30% (9903/32217) Resolving deltas: 31% (10114/32217) Resolving deltas: 32% (10312/32217) Resolving deltas: 33% (10661/32217) Resolving deltas: 34% (11050/32217) Resolving deltas: 35% (11298/32217) Resolving deltas: 36% (11637/32217) Resolving deltas: 37% (11921/32217) Resolving deltas: 39% (12631/32217) Resolving deltas: 40% (13014/32217) Resolving deltas: 41% (13212/32217) Resolving deltas: 42% (13550/32217) Resolving deltas: 43% (13857/32217) Resolving deltas: 44% (14176/32217) Resolving deltas: 45% (14762/32217) Resolving deltas: 46% (14841/32217) Resolving deltas: 47% (15207/32217) Resolving deltas: 48% (15535/32217) Resolving deltas: 49% (15796/32217) Resolving deltas: 50% (16184/32217) Resolving deltas: 51% (16475/32217) Resolving deltas: 52% (16758/32217) Resolving deltas: 53% (17115/32217) Resolving deltas: 54% (17416/32217) Resolving deltas: 55% (17763/32217) Resolving deltas: 56% (18138/32217) Resolving deltas: 57% (18492/32217) Resolving deltas: 58% (18733/32217) Resolving deltas: 59% (19029/32217) Resolving deltas: 60% (19337/32217) Resolving deltas: 61% (19657/32217) Resolving deltas: 62% (20017/32217) Resolving deltas: 63% (20326/32217) Resolving deltas: 64% (20628/32217) Resolving deltas: 65% (20958/32217) Resolving deltas: 66% (21300/32217) Resolving deltas: 67% (21860/32217) Resolving deltas: 68% (21912/32217) Resolving deltas: 69% (22289/32217) Resolving deltas: 70% (22555/32217) Resolving deltas: 71% (23051/32217) Resolving deltas: 72% (23248/32217) Resolving deltas: 73% (23549/32217) Resolving deltas: 74% (23872/32217) Resolving deltas: 75% (24399/32217) Resolving deltas: 77% (24861/32217) Resolving deltas: 78% (25220/32217) Resolving deltas: 80% (25881/32217) Resolving deltas: 82% (26464/32217) Resolving deltas: 83% (26771/32217) Resolving deltas: 84% (27081/32217) Resolving deltas: 85% (27388/32217) Resolving deltas: 86% (27711/32217) Resolving deltas: 87% (28029/32217) Resolving deltas: 88% (28360/32217) Resolving deltas: 89% (28873/32217) Resolving deltas: 90% (29011/32217) Resolving deltas: 91% (29319/32217) Resolving deltas: 92% (29640/32217) Resolving deltas: 93% (29973/32217) Resolving deltas: 93% (30149/32217) Resolving deltas: 94% (30303/32217) Resolving deltas: 95% (30629/32217) Resolving deltas: 96% (30939/32217) Resolving deltas: 97% (31252/32217) Resolving deltas: 98% (31607/32217) Resolving deltas: 99% (32009/32217) Resolving deltas: 100% (32217/32217) Resolving deltas: 100% (32217/32217), done. Step #48 - "compile-libfuzzer-undefined-x86_64": + cd elfutils Step #48 - "compile-libfuzzer-undefined-x86_64": + git checkout 67a187d4c1790058fc7fd218317851cb68bb087c Step #48 - "compile-libfuzzer-undefined-x86_64": Note: switching to '67a187d4c1790058fc7fd218317851cb68bb087c'. Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #48 - "compile-libfuzzer-undefined-x86_64": changes and commit them, and you can discard any commits you make in this Step #48 - "compile-libfuzzer-undefined-x86_64": state without impacting any branches by switching back to a branch. Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": If you want to create a new branch to retain commits you create, you may Step #48 - "compile-libfuzzer-undefined-x86_64": do so (now or later) by using -c with the switch command. Example: Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": git switch -c Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": Or undo this operation with: Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": git switch - Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": HEAD is now at 67a187d4 Prepare for 0.189 Step #48 - "compile-libfuzzer-undefined-x86_64": + git log --oneline -1 Step #48 - "compile-libfuzzer-undefined-x86_64": [?1h= 67a187d4 (HEAD, tag: elfutils-0.189) Prepare for 0.189 Step #48 - "compile-libfuzzer-undefined-x86_64": [?1l>+ sed -i 's/^\(NO_UNDEFINED=\).*/\1/' configure.ac Step #48 - "compile-libfuzzer-undefined-x86_64": + sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac Step #48 - "compile-libfuzzer-undefined-x86_64": + [[ undefined == undefined ]] Step #48 - "compile-libfuzzer-undefined-x86_64": + sed -i 's/\(check_undefined_val\)=[0-9]/\1=1/' configure.ac Step #48 - "compile-libfuzzer-undefined-x86_64": + autoreconf -i -f Step #48 - "compile-libfuzzer-undefined-x86_64": autopoint: using AM_GNU_GETTEXT_REQUIRE_VERSION instead of AM_GNU_GETTEXT_VERSION Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file ABOUT-NLS Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file config/config.rpath Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/codeset.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/extern-inline.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/fcntl-o.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/gettext.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/glibc2.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/glibc21.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/iconv.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/intdiv0.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/intl.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/intldir.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/intlmacosx.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/intmax.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/inttypes-pri.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/inttypes_h.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/lcmessage.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/lib-ld.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/lib-link.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/lib-prefix.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/lock.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/longlong.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/nls.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/po.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/printf-posix.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/progtest.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/size_max.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/stdint_h.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/threadlib.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/uintmax_t.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/visibility.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/wchar_t.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/wint_t.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file m4/xsize.m4 Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/Makefile.in.in Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/Makevars.template Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/Rules-quot Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/boldquot.sed Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/en@boldquot.header Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/en@quot.header Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/insert-header.sin Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/quot.sed Step #48 - "compile-libfuzzer-undefined-x86_64": Copying file po/remove-potcdate.sin Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac:97: installing 'config/ar-lib' Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac:91: installing 'config/compile' Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac:67: installing 'config/config.guess' Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac:67: installing 'config/config.sub' Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac:52: installing 'config/install-sh' Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac:52: installing 'config/missing' Step #48 - "compile-libfuzzer-undefined-x86_64": Makefile.am: installing './INSTALL' Step #48 - "compile-libfuzzer-undefined-x86_64": backends/Makefile.am: installing 'config/depcomp' Step #48 - "compile-libfuzzer-undefined-x86_64": configure.ac: installing 'config/ylwrap' Step #48 - "compile-libfuzzer-undefined-x86_64": parallel-tests: installing 'config/test-driver' Step #48 - "compile-libfuzzer-undefined-x86_64": + ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod --disable-demangler --without-bzlib --without-lzma --without-zstd CC=clang 'CFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment' CXX=clang++ 'CXXFLAGS=-Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=alignment -fno-sanitize-recover=alignment' 'LDFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment' Step #48 - "compile-libfuzzer-undefined-x86_64": configure: No --program-prefix given, using "eu-" Step #48 - "compile-libfuzzer-undefined-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether build environment is sane... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #48 - "compile-libfuzzer-undefined-x86_64": checking for gawk... gawk Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether make sets $(MAKE)... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether make supports nested variables... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether make supports nested variables... (cached) yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking build system type... x86_64-pc-linux-gnu Step #48 - "compile-libfuzzer-undefined-x86_64": checking host system type... x86_64-pc-linux-gnu Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether make supports the include directive... yes (GNU style) Step #48 - "compile-libfuzzer-undefined-x86_64": checking for gcc... clang Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the C compiler works... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for C compiler default output file name... a.out Step #48 - "compile-libfuzzer-undefined-x86_64": checking for suffix of executables... Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether we are cross compiling... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking for suffix of object files... o Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether we are using the GNU C compiler... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether clang accepts -g... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for clang option to accept ISO C89... none needed Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether clang understands -c and -o together... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking dependency style of clang... gcc3 Step #48 - "compile-libfuzzer-undefined-x86_64": checking for clang option to accept ISO C99... none needed Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether we are using the GNU C++ compiler... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether clang++ accepts -g... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking dependency style of clang++... gcc3 Step #48 - "compile-libfuzzer-undefined-x86_64": checking for ranlib... ranlib Step #48 - "compile-libfuzzer-undefined-x86_64": checking for bison... bison -y Step #48 - "compile-libfuzzer-undefined-x86_64": checking for flex... flex Step #48 - "compile-libfuzzer-undefined-x86_64": checking lex output file root... lex.yy Step #48 - "compile-libfuzzer-undefined-x86_64": checking lex library... none needed Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether yytext is a pointer... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking for ar... ar Step #48 - "compile-libfuzzer-undefined-x86_64": checking the archiver (ar) interface... ar Step #48 - "compile-libfuzzer-undefined-x86_64": checking for readelf... readelf Step #48 - "compile-libfuzzer-undefined-x86_64": checking for nm... nm Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc supports __attribute__((visibility()))... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc supports __attribute__((gcc_struct))... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc supports -fPIC... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc supports -fPIE... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc supports ... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the compiler generates build-ids... no Step #48 - "compile-libfuzzer-undefined-x86_64": configure: WARNING: compiler doesn't generate build-id by default Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc supports -Wl,-z,relro... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for __thread support... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc provides stdatomic.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for special C compiler options needed for large files... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether fts.h is bad when included (with LFS)... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether to add -D_FORTIFY_SOURCE=2 or =3 to CFLAGS... yes -D_FORTIFY_SOURCE=3 Step #48 - "compile-libfuzzer-undefined-x86_64": checking for library containing gzdirect... -lz Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether memrchr is declared... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether rawmemchr is declared... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether powerof2 is declared... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether mempcpy is declared... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether reallocarray is declared... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for process_vm_readv... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for mremap... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking how to run the C preprocessor... clang -E Step #48 - "compile-libfuzzer-undefined-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #48 - "compile-libfuzzer-undefined-x86_64": checking for egrep... /usr/bin/grep -E Step #48 - "compile-libfuzzer-undefined-x86_64": checking for ANSI C header files... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for sys/types.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for sys/stat.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for stdlib.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for string.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for memory.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for strings.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for inttypes.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for stdint.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for unistd.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking error.h usability... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking error.h presence... