starting build "c05062a2-e7a7-40d9-bb8d-68314886d72f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: c1110612ab5c: Pulling fs layer Step #1: 0cb138318394: Pulling fs layer Step #1: 9e49ee1c0767: Pulling fs layer Step #1: fec8451352a8: Pulling fs layer Step #1: 9063b2755245: Pulling fs layer Step #1: 5d88a6a19172: Pulling fs layer Step #1: 3f8b595d0235: Pulling fs layer Step #1: 609a6dde6b9b: Pulling fs layer Step #1: 44ff2df63977: Pulling fs layer Step #1: e4f8feeeabe4: Pulling fs layer Step #1: 4e089de75b67: Pulling fs layer Step #1: 3381d66d44c9: Pulling fs layer Step #1: cf45fc109dc5: Pulling fs layer Step #1: b0614582a521: Pulling fs layer Step #1: 43e5ab503faf: Pulling fs layer Step #1: c9e5a6c7b75e: Pulling fs layer Step #1: 4ab734ebd70b: Pulling fs layer Step #1: 6757e13785e6: Pulling fs layer Step #1: 79e116aa721c: Pulling fs layer Step #1: 846c0d07edde: Pulling fs layer Step #1: 1a0365f39d62: Pulling fs layer Step #1: af0ef8e0b4d9: Pulling fs layer Step #1: b3c95de82333: Pulling fs layer Step #1: 0d807b056298: Pulling fs layer Step #1: 3f2f3c535acb: Pulling fs layer Step #1: 8024b8280ca9: Pulling fs layer Step #1: e836745bf438: Pulling fs layer Step #1: 80520ac3f04f: Pulling fs layer Step #1: 9e49ee1c0767: Waiting Step #1: 5d88a6a19172: Waiting Step #1: 97c8dbfd947c: Pulling fs layer Step #1: d06c95b000a6: Pulling fs layer Step #1: fec8451352a8: Waiting Step #1: 3f8b595d0235: Waiting Step #1: 72433a0b6dc0: Pulling fs layer Step #1: 609a6dde6b9b: Waiting Step #1: b0614582a521: Waiting Step #1: 44ff2df63977: Waiting Step #1: e4f8feeeabe4: Waiting Step #1: 43e5ab503faf: Waiting Step #1: af0ef8e0b4d9: Waiting Step #1: 4e089de75b67: Waiting Step #1: b3c95de82333: Waiting Step #1: 0d807b056298: Waiting Step #1: c9e5a6c7b75e: Waiting Step #1: 3381d66d44c9: Waiting Step #1: 3f2f3c535acb: Waiting Step #1: 9063b2755245: Waiting Step #1: cf45fc109dc5: Waiting Step #1: 8024b8280ca9: Waiting Step #1: d06c95b000a6: Waiting Step #1: e836745bf438: Waiting Step #1: 6757e13785e6: Waiting Step #1: 72433a0b6dc0: Waiting Step #1: 80520ac3f04f: Waiting Step #1: 79e116aa721c: Waiting Step #1: 4ab734ebd70b: Waiting Step #1: 846c0d07edde: Waiting Step #1: 1a0365f39d62: Waiting Step #1: 0cb138318394: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: fec8451352a8: Verifying Checksum Step #1: fec8451352a8: Download complete Step #1: 9e49ee1c0767: Verifying Checksum Step #1: 9e49ee1c0767: Download complete Step #1: 9063b2755245: Download complete Step #1: 3f8b595d0235: Download complete Step #1: c1110612ab5c: Download complete Step #1: 609a6dde6b9b: Verifying Checksum Step #1: 609a6dde6b9b: Download complete Step #1: b549f31133a9: Pull complete Step #1: e4f8feeeabe4: Verifying Checksum Step #1: e4f8feeeabe4: Download complete Step #1: 4e089de75b67: Verifying Checksum Step #1: 4e089de75b67: Download complete Step #1: 3381d66d44c9: Verifying Checksum Step #1: 3381d66d44c9: Download complete Step #1: cf45fc109dc5: Verifying Checksum Step #1: cf45fc109dc5: Download complete Step #1: b0614582a521: Verifying Checksum Step #1: b0614582a521: Download complete Step #1: 43e5ab503faf: Verifying Checksum Step #1: 43e5ab503faf: Download complete Step #1: 44ff2df63977: Verifying Checksum Step #1: 44ff2df63977: Download complete Step #1: c9e5a6c7b75e: Verifying Checksum Step #1: c9e5a6c7b75e: Download complete Step #1: 4ab734ebd70b: Verifying Checksum Step #1: 4ab734ebd70b: Download complete Step #1: 6757e13785e6: Verifying Checksum Step #1: 6757e13785e6: Download complete Step #1: 79e116aa721c: Verifying Checksum Step #1: 79e116aa721c: Download complete Step #1: 846c0d07edde: Verifying Checksum Step #1: 846c0d07edde: Download complete Step #1: af0ef8e0b4d9: Verifying Checksum Step #1: af0ef8e0b4d9: Download complete Step #1: 1a0365f39d62: Verifying Checksum Step #1: 1a0365f39d62: Download complete Step #1: b3c95de82333: Verifying Checksum Step #1: b3c95de82333: Download complete Step #1: 5d88a6a19172: Verifying Checksum Step #1: 5d88a6a19172: Download complete Step #1: 0d807b056298: Verifying Checksum Step #1: 0d807b056298: Download complete Step #1: 3f2f3c535acb: Verifying Checksum Step #1: 3f2f3c535acb: Download complete Step #1: 8024b8280ca9: Verifying