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for error.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking err.h usability... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking err.h presence... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for err.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking sched.h usability... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking sched.h presence... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for sched.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for sched_getaffinity... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking sys/resource.h usability... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking sys/resource.h presence... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for sys/resource.h... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for getrlimit... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether strerror_r is declared... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for strerror_r... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether strerror_r returns char *... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether symbol versioning is supported... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc accepts -Wstack-usage... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc has a sane -Wlogical-op... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc accepts -Wduplicated-cond... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc accepts -Wnull-dereference... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether gcc accepts -Wimplicit-fallthrough... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the compiler accepts -Wimplicit-fallthrough=5... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the compiler accepts -Wtrampolines... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the compiler accepts -Wno-packed-not-aligned... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the compiler accepts -Wuse-after-free=3... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether the compiler accepts -fno-addrsig... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for library containing argp_parse... none required Step #48 - "compile-libfuzzer-undefined-x86_64": checking for library containing fts_close... none required Step #48 - "compile-libfuzzer-undefined-x86_64": checking for library containing _obstack_free... none required Step #48 - "compile-libfuzzer-undefined-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether NLS is requested... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for msgfmt... /usr/bin/msgfmt Step #48 - "compile-libfuzzer-undefined-x86_64": checking for gmsgfmt... /usr/bin/msgfmt Step #48 - "compile-libfuzzer-undefined-x86_64": checking for xgettext... /usr/bin/xgettext Step #48 - "compile-libfuzzer-undefined-x86_64": checking for msgmerge... /usr/bin/msgmerge Step #48 - "compile-libfuzzer-undefined-x86_64": checking for ld used by clang... /usr/bin/ld Step #48 - "compile-libfuzzer-undefined-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for shared library run path origin... done Step #48 - "compile-libfuzzer-undefined-x86_64": checking for CFPreferencesCopyAppValue... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking for CFLocaleCopyCurrent... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking for GNU gettext in libc... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether to use NLS... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking where the gettext function comes from... libc Step #48 - "compile-libfuzzer-undefined-x86_64": checking size of long... 8 Step #48 - "compile-libfuzzer-undefined-x86_64": checking for struct user_regs_struct... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking clang option for 32-bit word size... -m32 Step #48 - "compile-libfuzzer-undefined-x86_64": checking for 64-bit host... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether clang -m32 makes executables we can run... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for flex... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for bison... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for gawk... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for bunzip2... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for zstd... no Step #48 - "compile-libfuzzer-undefined-x86_64": checking whether clang++ supports C++11 features with -std=c++11... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking for pthread_setname_np in -lpthread... yes Step #48 - "compile-libfuzzer-undefined-x86_64": checking that generated files are newer than configure... done Step #48 - "compile-libfuzzer-undefined-x86_64": configure: creating ./config.status Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating elfutils.spec Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating debuginfod/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating debuginfod/debuginfod.h Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating doc/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating lib/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libelf/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libebl/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libdwelf/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libdw/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libdwfl/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libcpu/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating libasm/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating backends/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating src/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating po/Makefile.in Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating tests/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config/libelf.pc Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config/libdw.pc Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config/libdebuginfod.pc Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating version.h Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config/profile.sh Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config/profile.csh Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating config.h Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: executing depfiles commands Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: executing po-directories commands Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating po/POTFILES Step #48 - "compile-libfuzzer-undefined-x86_64": config.status: creating po/Makefile Step #48 - "compile-libfuzzer-undefined-x86_64": configure: Step #48 - "compile-libfuzzer-undefined-x86_64": ===================================================================== Step #48 - "compile-libfuzzer-undefined-x86_64": elfutils: 0.189 (eu_version: 189) Step #48 - "compile-libfuzzer-undefined-x86_64": ===================================================================== Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": Prefix : /usr/local Step #48 - "compile-libfuzzer-undefined-x86_64": Program prefix ("eu-" recommended) : eu- Step #48 - "compile-libfuzzer-undefined-x86_64": Source code location : . Step #48 - "compile-libfuzzer-undefined-x86_64": Maintainer mode : yes Step #48 - "compile-libfuzzer-undefined-x86_64": build arch : x86_64-pc-linux-gnu Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig Step #48 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=alignment -fno-sanitize-recover=alignment Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": RECOMMENDED FEATURES (should all be yes) Step #48 - "compile-libfuzzer-undefined-x86_64": gzip support : yes Step #48 - "compile-libfuzzer-undefined-x86_64": bzip2 support : no Step #48 - "compile-libfuzzer-undefined-x86_64": lzma/xz support : no Step #48 - "compile-libfuzzer-undefined-x86_64": zstd support : no Step #48 - "compile-libfuzzer-undefined-x86_64": zstd compression support : no Step #48 - "compile-libfuzzer-undefined-x86_64": libstdc++ demangle support : no Step #48 - "compile-libfuzzer-undefined-x86_64": File textrel check : yes Step #48 - "compile-libfuzzer-undefined-x86_64": Symbol versioning : yes Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": NOT RECOMMENDED FEATURES (should all be no) Step #48 - "compile-libfuzzer-undefined-x86_64": Experimental thread safety : no Step #48 - "compile-libfuzzer-undefined-x86_64": install elf.h : no Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": OTHER FEATURES Step #48 - "compile-libfuzzer-undefined-x86_64": Deterministic archives by default : false Step #48 - "compile-libfuzzer-undefined-x86_64": Native language support : yes Step #48 - "compile-libfuzzer-undefined-x86_64": Extra Valgrind annotations : no Step #48 - "compile-libfuzzer-undefined-x86_64": libdebuginfod client support : no Step #48 - "compile-libfuzzer-undefined-x86_64": Debuginfod server support : no Step #48 - "compile-libfuzzer-undefined-x86_64": Default DEBUGINFOD_URLS : Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": EXTRA TEST FEATURES (used with make check) Step #48 - "compile-libfuzzer-undefined-x86_64": have bunzip2 installed (required) : yes Step #48 - "compile-libfuzzer-undefined-x86_64": have zstd installed : no Step #48 - "compile-libfuzzer-undefined-x86_64": C++11 : yes Step #48 - "compile-libfuzzer-undefined-x86_64": debug branch prediction : no Step #48 - "compile-libfuzzer-undefined-x86_64": gprof support : no Step #48 - "compile-libfuzzer-undefined-x86_64": gcov support : no Step #48 - "compile-libfuzzer-undefined-x86_64": run all tests under valgrind : no Step #48 - "compile-libfuzzer-undefined-x86_64": gcc undefined behaviour sanitizer : no Step #48 - "compile-libfuzzer-undefined-x86_64": gcc address sanitizer : no Step #48 - "compile-libfuzzer-undefined-x86_64": clang memory sanitizer : no Step #48 - "compile-libfuzzer-undefined-x86_64": use rpath in tests : no Step #48 - "compile-libfuzzer-undefined-x86_64": test biarch : yes Step #48 - "compile-libfuzzer-undefined-x86_64": Step #48 - "compile-libfuzzer-undefined-x86_64": ++ nproc Step #48 - "compile-libfuzzer-undefined-x86_64": + make -C config -j32 V=1 Step #48 - "compile-libfuzzer-undefined-x86_64": make: Entering directory '/src/libbpf/elfutils/config' Step #48 - "compile-libfuzzer-undefined-x86_64": make: Nothing to be done for 'all'. Step #48 - "compile-libfuzzer-undefined-x86_64": make: Leaving directory '/src/libbpf/elfutils/config' Step #48 - "compile-libfuzzer-undefined-x86_64": ++ nproc Step #48 - "compile-libfuzzer-undefined-x86_64": + make -C lib -j32 V=1 Step #48 - "compile-libfuzzer-undefined-x86_64": make: Entering directory '/src/libbpf/elfutils/lib' Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT xasprintf.o -MD -MP -MF .deps/xasprintf.Tpo -c -o xasprintf.o xasprintf.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT xstrdup.o -MD -MP -MF .deps/xstrdup.Tpo -c -o xstrdup.o xstrdup.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT xstrndup.o -MD -MP -MF .deps/xstrndup.Tpo -c -o xstrndup.o xstrndup.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT xmalloc.o -MD -MP -MF .deps/xmalloc.Tpo -c -o xmalloc.o xmalloc.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT next_prime.o -MD -MP -MF .deps/next_prime.Tpo -c -o next_prime.o next_prime.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT crc32.o -MD -MP -MF .deps/crc32.Tpo -c -o crc32.o crc32.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT crc32_file.o -MD -MP -MF .deps/crc32_file.Tpo -c -o crc32_file.o crc32_file.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT color.o -MD -MP -MF .deps/color.Tpo -c -o color.o color.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT error.o -MD -MP -MF .deps/error.Tpo -c -o error.o error.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -I./../libelf -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -fPIC -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT printversion.o -MD -MP -MF .deps/printversion.Tpo -c -o printversion.o printversion.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/error.Tpo .deps/error.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/xstrdup.Tpo .deps/xstrdup.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/next_prime.Tpo .deps/next_prime.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/printversion.Tpo .deps/printversion.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/xstrndup.Tpo .deps/xstrndup.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/crc32.Tpo .deps/crc32.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/xmalloc.Tpo .deps/xmalloc.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/xasprintf.Tpo .deps/xasprintf.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/crc32_file.Tpo .deps/crc32_file.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/color.Tpo .deps/color.Po Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f libeu.a Step #48 - "compile-libfuzzer-undefined-x86_64": ar cr libeu.a xasprintf.o xstrdup.o xstrndup.o xmalloc.o next_prime.o crc32.o crc32_file.o color.o error.o printversion.o Step #48 - "compile-libfuzzer-undefined-x86_64": ranlib libeu.a Step #48 - "compile-libfuzzer-undefined-x86_64": make: Leaving directory '/src/libbpf/elfutils/lib' Step #48 - "compile-libfuzzer-undefined-x86_64": ++ nproc Step #48 - "compile-libfuzzer-undefined-x86_64": + make -C libelf -j32 V=1 Step #48 - "compile-libfuzzer-undefined-x86_64": make: Entering directory '/src/libbpf/elfutils/libelf' Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_version.o -MD -MP -MF .deps/elf_version.Tpo -c -o elf_version.o elf_version.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_hash.o -MD -MP -MF .deps/elf_hash.Tpo -c -o elf_hash.o elf_hash.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_error.o -MD -MP -MF .deps/elf_error.Tpo -c -o elf_error.o elf_error.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_fill.o -MD -MP -MF .deps/elf_fill.Tpo -c -o elf_fill.o elf_fill.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_begin.o -MD -MP -MF .deps/elf_begin.Tpo -c -o elf_begin.o elf_begin.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_next.o -MD -MP -MF .deps/elf_next.Tpo -c -o elf_next.o elf_next.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_rand.o -MD -MP -MF .deps/elf_rand.Tpo -c -o elf_rand.o elf_rand.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_end.o -MD -MP -MF .deps/elf_end.Tpo -c -o elf_end.o elf_end.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_kind.o -MD -MP -MF .deps/elf_kind.Tpo -c -o elf_kind.o elf_kind.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getclass.o -MD -MP -MF .deps/gelf_getclass.Tpo -c -o gelf_getclass.o gelf_getclass.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getbase.o -MD -MP -MF .deps/elf_getbase.Tpo -c -o elf_getbase.o elf_getbase.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getident.o -MD -MP -MF .deps/elf_getident.Tpo -c -o elf_getident.o elf_getident.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_fsize.o -MD -MP -MF .deps/elf32_fsize.Tpo -c -o elf32_fsize.o elf32_fsize.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_fsize.o -MD -MP -MF .deps/elf64_fsize.Tpo -c -o elf64_fsize.o elf64_fsize.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_fsize.o -MD -MP -MF .deps/gelf_fsize.Tpo -c -o gelf_fsize.o gelf_fsize.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_xlatetof.o -MD -MP -MF .deps/elf32_xlatetof.Tpo -c -o elf32_xlatetof.o elf32_xlatetof.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_xlatetom.o -MD -MP -MF .deps/elf32_xlatetom.Tpo -c -o elf32_xlatetom.o elf32_xlatetom.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_xlatetof.o -MD -MP -MF .deps/elf64_xlatetof.Tpo -c -o elf64_xlatetof.o elf64_xlatetof.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_xlatetom.o -MD -MP -MF .deps/elf64_xlatetom.Tpo -c -o elf64_xlatetom.o elf64_xlatetom.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_xlate.o -MD -MP -MF .deps/gelf_xlate.Tpo -c -o gelf_xlate.o gelf_xlate.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_getehdr.o -MD -MP -MF .deps/elf32_getehdr.Tpo -c -o elf32_getehdr.o elf32_getehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_getehdr.o -MD -MP -MF .deps/elf64_getehdr.Tpo -c -o elf64_getehdr.o elf64_getehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getehdr.o -MD -MP -MF .deps/gelf_getehdr.Tpo -c -o gelf_getehdr.o gelf_getehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_newehdr.o -MD -MP -MF .deps/elf32_newehdr.Tpo -c -o elf32_newehdr.o elf32_newehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_newehdr.o -MD -MP -MF .deps/elf64_newehdr.Tpo -c -o elf64_newehdr.o elf64_newehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_newehdr.o -MD -MP -MF .deps/gelf_newehdr.Tpo -c -o gelf_newehdr.o gelf_newehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_ehdr.o -MD -MP -MF .deps/gelf_update_ehdr.Tpo -c -o gelf_update_ehdr.o gelf_update_ehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_getphdr.o -MD -MP -MF .deps/elf32_getphdr.Tpo -c -o elf32_getphdr.o elf32_getphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_getphdr.o -MD -MP -MF .deps/elf64_getphdr.Tpo -c -o elf64_getphdr.o elf64_getphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getphdr.o -MD -MP -MF .deps/gelf_getphdr.Tpo -c -o gelf_getphdr.o gelf_getphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_newphdr.o -MD -MP -MF .deps/elf32_newphdr.Tpo -c -o elf32_newphdr.o elf32_newphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_newphdr.o -MD -MP -MF .deps/elf64_newphdr.Tpo -c -o elf64_newphdr.o elf64_newphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_fill.Tpo .deps/elf_fill.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_version.Tpo .deps/elf_version.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_newphdr.o -MD -MP -MF .deps/gelf_newphdr.Tpo -c -o gelf_newphdr.o gelf_newphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_phdr.o -MD -MP -MF .deps/gelf_update_phdr.Tpo -c -o gelf_update_phdr.o gelf_update_phdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_kind.Tpo .deps/elf_kind.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getclass.Tpo .deps/gelf_getclass.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getbase.Tpo .deps/elf_getbase.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getarhdr.o -MD -MP -MF .deps/elf_getarhdr.Tpo -c -o elf_getarhdr.o elf_getarhdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_rand.Tpo .deps/elf_rand.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getarsym.o -MD -MP -MF .deps/elf_getarsym.Tpo -c -o elf_getarsym.o elf_getarsym.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_rawfile.o -MD -MP -MF .deps/elf_rawfile.Tpo -c -o elf_rawfile.o elf_rawfile.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_hash.Tpo .deps/elf_hash.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_readall.o -MD -MP -MF .deps/elf_readall.Tpo -c -o elf_readall.o elf_readall.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_error.Tpo .deps/elf_error.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getident.Tpo .deps/elf_getident.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_next.Tpo .deps/elf_next.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_fsize.Tpo .deps/elf64_fsize.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_cntl.o -MD -MP -MF .deps/elf_cntl.Tpo -c -o elf_cntl.o elf_cntl.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getscn.o -MD -MP -MF .deps/elf_getscn.Tpo -c -o elf_getscn.o elf_getscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_newehdr.Tpo .deps/gelf_newehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_fsize.Tpo .deps/gelf_fsize.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_fsize.Tpo .deps/elf32_fsize.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_nextscn.o -MD -MP -MF .deps/elf_nextscn.Tpo -c -o elf_nextscn.o elf_nextscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_ndxscn.o -MD -MP -MF .deps/elf_ndxscn.Tpo -c -o elf_ndxscn.o elf_ndxscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_newscn.o -MD -MP -MF .deps/elf_newscn.Tpo -c -o elf_newscn.o elf_newscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_getshdr.o -MD -MP -MF .deps/elf32_getshdr.Tpo -c -o elf32_getshdr.o elf32_getshdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_getshdr.o -MD -MP -MF .deps/elf64_getshdr.Tpo -c -o elf64_getshdr.o elf64_getshdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getshdr.o -MD -MP -MF .deps/gelf_getshdr.Tpo -c -o gelf_getshdr.o gelf_getshdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_xlatetof.Tpo .deps/elf32_xlatetof.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_xlatetom.Tpo .deps/elf32_xlatetom.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_xlatetof.Tpo .deps/elf64_xlatetof.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_xlatetom.Tpo .deps/elf64_xlatetom.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_getehdr.Tpo .deps/elf32_getehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_getehdr.Tpo .deps/elf64_getehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_newehdr.Tpo .deps/elf32_newehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_newehdr.Tpo .deps/elf64_newehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_shdr.o -MD -MP -MF .deps/gelf_update_shdr.Tpo -c -o gelf_update_shdr.o gelf_update_shdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_strptr.o -MD -MP -MF .deps/elf_strptr.Tpo -c -o elf_strptr.o elf_strptr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_rawdata.o -MD -MP -MF .deps/elf_rawdata.Tpo -c -o elf_rawdata.o elf_rawdata.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getdata.o -MD -MP -MF .deps/elf_getdata.Tpo -c -o elf_getdata.o elf_getdata.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_newdata.o -MD -MP -MF .deps/elf_newdata.Tpo -c -o elf_newdata.o elf_newdata.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getdata_rawchunk.o -MD -MP -MF .deps/elf_getdata_rawchunk.Tpo -c -o elf_getdata_rawchunk.o elf_getdata_rawchunk.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_flagelf.o -MD -MP -MF .deps/elf_flagelf.Tpo -c -o elf_flagelf.o elf_flagelf.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_flagehdr.o -MD -MP -MF .deps/elf_flagehdr.Tpo -c -o elf_flagehdr.o elf_flagehdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getehdr.Tpo .deps/gelf_getehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_flagphdr.o -MD -MP -MF .deps/elf_flagphdr.Tpo -c -o elf_flagphdr.o elf_flagphdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_ehdr.Tpo .deps/gelf_update_ehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getphdr.Tpo .deps/gelf_getphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_flagscn.o -MD -MP -MF .deps/elf_flagscn.Tpo -c -o elf_flagscn.o elf_flagscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_flagshdr.o -MD -MP -MF .deps/elf_flagshdr.Tpo -c -o elf_flagshdr.o elf_flagshdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_newphdr.Tpo .deps/gelf_newphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_end.Tpo .deps/elf_end.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_flagdata.o -MD -MP -MF .deps/elf_flagdata.Tpo -c -o elf_flagdata.o elf_flagdata.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_memory.o -MD -MP -MF .deps/elf_memory.Tpo -c -o elf_memory.o elf_memory.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_rawfile.Tpo .deps/elf_rawfile.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getarhdr.Tpo .deps/elf_getarhdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_newphdr.Tpo .deps/elf32_newphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_newphdr.Tpo .deps/elf64_newphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_update.o -MD -MP -MF .deps/elf_update.Tpo -c -o elf_update.o elf_update.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_updatenull.o -MD -MP -MF .deps/elf32_updatenull.Tpo -c -o elf32_updatenull.o elf32_updatenull.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_cntl.Tpo .deps/elf_cntl.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_updatenull.o -MD -MP -MF .deps/elf64_updatenull.Tpo -c -o elf64_updatenull.o elf64_updatenull.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_updatefile.o -MD -MP -MF .deps/elf32_updatefile.Tpo -c -o elf32_updatefile.o elf32_updatefile.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_ndxscn.Tpo .deps/elf_ndxscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_updatefile.o -MD -MP -MF .deps/elf64_updatefile.Tpo -c -o elf64_updatefile.o elf64_updatefile.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_nextscn.Tpo .deps/elf_nextscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getscn.Tpo .deps/elf_getscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getsym.o -MD -MP -MF .deps/gelf_getsym.Tpo -c -o gelf_getsym.o gelf_getsym.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_getphdr.Tpo .deps/elf32_getphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_sym.o -MD -MP -MF .deps/gelf_update_sym.Tpo -c -o gelf_update_sym.o gelf_update_sym.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_rawdata.Tpo .deps/elf_rawdata.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getversym.o -MD -MP -MF .deps/gelf_getversym.Tpo -c -o gelf_getversym.o gelf_getversym.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getverneed.o -MD -MP -MF .deps/gelf_getverneed.Tpo -c -o gelf_getverneed.o gelf_getverneed.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_flagehdr.Tpo .deps/elf_flagehdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getvernaux.o -MD -MP -MF .deps/gelf_getvernaux.Tpo -c -o gelf_getvernaux.o gelf_getvernaux.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_getphdr.Tpo .deps/elf64_getphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_phdr.Tpo .deps/gelf_update_phdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getshdr.Tpo .deps/gelf_getshdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_flagelf.Tpo .deps/elf_flagelf.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getverdef.o -MD -MP -MF .deps/gelf_getverdef.Tpo -c -o gelf_getverdef.o gelf_getverdef.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_flagphdr.Tpo .deps/elf_flagphdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getverdaux.o -MD -MP -MF .deps/gelf_getverdaux.Tpo -c -o gelf_getverdaux.o gelf_getverdaux.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getrel.o -MD -MP -MF .deps/gelf_getrel.Tpo -c -o gelf_getrel.o gelf_getrel.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getrela.o -MD -MP -MF .deps/gelf_getrela.Tpo -c -o gelf_getrela.o gelf_getrela.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_rel.o -MD -MP -MF .deps/gelf_update_rel.Tpo -c -o gelf_update_rel.o gelf_update_rel.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_rela.o -MD -MP -MF .deps/gelf_update_rela.Tpo -c -o gelf_update_rela.o gelf_update_rela.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_flagshdr.Tpo .deps/elf_flagshdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_newdata.Tpo .deps/elf_newdata.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getdyn.o -MD -MP -MF .deps/gelf_getdyn.Tpo -c -o gelf_getdyn.o gelf_getdyn.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_newscn.Tpo .deps/elf_newscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_readall.Tpo .deps/elf_readall.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_shdr.Tpo .deps/gelf_update_shdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_flagscn.Tpo .deps/elf_flagscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_memory.Tpo .deps/elf_memory.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_dyn.o -MD -MP -MF .deps/gelf_update_dyn.Tpo -c -o gelf_update_dyn.o gelf_update_dyn.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getmove.o -MD -MP -MF .deps/gelf_getmove.Tpo -c -o gelf_getmove.o gelf_getmove.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_move.o -MD -MP -MF .deps/gelf_update_move.Tpo -c -o gelf_update_move.o gelf_update_move.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getsyminfo.o -MD -MP -MF .deps/gelf_getsyminfo.Tpo -c -o gelf_getsyminfo.o gelf_getsyminfo.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_syminfo.o -MD -MP -MF .deps/gelf_update_syminfo.Tpo -c -o gelf_update_syminfo.o gelf_update_syminfo.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getauxv.o -MD -MP -MF .deps/gelf_getauxv.Tpo -c -o gelf_getauxv.o gelf_getauxv.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_flagdata.Tpo .deps/elf_flagdata.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_auxv.o -MD -MP -MF .deps/gelf_update_auxv.Tpo -c -o gelf_update_auxv.o gelf_update_auxv.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_strptr.Tpo .deps/elf_strptr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getnote.o -MD -MP -MF .deps/gelf_getnote.Tpo -c -o gelf_getnote.o gelf_getnote.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getdata_rawchunk.Tpo .deps/elf_getdata_rawchunk.