Checksum Step #1: 8024b8280ca9: Download complete Step #1: e836745bf438: Verifying Checksum Step #1: e836745bf438: Download complete Step #1: 97c8dbfd947c: Download complete Step #1: 80520ac3f04f: Verifying Checksum Step #1: 80520ac3f04f: Download complete Step #1: d06c95b000a6: Verifying Checksum Step #1: d06c95b000a6: Download complete Step #1: 72433a0b6dc0: Verifying Checksum Step #1: 72433a0b6dc0: Download complete Step #1: c1110612ab5c: Pull complete Step #1: 0cb138318394: Pull complete Step #1: 9e49ee1c0767: Pull complete Step #1: fec8451352a8: Pull complete Step #1: 9063b2755245: Pull complete Step #1: 5d88a6a19172: Pull complete Step #1: 3f8b595d0235: Pull complete Step #1: 609a6dde6b9b: Pull complete Step #1: 44ff2df63977: Pull complete Step #1: e4f8feeeabe4: Pull complete Step #1: 4e089de75b67: Pull complete Step #1: 3381d66d44c9: Pull complete Step #1: cf45fc109dc5: Pull complete Step #1: b0614582a521: Pull complete Step #1: 43e5ab503faf: Pull complete Step #1: c9e5a6c7b75e: Pull complete Step #1: 4ab734ebd70b: Pull complete Step #1: 6757e13785e6: Pull complete Step #1: 79e116aa721c: Pull complete Step #1: 846c0d07edde: Pull complete Step #1: 1a0365f39d62: Pull complete Step #1: af0ef8e0b4d9: Pull complete Step #1: b3c95de82333: Pull complete Step #1: 0d807b056298: Pull complete Step #1: 3f2f3c535acb: Pull complete Step #1: 8024b8280ca9: Pull complete Step #1: e836745bf438: Pull complete Step #1: 80520ac3f04f: Pull complete Step #1: 97c8dbfd947c: Pull complete Step #1: d06c95b000a6: Pull complete Step #1: 72433a0b6dc0: Pull complete Step #1: Digest: sha256:77383566f364fe11c21bf6b476e48028b816b71bd8ec45b20e612099bca3193f Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 7de28940c9b7 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y automake autoconf make libtool pkg-config bison flex Step #1: ---> Running in ca7666ba37f7 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (224 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libfl-dev libfl2 libglib2.0-0 libglib2.0-data libicu66 Step #1: libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2 libxml2 m4 Step #1: shared-mime-info xdg-user-dirs Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext bison-doc flex-doc Step #1: libtool-doc gfortran | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev bison file flex libfl-dev libfl2 Step #1: libglib2.0-0 libglib2.0-data libicu66 libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 libsigsegv2 libtool libxml2 m4 pkg-config shared-mime-info Step #1: xdg-user-dirs Step #1: 0 upgraded, 22 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 13.7 MB of archives. Step #1: After this operation, 59.2 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 flex amd64 2.6.4-6.2 [317 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.7 [1289 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.7 [5944 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/main amd64 bison amd64 2:3.5.1+dfsg-1 [657 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/main amd64 libfl2 amd64 2.6.4-6.2 [11.5 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libfl-dev amd64 2.6.4-6.2 [6316 B] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 13.7 MB in 0s (28.1 MB/s) Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../01-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package flex. Step #1: Preparing to unpack .../02-flex_2.6.4-6.2_amd64.deb ... Step #1: Unpacking flex (2.6.4-6.2) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../03-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../04-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../05-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../06-libglib2.0-0_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../07-libglib2.0-data_2.64.6-1~ubuntu20.04.7_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../08-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../09-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../10-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../11-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../12-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../13-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../14-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package