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_xlatetof.o -MD -MP -MF .deps/gelf_xlatetof.Tpo -c -o gelf_xlatetof.o gelf_xlatetof.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getarsym.Tpo .deps/elf_getarsym.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_xlatetom.o -MD -MP -MF .deps/gelf_xlatetom.Tpo -c -o gelf_xlatetom.o gelf_xlatetom.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getversym.Tpo .deps/gelf_getversym.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT nlist.o -MD -MP -MF .deps/nlist.Tpo -c -o nlist.o nlist.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getverneed.Tpo .deps/gelf_getverneed.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getsymshndx.o -MD -MP -MF .deps/gelf_getsymshndx.Tpo -c -o gelf_getsymshndx.o gelf_getsymshndx.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getsym.Tpo .deps/gelf_getsym.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_update.Tpo .deps/elf_update.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_sym.Tpo .deps/gelf_update_sym.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getvernaux.Tpo .deps/gelf_getvernaux.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getverdef.Tpo .deps/gelf_getverdef.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getverdaux.Tpo .deps/gelf_getverdaux.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getrel.Tpo .deps/gelf_getrel.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getrela.Tpo .deps/gelf_getrela.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_symshndx.o -MD -MP -MF .deps/gelf_update_symshndx.Tpo -c -o gelf_update_symshndx.o gelf_update_symshndx.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_move.Tpo .deps/gelf_update_move.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_rel.Tpo .deps/gelf_update_rel.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_rela.Tpo .deps/gelf_update_rela.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getmove.Tpo .deps/gelf_getmove.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_versym.o -MD -MP -MF .deps/gelf_update_versym.Tpo -c -o gelf_update_versym.o gelf_update_versym.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_verneed.o -MD -MP -MF .deps/gelf_update_verneed.Tpo -c -o gelf_update_verneed.o gelf_update_verneed.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_vernaux.o -MD -MP -MF .deps/gelf_update_vernaux.Tpo -c -o gelf_update_vernaux.o gelf_update_vernaux.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_verdef.o -MD -MP -MF .deps/gelf_update_verdef.Tpo -c -o gelf_update_verdef.o gelf_update_verdef.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getdyn.Tpo .deps/gelf_getdyn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_verdaux.o -MD -MP -MF .deps/gelf_update_verdaux.Tpo -c -o gelf_update_verdaux.o gelf_update_verdaux.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getphdrnum.o -MD -MP -MF .deps/elf_getphdrnum.Tpo -c -o elf_getphdrnum.o elf_getphdrnum.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getshdrnum.o -MD -MP -MF .deps/elf_getshdrnum.Tpo -c -o elf_getshdrnum.o elf_getshdrnum.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getshdrstrndx.o -MD -MP -MF .deps/elf_getshdrstrndx.Tpo -c -o elf_getshdrstrndx.o elf_getshdrstrndx.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_checksum.o -MD -MP -MF .deps/gelf_checksum.Tpo -c -o gelf_checksum.o gelf_checksum.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getsyminfo.Tpo .deps/gelf_getsyminfo.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_checksum.o -MD -MP -MF .deps/elf32_checksum.Tpo -c -o elf32_checksum.o elf32_checksum.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_checksum.o -MD -MP -MF .deps/elf64_checksum.Tpo -c -o elf64_checksum.o elf64_checksum.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT libelf_crc32.o -MD -MP -MF .deps/libelf_crc32.Tpo -c -o libelf_crc32.o libelf_crc32.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT libelf_next_prime.o -MD -MP -MF .deps/libelf_next_prime.Tpo -c -o libelf_next_prime.o libelf_next_prime.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_syminfo.Tpo .deps/gelf_update_syminfo.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_clone.o -MD -MP -MF .deps/elf_clone.Tpo -c -o elf_clone.o elf_clone.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getauxv.Tpo .deps/gelf_getauxv.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getlib.o -MD -MP -MF .deps/gelf_getlib.Tpo -c -o gelf_getlib.o gelf_getlib.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_getshdr.Tpo .deps/elf32_getshdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_dyn.Tpo .deps/gelf_update_dyn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_getshdr.Tpo .deps/elf64_getshdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_update_lib.o -MD -MP -MF .deps/gelf_update_lib.Tpo -c -o gelf_update_lib.o gelf_update_lib.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_offscn.o -MD -MP -MF .deps/elf32_offscn.Tpo -c -o elf32_offscn.o elf32_offscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_offscn.o -MD -MP -MF .deps/elf64_offscn.Tpo -c -o elf64_offscn.o elf64_offscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_xlatetof.Tpo .deps/gelf_xlatetof.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_offscn.o -MD -MP -MF .deps/gelf_offscn.Tpo -c -o gelf_offscn.o gelf_offscn.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_auxv.Tpo .deps/gelf_update_auxv.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_getaroff.o -MD -MP -MF .deps/elf_getaroff.Tpo -c -o elf_getaroff.o elf_getaroff.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_xlatetom.Tpo .deps/gelf_xlatetom.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/libelf_next_prime.Tpo .deps/libelf_next_prime.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_gnu_hash.o -MD -MP -MF .deps/elf_gnu_hash.Tpo -c -o elf_gnu_hash.o elf_gnu_hash.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_scnshndx.o -MD -MP -MF .deps/elf_scnshndx.Tpo -c -o elf_scnshndx.o elf_scnshndx.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getnote.Tpo .deps/gelf_getnote.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf32_getchdr.o -MD -MP -MF .deps/elf32_getchdr.Tpo -c -o elf32_getchdr.o elf32_getchdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/libelf_crc32.Tpo .deps/libelf_crc32.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_checksum.Tpo .deps/gelf_checksum.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf64_getchdr.o -MD -MP -MF .deps/elf64_getchdr.Tpo -c -o elf64_getchdr.o elf64_getchdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT gelf_getchdr.o -MD -MP -MF .deps/gelf_getchdr.Tpo -c -o gelf_getchdr.o gelf_getchdr.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_versym.Tpo .deps/gelf_update_versym.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_compress.o -MD -MP -MF .deps/elf_compress.Tpo -c -o elf_compress.o elf_compress.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getsymshndx.Tpo .deps/gelf_getsymshndx.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_vernaux.Tpo .deps/gelf_update_vernaux.Po Step #48 - "compile-libfuzzer-undefined-x86_64": clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -MT elf_compress_gnu.o -MD -MP -MF .deps/elf_compress_gnu.Tpo -c -o elf_compress_gnu.o elf_compress_gnu.c Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_verdaux.Tpo .deps/gelf_update_verdaux.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getshdrnum.Tpo .deps/elf_getshdrnum.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_verdef.Tpo .deps/gelf_update_verdef.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_verneed.Tpo .deps/gelf_update_verneed.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_version.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_version.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_version.Tpo" `test -f 'elf_version.c' || echo './'`elf_version.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_version.Tpo" >> ".deps/elf_version.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_version.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_version.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_hash.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_hash.Tpo" `test -f 'elf_hash.c' || echo './'`elf_hash.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_hash.Tpo" >> ".deps/elf_hash.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_hash.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_hash.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getdata.Tpo .deps/elf_getdata.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_error.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_error.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_error.Tpo" `test -f 'elf_error.c' || echo './'`elf_error.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_error.Tpo" >> ".deps/elf_error.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_error.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_error.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_fill.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_fill.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_fill.Tpo" `test -f 'elf_fill.c' || echo './'`elf_fill.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_fill.Tpo" >> ".deps/elf_fill.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_fill.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_fill.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_next.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_next.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_next.Tpo" `test -f 'elf_next.c' || echo './'`elf_next.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_next.Tpo" >> ".deps/elf_next.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_next.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_next.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_symshndx.Tpo .deps/gelf_update_symshndx.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_rand.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rand.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_rand.Tpo" `test -f 'elf_rand.c' || echo './'`elf_rand.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_rand.Tpo" >> ".deps/elf_rand.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_rand.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_rand.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_end.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_end.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_end.Tpo" `test -f 'elf_end.c' || echo './'`elf_end.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_end.Tpo" >> ".deps/elf_end.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_end.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_end.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getlib.Tpo .deps/gelf_getlib.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_offscn.Tpo .deps/gelf_offscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_kind.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_kind.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_kind.Tpo" `test -f 'elf_kind.c' || echo './'`elf_kind.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_kind.Tpo" >> ".deps/elf_kind.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_kind.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_kind.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getclass.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getclass.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getclass.Tpo" `test -f 'gelf_getclass.c' || echo './'`gelf_getclass.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getclass.Tpo" >> ".deps/gelf_getclass.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getclass.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getclass.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getaroff.Tpo .deps/elf_getaroff.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_checksum.Tpo .deps/elf64_checksum.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_checksum.Tpo .deps/elf32_checksum.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_update_lib.Tpo .deps/gelf_update_lib.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_clone.Tpo .deps/elf_clone.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getbase.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getbase.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getbase.Tpo" `test -f 'elf_getbase.c' || echo './'`elf_getbase.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getbase.Tpo" >> ".deps/elf_getbase.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getbase.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getbase.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getident.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getident.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getident.Tpo" `test -f 'elf_getident.c' || echo './'`elf_getident.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getident.Tpo" >> ".deps/elf_getident.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getident.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getident.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_scnshndx.Tpo .deps/elf_scnshndx.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_fsize.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_fsize.Tpo" `test -f 'elf32_fsize.c' || echo './'`elf32_fsize.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_fsize.Tpo" >> ".deps/elf32_fsize.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_fsize.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_fsize.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_fsize.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_fsize.Tpo" `test -f 'elf64_fsize.c' || echo './'`elf64_fsize.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_fsize.Tpo" >> ".deps/elf64_fsize.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_fsize.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_fsize.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_fsize.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_fsize.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_fsize.Tpo" `test -f 'gelf_fsize.c' || echo './'`gelf_fsize.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_fsize.Tpo" >> ".deps/gelf_fsize.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_fsize.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_fsize.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_gnu_hash.Tpo .deps/elf_gnu_hash.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_offscn.Tpo .deps/elf64_offscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetof.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_xlatetof.Tpo" `test -f 'elf32_xlatetof.c' || echo './'`elf32_xlatetof.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_xlatetof.Tpo" >> ".deps/elf32_xlatetof.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_xlatetof.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_xlatetof.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_offscn.Tpo .deps/elf32_offscn.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_xlatetom.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_xlatetom.Tpo" `test -f 'elf32_xlatetom.c' || echo './'`elf32_xlatetom.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_xlatetom.Tpo" >> ".deps/elf32_xlatetom.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_xlatetom.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_xlatetom.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetof.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_xlatetof.Tpo" `test -f 'elf64_xlatetof.c' || echo './'`elf64_xlatetof.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_xlatetof.Tpo" >> ".deps/elf64_xlatetof.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_xlatetof.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_xlatetof.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_xlatetom.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_xlatetom.Tpo" `test -f 'elf64_xlatetom.c' || echo './'`elf64_xlatetom.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_xlatetom.Tpo" >> ".deps/elf64_xlatetom.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_xlatetom.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_xlatetom.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getphdrnum.Tpo .deps/elf_getphdrnum.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_getehdr.Tpo" `test -f 'elf32_getehdr.c' || echo './'`elf32_getehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_getehdr.Tpo" >> ".deps/elf32_getehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_getehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_getehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_getchdr.Tpo .deps/elf32_getchdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_getehdr.Tpo" `test -f 'elf64_getehdr.c' || echo './'`elf64_getehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_getehdr.Tpo" >> ".deps/elf64_getehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_getehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_getehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/nlist.Tpo .deps/nlist.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_getshdrstrndx.Tpo .deps/elf_getshdrstrndx.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getehdr.Tpo" `test -f 'gelf_getehdr.c' || echo './'`gelf_getehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getehdr.Tpo" >> ".deps/gelf_getehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_newehdr.Tpo" `test -f 'elf32_newehdr.c' || echo './'`elf32_newehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_newehdr.Tpo" >> ".deps/elf32_newehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_newehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_newehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_getchdr.Tpo .deps/elf64_getchdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_getchdr.Tpo .deps/gelf_getchdr.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_newehdr.Tpo" `test -f 'elf64_newehdr.c' || echo './'`elf64_newehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_newehdr.Tpo" >> ".deps/elf64_newehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_newehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_newehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_newehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_newehdr.Tpo" `test -f 'gelf_newehdr.c' || echo './'`gelf_newehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_newehdr.Tpo" >> ".deps/gelf_newehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_newehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_newehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_ehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_ehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_ehdr.Tpo" `test -f 'gelf_update_ehdr.c' || echo './'`gelf_update_ehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_ehdr.Tpo" >> ".deps/gelf_update_ehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_ehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_ehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_getphdr.Tpo" `test -f 'elf32_getphdr.c' || echo './'`elf32_getphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_getphdr.Tpo" >> ".deps/elf32_getphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_getphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_getphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_getphdr.Tpo" `test -f 'elf64_getphdr.c' || echo './'`elf64_getphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_getphdr.Tpo" >> ".deps/elf64_getphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_getphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_getphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getphdr.Tpo" `test -f 'gelf_getphdr.c' || echo './'`gelf_getphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getphdr.Tpo" >> ".deps/gelf_getphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_newphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_newphdr.Tpo" `test -f 'elf32_newphdr.c' || echo './'`elf32_newphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_newphdr.Tpo" >> ".deps/elf32_newphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_newphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_newphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_newphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_newphdr.Tpo" `test -f 'elf64_newphdr.c' || echo './'`elf64_newphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_newphdr.Tpo" >> ".deps/elf64_newphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_newphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_newphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_newphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_newphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_newphdr.Tpo" `test -f 'gelf_newphdr.c' || echo './'`gelf_newphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_newphdr.Tpo" >> ".deps/gelf_newphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_newphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_newphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_phdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_phdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_phdr.Tpo" `test -f 'gelf_update_phdr.c' || echo './'`gelf_update_phdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_phdr.Tpo" >> ".deps/gelf_update_phdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_phdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_phdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getarhdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarhdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getarhdr.Tpo" `test -f 'elf_getarhdr.c' || echo './'`elf_getarhdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getarhdr.Tpo" >> ".deps/elf_getarhdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getarhdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getarhdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getarsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getarsym.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getarsym.Tpo" `test -f 'elf_getarsym.c' || echo './'`elf_getarsym.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getarsym.Tpo" >> ".deps/elf_getarsym.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getarsym.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getarsym.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_compress_gnu.Tpo .deps/elf_compress_gnu.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_rawfile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawfile.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_rawfile.Tpo" `test -f 'elf_rawfile.c' || echo './'`elf_rawfile.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_rawfile.Tpo" >> ".deps/elf_rawfile.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_rawfile.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_rawfile.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_readall.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_readall.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_readall.Tpo" `test -f 'elf_readall.c' || echo './'`elf_readall.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_readall.Tpo" >> ".deps/elf_readall.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_readall.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_readall.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_cntl.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_cntl.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_cntl.Tpo" `test -f 'elf_cntl.c' || echo './'`elf_cntl.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_cntl.Tpo" >> ".deps/elf_cntl.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_cntl.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_cntl.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getscn.Tpo" `test -f 'elf_getscn.c' || echo './'`elf_getscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getscn.Tpo" >> ".deps/elf_getscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_nextscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_nextscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_nextscn.Tpo" `test -f 'elf_nextscn.c' || echo './'`elf_nextscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_nextscn.Tpo" >> ".deps/elf_nextscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_nextscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_nextscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_ndxscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_ndxscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_ndxscn.Tpo" `test -f 'elf_ndxscn.c' || echo './'`elf_ndxscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_ndxscn.Tpo" >> ".deps/elf_ndxscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_ndxscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_ndxscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_newscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_newscn.Tpo" `test -f 'elf_newscn.c' || echo './'`elf_newscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_newscn.Tpo" >> ".deps/elf_newscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_newscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_newscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getshdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_getshdr.Tpo" `test -f 'elf32_getshdr.c' || echo './'`elf32_getshdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_getshdr.Tpo" >> ".deps/elf32_getshdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_getshdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_getshdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_updatenull.Tpo .deps/elf64_updatenull.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getshdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_getshdr.Tpo" `test -f 'elf64_getshdr.c' || echo './'`elf64_getshdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_getshdr.Tpo" >> ".deps/elf64_getshdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_getshdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_getshdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_updatenull.Tpo .deps/elf32_updatenull.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getshdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getshdr.Tpo" `test -f 'gelf_getshdr.c' || echo './'`gelf_getshdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getshdr.Tpo" >> ".deps/gelf_getshdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getshdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getshdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_shdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_shdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_shdr.Tpo" `test -f 'gelf_update_shdr.c' || echo './'`gelf_update_shdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_shdr.Tpo" >> ".deps/gelf_update_shdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_shdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_shdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_strptr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_strptr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_strptr.Tpo" `test -f 'elf_strptr.c' || echo './'`elf_strptr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_strptr.Tpo" >> ".deps/elf_strptr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_strptr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_strptr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_rawdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_rawdata.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_rawdata.Tpo" `test -f 'elf_rawdata.c' || echo './'`elf_rawdata.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_rawdata.Tpo" >> ".deps/elf_rawdata.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_rawdata.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_rawdata.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getdata.Tpo" `test -f 'elf_getdata.c' || echo './'`elf_getdata.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getdata.Tpo" >> ".deps/elf_getdata.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getdata.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getdata.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_newdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_newdata.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_newdata.Tpo" `test -f 'elf_newdata.c' || echo './'`elf_newdata.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_newdata.Tpo" >> ".deps/elf_newdata.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_newdata.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_newdata.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getdata_rawchunk.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getdata_rawchunk.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getdata_rawchunk.Tpo" `test -f 'elf_getdata_rawchunk.c' || echo './'`elf_getdata_rawchunk.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getdata_rawchunk.Tpo" >> ".deps/elf_getdata_rawchunk.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getdata_rawchunk.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getdata_rawchunk.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_flagelf.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagelf.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_flagelf.Tpo" `test -f 'elf_flagelf.c' || echo './'`elf_flagelf.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_flagelf.Tpo" >> ".deps/elf_flagelf.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_flagelf.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_flagelf.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_flagehdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagehdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_flagehdr.Tpo" `test -f 'elf_flagehdr.c' || echo './'`elf_flagehdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_flagehdr.Tpo" >> ".deps/elf_flagehdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_flagehdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_flagehdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_flagphdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagphdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_flagphdr.Tpo" `test -f 'elf_flagphdr.c' || echo './'`elf_flagphdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_flagphdr.Tpo" >> ".deps/elf_flagphdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_flagphdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_flagphdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_flagscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_flagscn.Tpo" `test -f 'elf_flagscn.c' || echo './'`elf_flagscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_flagscn.Tpo" >> ".deps/elf_flagscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_flagscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_flagscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_flagshdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagshdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_flagshdr.Tpo" `test -f 'elf_flagshdr.c' || echo './'`elf_flagshdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_flagshdr.Tpo" >> ".deps/elf_flagshdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_flagshdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_flagshdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_flagdata.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_flagdata.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_flagdata.Tpo" `test -f 'elf_flagdata.c' || echo './'`elf_flagdata.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_flagdata.Tpo" >> ".deps/elf_flagdata.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_flagdata.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_flagdata.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_memory.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_memory.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_memory.Tpo" `test -f 'elf_memory.c' || echo './'`elf_memory.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_memory.Tpo" >> ".deps/elf_memory.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_memory.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_memory.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_update.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_update.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_update.Tpo" `test -f 'elf_update.c' || echo './'`elf_update.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_update.Tpo" >> ".deps/elf_update.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_update.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_update.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatenull.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_updatenull.Tpo" `test -f 'elf32_updatenull.c' || echo './'`elf32_updatenull.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_updatenull.Tpo" >> ".deps/elf32_updatenull.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_updatenull.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_updatenull.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_updatenull.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatenull.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_updatenull.Tpo" `test -f 'elf64_updatenull.c' || echo './'`elf64_updatenull.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_updatenull.Tpo" >> ".deps/elf64_updatenull.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_updatenull.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_updatenull.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getsym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsym.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getsym.Tpo" `test -f 'gelf_getsym.c' || echo './'`gelf_getsym.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getsym.Tpo" >> ".deps/gelf_getsym.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getsym.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getsym.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_sym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_sym.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_sym.Tpo" `test -f 'gelf_update_sym.c' || echo './'`gelf_update_sym.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_sym.Tpo" >> ".deps/gelf_update_sym.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_sym.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_sym.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getversym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getversym.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getversym.Tpo" `test -f 'gelf_getversym.c' || echo './'`gelf_getversym.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getversym.Tpo" >> ".deps/gelf_getversym.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getversym.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getversym.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_begin.Tpo .deps/elf_begin.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getverneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverneed.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getverneed.Tpo" `test -f 'gelf_getverneed.c' || echo './'`gelf_getverneed.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getverneed.Tpo" >> ".deps/gelf_getverneed.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getverneed.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getverneed.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getvernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getvernaux.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getvernaux.Tpo" `test -f 'gelf_getvernaux.c' || echo './'`gelf_getvernaux.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getvernaux.Tpo" >> ".deps/gelf_getvernaux.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getvernaux.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getvernaux.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getverdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdef.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getverdef.Tpo" `test -f 'gelf_getverdef.c' || echo './'`gelf_getverdef.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getverdef.Tpo" >> ".deps/gelf_getverdef.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getverdef.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getverdef.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getverdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getverdaux.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getverdaux.Tpo" `test -f 'gelf_getverdaux.c' || echo './'`gelf_getverdaux.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getverdaux.Tpo" >> ".deps/gelf_getverdaux.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getverdaux.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getverdaux.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getrel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrel.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getrel.Tpo" `test -f 'gelf_getrel.c' || echo './'`gelf_getrel.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getrel.Tpo" >> ".deps/gelf_getrel.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getrel.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getrel.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getrela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getrela.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getrela.Tpo" `test -f 'gelf_getrela.c' || echo './'`gelf_getrela.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getrela.Tpo" >> ".deps/gelf_getrela.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getrela.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getrela.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf_compress.Tpo .deps/elf_compress.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_rel.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rel.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_rel.Tpo" `test -f 'gelf_update_rel.c' || echo './'`gelf_update_rel.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_rel.Tpo" >> ".deps/gelf_update_rel.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_rel.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_rel.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_rela.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_rela.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_rela.Tpo" `test -f 'gelf_update_rela.c' || echo './'`gelf_update_rela.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_rela.Tpo" >> ".deps/gelf_update_rela.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_rela.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_rela.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getdyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getdyn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getdyn.Tpo" `test -f 'gelf_getdyn.c' || echo './'`gelf_getdyn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getdyn.Tpo" >> ".deps/gelf_getdyn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getdyn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getdyn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_dyn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_dyn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_dyn.Tpo" `test -f 'gelf_update_dyn.c' || echo './'`gelf_update_dyn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_dyn.Tpo" >> ".deps/gelf_update_dyn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_dyn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_dyn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf32_updatefile.Tpo .deps/elf32_updatefile.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getmove.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getmove.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getmove.Tpo" `test -f 'gelf_getmove.c' || echo './'`gelf_getmove.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getmove.Tpo" >> ".deps/gelf_getmove.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getmove.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getmove.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_move.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_move.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_move.Tpo" `test -f 'gelf_update_move.c' || echo './'`gelf_update_move.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_move.Tpo" >> ".deps/gelf_update_move.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_move.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_move.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getsyminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsyminfo.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getsyminfo.Tpo" `test -f 'gelf_getsyminfo.c' || echo './'`gelf_getsyminfo.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getsyminfo.Tpo" >> ".deps/gelf_getsyminfo.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getsyminfo.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getsyminfo.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/elf64_updatefile.Tpo .deps/elf64_updatefile.Po Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_syminfo.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_syminfo.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_syminfo.Tpo" `test -f 'gelf_update_syminfo.c' || echo './'`gelf_update_syminfo.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_syminfo.Tpo" >> ".deps/gelf_update_syminfo.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_syminfo.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_syminfo.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getauxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getauxv.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getauxv.Tpo" `test -f 'gelf_getauxv.c' || echo './'`gelf_getauxv.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getauxv.Tpo" >> ".deps/gelf_getauxv.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getauxv.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getauxv.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_auxv.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_auxv.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_auxv.Tpo" `test -f 'gelf_update_auxv.c' || echo './'`gelf_update_auxv.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_auxv.Tpo" >> ".deps/gelf_update_auxv.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_auxv.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_auxv.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getnote.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getnote.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getnote.Tpo" `test -f 'gelf_getnote.c' || echo './'`gelf_getnote.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getnote.Tpo" >> ".deps/gelf_getnote.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getnote.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getnote.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_xlatetof.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetof.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_xlatetof.Tpo" `test -f 'gelf_xlatetof.c' || echo './'`gelf_xlatetof.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_xlatetof.Tpo" >> ".deps/gelf_xlatetof.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_xlatetof.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_xlatetof.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_xlatetom.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlatetom.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_xlatetom.Tpo" `test -f 'gelf_xlatetom.c' || echo './'`gelf_xlatetom.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_xlatetom.Tpo" >> ".deps/gelf_xlatetom.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_xlatetom.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_xlatetom.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o nlist.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT nlist.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/nlist.Tpo" `test -f 'nlist.c' || echo './'`nlist.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/nlist.Tpo" >> ".deps/nlist.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/nlist.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/nlist.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getsymshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getsymshndx.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getsymshndx.Tpo" `test -f 'gelf_getsymshndx.c' || echo './'`gelf_getsymshndx.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getsymshndx.Tpo" >> ".deps/gelf_getsymshndx.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getsymshndx.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getsymshndx.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_symshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_symshndx.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_symshndx.Tpo" `test -f 'gelf_update_symshndx.c' || echo './'`gelf_update_symshndx.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_symshndx.Tpo" >> ".deps/gelf_update_symshndx.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_symshndx.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_symshndx.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_versym.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_versym.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_versym.Tpo" `test -f 'gelf_update_versym.c' || echo './'`gelf_update_versym.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_versym.Tpo" >> ".deps/gelf_update_versym.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_versym.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_versym.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_verneed.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verneed.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_verneed.Tpo" `test -f 'gelf_update_verneed.c' || echo './'`gelf_update_verneed.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_verneed.Tpo" >> ".deps/gelf_update_verneed.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_verneed.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_verneed.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_vernaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_vernaux.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_vernaux.Tpo" `test -f 'gelf_update_vernaux.c' || echo './'`gelf_update_vernaux.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_vernaux.Tpo" >> ".deps/gelf_update_vernaux.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_vernaux.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_vernaux.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_verdef.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdef.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_verdef.Tpo" `test -f 'gelf_update_verdef.c' || echo './'`gelf_update_verdef.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_verdef.Tpo" >> ".deps/gelf_update_verdef.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_verdef.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_verdef.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_verdaux.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_verdaux.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_verdaux.Tpo" `test -f 'gelf_update_verdaux.c' || echo './'`gelf_update_verdaux.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_verdaux.Tpo" >> ".deps/gelf_update_verdaux.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_verdaux.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_verdaux.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getphdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getphdrnum.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getphdrnum.Tpo" `test -f 'elf_getphdrnum.c' || echo './'`elf_getphdrnum.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getphdrnum.Tpo" >> ".deps/elf_getphdrnum.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getphdrnum.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getphdrnum.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getshdrnum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrnum.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getshdrnum.Tpo" `test -f 'elf_getshdrnum.c' || echo './'`elf_getshdrnum.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getshdrnum.Tpo" >> ".deps/elf_getshdrnum.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getshdrnum.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getshdrnum.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getshdrstrndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getshdrstrndx.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getshdrstrndx.Tpo" `test -f 'elf_getshdrstrndx.c' || echo './'`elf_getshdrstrndx.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getshdrstrndx.Tpo" >> ".deps/elf_getshdrstrndx.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getshdrstrndx.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getshdrstrndx.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_checksum.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_checksum.Tpo" `test -f 'gelf_checksum.c' || echo './'`gelf_checksum.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_checksum.Tpo" >> ".deps/gelf_checksum.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_checksum.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_checksum.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_checksum.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_checksum.Tpo" `test -f 'elf32_checksum.c' || echo './'`elf32_checksum.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_checksum.Tpo" >> ".deps/elf32_checksum.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_checksum.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_checksum.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_checksum.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_checksum.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_checksum.Tpo" `test -f 'elf64_checksum.c' || echo './'`elf64_checksum.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_checksum.Tpo" >> ".deps/elf64_checksum.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_checksum.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_checksum.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o libelf_crc32.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_crc32.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/libelf_crc32.Tpo" `test -f 'libelf_crc32.c' || echo './'`libelf_crc32.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/libelf_crc32.Tpo" >> ".deps/libelf_crc32.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/libelf_crc32.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/libelf_crc32.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o libelf_next_prime.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT libelf_next_prime.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/libelf_next_prime.Tpo" `test -f 'libelf_next_prime.c' || echo './'`libelf_next_prime.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/libelf_next_prime.Tpo" >> ".deps/libelf_next_prime.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/libelf_next_prime.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/libelf_next_prime.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_clone.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_clone.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_clone.Tpo" `test -f 'elf_clone.c' || echo './'`elf_clone.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_clone.Tpo" >> ".deps/elf_clone.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_clone.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_clone.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getlib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getlib.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getlib.Tpo" `test -f 'gelf_getlib.c' || echo './'`gelf_getlib.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getlib.Tpo" >> ".deps/gelf_getlib.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getlib.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getlib.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_update_lib.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_update_lib.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_update_lib.Tpo" `test -f 'gelf_update_lib.c' || echo './'`gelf_update_lib.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_update_lib.Tpo" >> ".deps/gelf_update_lib.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_update_lib.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_update_lib.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_offscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_offscn.Tpo" `test -f 'elf32_offscn.c' || echo './'`elf32_offscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_offscn.Tpo" >> ".deps/elf32_offscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_offscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_offscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_offscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_offscn.Tpo" `test -f 'elf64_offscn.c' || echo './'`elf64_offscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_offscn.Tpo" >> ".deps/elf64_offscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_offscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_offscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_offscn.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_offscn.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_offscn.Tpo" `test -f 'gelf_offscn.c' || echo './'`gelf_offscn.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_offscn.Tpo" >> ".deps/gelf_offscn.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_offscn.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_offscn.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_getaroff.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_getaroff.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_getaroff.Tpo" `test -f 'elf_getaroff.c' || echo './'`elf_getaroff.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_getaroff.Tpo" >> ".deps/elf_getaroff.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_getaroff.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_getaroff.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_gnu_hash.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_gnu_hash.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_gnu_hash.Tpo" `test -f 'elf_gnu_hash.c' || echo './'`elf_gnu_hash.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_gnu_hash.Tpo" >> ".deps/elf_gnu_hash.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_gnu_hash.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_gnu_hash.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_scnshndx.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_scnshndx.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_scnshndx.Tpo" `test -f 'elf_scnshndx.c' || echo './'`elf_scnshndx.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_scnshndx.Tpo" >> ".deps/elf_scnshndx.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_scnshndx.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_scnshndx.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_getchdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_getchdr.Tpo" `test -f 'elf32_getchdr.c' || echo './'`elf32_getchdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_getchdr.Tpo" >> ".deps/elf32_getchdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_getchdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_getchdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_getchdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_getchdr.Tpo" `test -f 'elf64_getchdr.c' || echo './'`elf64_getchdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_getchdr.Tpo" >> ".deps/elf64_getchdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_getchdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_getchdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_getchdr.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_getchdr.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_getchdr.Tpo" `test -f 'gelf_getchdr.c' || echo './'`gelf_getchdr.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_getchdr.Tpo" >> ".deps/gelf_getchdr.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_getchdr.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_getchdr.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_compress.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_compress.Tpo" `test -f 'elf_compress.c' || echo './'`elf_compress.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_compress.Tpo" >> ".deps/elf_compress.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_compress.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_compress.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_compress_gnu.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_compress_gnu.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_compress_gnu.Tpo" `test -f 'elf_compress_gnu.c' || echo './'`elf_compress_gnu.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_compress_gnu.Tpo" >> ".deps/elf_compress_gnu.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_compress_gnu.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_compress_gnu.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf_begin.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf_begin.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf_begin.Tpo" `test -f 'elf_begin.c' || echo './'`elf_begin.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf_begin.Tpo" >> ".deps/elf_begin.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf_begin.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf_begin.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf32_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf32_updatefile.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf32_updatefile.Tpo" `test -f 'elf32_updatefile.c' || echo './'`elf32_updatefile.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf32_updatefile.Tpo" >> ".deps/elf32_updatefile.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf32_updatefile.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf32_updatefile.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o elf64_updatefile.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT elf64_updatefile.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/elf64_updatefile.Tpo" `test -f 'elf64_updatefile.c' || echo './'`elf64_updatefile.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/elf64_updatefile.Tpo" >> ".deps/elf64_updatefile.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/elf64_updatefile.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/elf64_updatefile.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": mv -f .deps/gelf_xlate.Tpo .deps/gelf_xlate.Po Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f libelf.a Step #48 - "compile-libfuzzer-undefined-x86_64": if clang -D_GNU_SOURCE -DHAVE_CONFIG_H -DLOCALEDIR='"/usr/local/share/locale"' -I. -I.. -I. -I. -I../lib -I.. -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -c -o gelf_xlate.os -fPIC -DPIC -DSHARED -DSYMBOL_VERSIONING -MT gelf_xlate.os -MD -MP \ Step #48 - "compile-libfuzzer-undefined-x86_64": -MF ".deps/gelf_xlate.Tpo" `test -f 'gelf_xlate.c' || echo './'`gelf_xlate.c; \ Step #48 - "compile-libfuzzer-undefined-x86_64": then cat ".deps/gelf_xlate.Tpo" >> ".deps/gelf_xlate.Po"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f ".deps/gelf_xlate.Tpo"; \ Step #48 - "compile-libfuzzer-undefined-x86_64": else rm -f ".deps/gelf_xlate.Tpo"; exit 1; \ Step #48 - "compile-libfuzzer-undefined-x86_64": fi Step #48 - "compile-libfuzzer-undefined-x86_64": ar cr libelf.a elf_version.o elf_hash.o elf_error.o elf_fill.o elf_begin.o elf_next.o elf_rand.o elf_end.o elf_kind.o gelf_getclass.o elf_getbase.o elf_getident.o elf32_fsize.o elf64_fsize.o gelf_fsize.o elf32_xlatetof.o elf32_xlatetom.o elf64_xlatetof.o elf64_xlatetom.o gelf_xlate.o elf32_getehdr.o elf64_getehdr.o gelf_getehdr.o elf32_newehdr.o elf64_newehdr.o gelf_newehdr.o gelf_update_ehdr.o elf32_getphdr.o elf64_getphdr.o gelf_getphdr.o elf32_newphdr.o elf64_newphdr.o gelf_newphdr.o gelf_update_phdr.o elf_getarhdr.o elf_getarsym.o elf_rawfile.o elf_readall.o elf_cntl.o elf_getscn.o elf_nextscn.o elf_ndxscn.o elf_newscn.o elf32_getshdr.o elf64_getshdr.o gelf_getshdr.o gelf_update_shdr.o elf_strptr.o elf_rawdata.o elf_getdata.o elf_newdata.o elf_getdata_rawchunk.o elf_flagelf.o elf_flagehdr.o elf_flagphdr.o elf_flagscn.o elf_flagshdr.o elf_flagdata.o elf_memory.o elf_update.o elf32_updatenull.o elf64_updatenull.o elf32_updatefile.o elf64_updatefile.o gelf_getsym.o gelf_update_sym.o gelf_getversym.o gelf_getverneed.o gelf_getvernaux.o gelf_getverdef.o gelf_getverdaux.o gelf_getrel.o gelf_getrela.o gelf_update_rel.o gelf_update_rela.o gelf_getdyn.o gelf_update_dyn.o gelf_getmove.o gelf_update_move.o gelf_getsyminfo.o gelf_update_syminfo.o gelf_getauxv.o gelf_update_auxv.o gelf_getnote.o gelf_xlatetof.o gelf_xlatetom.o nlist.o gelf_getsymshndx.o gelf_update_symshndx.o gelf_update_versym.o gelf_update_verneed.o gelf_update_vernaux.o gelf_update_verdef.o gelf_update_verdaux.o elf_getphdrnum.o elf_getshdrnum.o elf_getshdrstrndx.o gelf_checksum.o elf32_checksum.o elf64_checksum.o libelf_crc32.o libelf_next_prime.o elf_clone.o gelf_getlib.o gelf_update_lib.o elf32_offscn.o elf64_offscn.o gelf_offscn.o elf_getaroff.o elf_gnu_hash.o elf_scnshndx.o elf32_getchdr.o elf64_getchdr.o gelf_getchdr.o elf_compress.o elf_compress_gnu.o Step #48 - "compile-libfuzzer-undefined-x86_64": ranlib libelf.a Step #48 - "compile-libfuzzer-undefined-x86_64": rm -f libelf_pic.a Step #48 - "compile-libfuzzer-undefined-x86_64": ar cr libelf_pic.a elf_version.os elf_hash.os elf_error.os elf_fill.os elf_begin.os elf_next.os elf_rand.os elf_end.os elf_kind.os gelf_getclass.os elf_getbase.os elf_getident.os elf32_fsize.os elf64_fsize.os gelf_fsize.os elf32_xlatetof.os elf32_xlatetom.os elf64_xlatetof.os elf64_xlatetom.os gelf_xlate.os elf32_getehdr.os elf64_getehdr.os gelf_getehdr.os elf32_newehdr.os elf64_newehdr.os gelf_newehdr.os gelf_update_ehdr.os elf32_getphdr.os elf64_getphdr.os gelf_getphdr.os elf32_newphdr.os elf64_newphdr.os gelf_newphdr.os gelf_update_phdr.os elf_getarhdr.os elf_getarsym.os elf_rawfile.os elf_readall.os elf_cntl.os elf_getscn.os elf_nextscn.os elf_ndxscn.os elf_newscn.os elf32_getshdr.os elf64_getshdr.os gelf_getshdr.os gelf_update_shdr.os elf_strptr.os elf_rawdata.os elf_getdata.os elf_newdata.os elf_getdata_rawchunk.os elf_flagelf.os elf_flagehdr.os elf_flagphdr.os elf_flagscn.os elf_flagshdr.os elf_flagdata.os elf_memory.os elf_update.os elf32_updatenull.os elf64_updatenull.os elf32_updatefile.os elf64_updatefile.os gelf_getsym.os gelf_update_sym.os gelf_getversym.os gelf_getverneed.os gelf_getvernaux.os gelf_getverdef.os gelf_getverdaux.os gelf_getrel.os gelf_getrela.os gelf_update_rel.os gelf_update_rela.os gelf_getdyn.os gelf_update_dyn.os gelf_getmove.os gelf_update_move.os gelf_getsyminfo.os gelf_update_syminfo.os gelf_getauxv.os gelf_update_auxv.os gelf_getnote.os gelf_xlatetof.os gelf_xlatetom.os nlist.os gelf_getsymshndx.os gelf_update_symshndx.os gelf_update_versym.os gelf_update_verneed.os gelf_update_vernaux.os gelf_update_verdef.os gelf_update_verdaux.os elf_getphdrnum.os elf_getshdrnum.os elf_getshdrstrndx.os gelf_checksum.os elf32_checksum.os elf64_checksum.os libelf_crc32.os libelf_next_prime.os elf_clone.os gelf_getlib.os gelf_update_lib.os elf32_offscn.os elf64_offscn.os gelf_offscn.os elf_getaroff.os elf_gnu_hash.os elf_scnshndx.os elf32_getchdr.os elf64_getchdr.os gelf_getchdr.os elf_compress.os elf_compress_gnu.os Step #48 - "compile-libfuzzer-undefined-x86_64": ranlib libelf_pic.a Step #48 - "compile-libfuzzer-undefined-x86_64": clang -std=gnu99 -Wall -Wshadow -Wformat=2 -Wold-style-definition -Wstrict-prototypes -Wnull-dereference -Wimplicit-fallthrough -Werror -Wunused -Wextra -D_FORTIFY_SOURCE=3 -Wno-error -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -fno-addrsig -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -Wl,--build-id -o libelf.so -shared -Wl,-z,relro -o libelf.so \ Step #48 - "compile-libfuzzer-undefined-x86_64": -Wl,--soname,libelf.so.1 \ Step #48 - "compile-libfuzzer-undefined-x86_64": -Wl,--version-script,libelf.map \ Step #48 - "compile-libfuzzer-undefined-x86_64": \ Step #48 - "compile-libfuzzer-undefined-x86_64": -Wl,--whole-archive libelf_pic.a -Wl,--no-whole-archive \ Step #48 - "compile-libfuzzer-undefined-x86_64": ../lib/libeu.a -lz Step #48 - "compile-libfuzzer-undefined-x86_64": ln -fs libelf.so libelf.so.1 Step #48 - "compile-libfuzzer-undefined-x86_64": make: Leaving directory '/src/libbpf/elfutils/libelf' Step #48 - "compile-libfuzzer-undefined-x86_64": + make -C src BUILD_STATIC_ONLY=y V=1 clean Step #48 - "compile-libfuzzer-undefined-x86_64": make: Entering directory '/src/libbpf/src' Step #48 - "compile-libfuzzer-undefined-x86_64": Package libelf was not found in the pkg-config search path. Step #48 - "compile-libfuzzer-undefined-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #48 - "compile-libfuzzer-undefined-x86_64": to the PKG_CONFIG_PATH environment variable Step #48 - "compile-libfuzzer-undefined-x86_64": No package 'libelf' found Step #48 - "compile-libfuzzer-undefined-x86_64": rm -rf *.o *.a *.so *.so.* *.pc ./sharedobjs ./staticobjs Step #48 - "compile-libfuzzer-undefined-x86_64": make: Leaving directory '/src/libbpf/src' Step #48 - "compile-libfuzzer-undefined-x86_64": ++ nproc Step #48 - "compile-libfuzzer-undefined-x86_64": ++ pwd Step #48 - "compile-libfuzzer-undefined-x86_64": + make -C src -j32 'CFLAGS=-I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment' BUILD_STATIC_ONLY=y V=1 Step #48 - "compile-libfuzzer-undefined-x86_64": make: Entering directory '/src/libbpf/src' Step #48 - "compile-libfuzzer-undefined-x86_64": Package libelf was not found in the pkg-config search path. Step #48 - "compile-libfuzzer-undefined-x86_64": Perhaps you should add the directory containing `libelf.pc' Step #48 - "compile-libfuzzer-undefined-x86_64": to the PKG_CONFIG_PATH environment variable Step #48 - "compile-libfuzzer-undefined-x86_64": No package 'libelf' found Step #48 - "compile-libfuzzer-undefined-x86_64": mkdir -p staticobjs Step #48 - "compile-libfuzzer-undefined-x86_64": sed -e "s|@PREFIX@|/usr|" \ Step #48 - "compile-libfuzzer-undefined-x86_64": -e "s|@LIBDIR@|$\{prefix\}/lib64|" \ Step #48 - "compile-libfuzzer-undefined-x86_64": -e "s|@VERSION@|1.4.0|" \ Step #48 - "compile-libfuzzer-undefined-x86_64": < libbpf.pc.template > libbpf.pc Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf.c -o staticobjs/bpf.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf.c -o staticobjs/btf.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf.c -o staticobjs/libbpf.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_errno.c -o staticobjs/libbpf_errno.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c netlink.c -o staticobjs/netlink.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c nlattr.c -o staticobjs/nlattr.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c str_error.c -o staticobjs/str_error.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c libbpf_probes.c -o staticobjs/libbpf_probes.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c bpf_prog_linfo.c -o staticobjs/bpf_prog_linfo.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c btf_dump.c -o staticobjs/btf_dump.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c hashmap.c -o staticobjs/hashmap.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c ringbuf.c -o staticobjs/ringbuf.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c strset.c -o staticobjs/strset.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c linker.c -o staticobjs/linker.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c gen_loader.c -o staticobjs/gen_loader.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c relo_core.c -o staticobjs/relo_core.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c usdt.c -o staticobjs/usdt.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c zip.c -o staticobjs/zip.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c elf.c -o staticobjs/elf.o Step #48 - "compile-libfuzzer-undefined-x86_64": clang -I. -I../include -I../include/uapi -I/src/libbpf/elfutils/libelf -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wno-unknown-warning-option -Wno-format-overflow -c features.c -o staticobjs/features.o Step #48 - "compile-libfuzzer-undefined-x86_64": ar rcs libbpf.a staticobjs/bpf.o staticobjs/btf.o staticobjs/libbpf.o staticobjs/libbpf_errno.o staticobjs/netlink.o staticobjs/nlattr.o staticobjs/str_error.o staticobjs/libbpf_probes.o staticobjs/bpf_prog_linfo.o staticobjs/btf_dump.o staticobjs/hashmap.o staticobjs/ringbuf.o staticobjs/strset.o staticobjs/linker.o staticobjs/gen_loader.o staticobjs/relo_core.o staticobjs/usdt.o staticobjs/zip.o staticobjs/elf.o staticobjs/features.o Step #48 - "compile-libfuzzer-undefined-x86_64": make: Leaving directory '/src/libbpf/src' Step #48 - "compile-libfuzzer-undefined-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fsanitize=alignment -fno-sanitize-recover=alignment -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o Step #48 - "compile-libfuzzer-undefined-x86_64": ++ pwd Step #48 - "compile-libfuzzer-undefined-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=alignment -fno-sanitize-recover=alignment -fsanitize=fuzzer bpf-object-fuzzer.o src/libbpf.a /src/libbpf/elfutils/libelf/libelf.a -l:libz.a -o /workspace/out/libfuzzer-undefined-x86_64/bpf-object-fuzzer Step #48 - "compile-libfuzzer-undefined-x86_64": + cp fuzz/bpf-object-fuzzer_seed_corpus.zip /workspace/out/libfuzzer-undefined-x86_64 Finished Step #48 - "compile-libfuzzer-undefined-x86_64" Starting Step #49 - "build-check-libfuzzer-undefined-x86_64" Step #49 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #49 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprz3r3cm7/bpf-object-fuzzer Finished Step #49 - "build-check-libfuzzer-undefined-x86_64" Starting Step #50 Step #50: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #50 Starting Step #51 Step #51: Already have image: gcr.io/oss-fuzz/libbpf Step #51: adding: bpf-object-fuzzer (deflated 63%) Step #51: adding: bpf-object-fuzzer_seed_corpus.zip (stored 0%) Step #51: adding: llvm-symbolizer (deflated 64%) Finished Step #51 Starting Step #52 Step #52: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #52: % Total % Received % Xferd Average Speed Time Time Time Current Step #52: Dload Upload Total Spent Left Speed Step #52: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 147 0 0 100 147 0 658 --:--:-- --:--:-- --:--:-- 659 Finished Step #52 Starting Step #53 Step #53: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #53: % Total % Received % Xferd Average Speed Time Time Time Current Step #53: Dload Upload Total Spent Left Speed Step #53: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3687k 0 0 100 3687k 0 17.5M --:--:-- --:--:-- --:--:-- 17.5M 100 3687k 0 0 100 3687k 0 13.8M --:--:-- --:--:-- --:--:-- 13.7M Finished Step #53 Starting Step #54 Step #54: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #54: % Total % Received % Xferd Average Speed Time Time Time Current Step #54: Dload Upload Total Spent Left Speed Step #54: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 18 0 0 100 18 0 63 --:--:-- --:--:-- --:--:-- 63 100 18 0 0 100 18 0 63 --:--:-- --:--:-- --:--:-- 63 Finished Step #54 Starting Step #55 Step #55: Already have image (with digest): gcr.io/cloud-builders/curl Step #55: % Total % Received % Xferd Average Speed Time Time Time Current Step #55: Dload Upload Total Spent Left Speed Step #55: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 142 --:--:-- --:--:-- --:--:-- 142 Finished Step #55 Starting Step #56 Step #56: Already have image: gcr.io/oss-fuzz/libbpf Finished Step #56 PUSH DONE