bison. Step #1: Preparing to unpack .../15-bison_2%3a3.5.1+dfsg-1_amd64.deb ... Step #1: Unpacking bison (2:3.5.1+dfsg-1) ... Step #1: Selecting previously unselected package libfl2:amd64. Step #1: Preparing to unpack .../16-libfl2_2.6.4-6.2_amd64.deb ... Step #1: Unpacking libfl2:amd64 (2.6.4-6.2) ... Step #1: Selecting previously unselected package libfl-dev:amd64. Step #1: Preparing to unpack .../17-libfl-dev_2.6.4-6.2_amd64.deb ... Step #1: Unpacking libfl-dev:amd64 (2.6.4-6.2) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../18-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../19-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../20-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../21-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libfl2:amd64 (2.6.4-6.2) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up bison (2:3.5.1+dfsg-1) ... Step #1: update-alternatives: using /usr/bin/bison.yacc to provide /usr/bin/yacc (yacc) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/yacc.1.gz because associated file /usr/share/man/man1/bison.yacc.1.gz (of link group yacc) doesn't exist Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up flex (2.6.4-6.2) ... Step #1: Setting up libfl-dev:amd64 (2.6.4-6.2) ... Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container ca7666ba37f7 Step #1: ---> e3850bfc6cfa Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/VirusTotal/yara.git Step #1: ---> Running in d978d55a2ff6 Step #1: Cloning into 'yara'... Step #1: Removing intermediate container d978d55a2ff6 Step #1: ---> 7b39bedffa60 Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> 1440fd9ffbe3 Step #1: Step 5/5 : WORKDIR yara Step #1: ---> Running in 925f64ff2b3e Step #1: Removing intermediate container 925f64ff2b3e Step #1: ---> e9e5b23675ce Step #1: Successfully built e9e5b23675ce Step #1: Successfully tagged gcr.io/oss-fuzz/yara:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/yara Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filePWqfxM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/yara/.git Step #2 - "srcmap": + GIT_DIR=/src/yara Step #2 - "srcmap": + cd /src/yara Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/VirusTotal/yara.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=548ba3d9c860e7b6c7286cbcf1f7e429cffe99f4 Step #2 - "srcmap": + jq_inplace /tmp/filePWqfxM '."/src/yara" = { type: "git", url: "https://github.com/VirusTotal/yara.git", rev: "548ba3d9c860e7b6c7286cbcf1f7e429cffe99f4" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileg6X8Fd Step #2 - "srcmap": + cat /tmp/filePWqfxM Step #2 - "srcmap": + jq '."/src/yara" = { type: "git", url: "https://github.com/VirusTotal/yara.git", rev: "548ba3d9c860e7b6c7286cbcf1f7e429cffe99f4" }' Step #2 - "srcmap": + mv /tmp/fileg6X8Fd /tmp/filePWqfxM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filePWqfxM Step #2 - "srcmap": + rm /tmp/filePWqfxM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/yara": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/VirusTotal/yara.git", Step #2 - "srcmap": "rev": "548ba3d9c860e7b6c7286cbcf1f7e429cffe99f4" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + ./bootstrap.sh Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'build-aux/ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:20: installing 'build-aux/ar-lib' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:20: installing 'build-aux/compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:35: installing 'build-aux/config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:35: installing 'build-aux/config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:8: installing 'build-aux/install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:8: installing 'build-aux/missing' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am: installing 'build-aux/depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac: installing 'build-aux/ylwrap' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing 'build-aux/test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --enable-macho --enable-debug --enable-dex --enable-dotnet --without-crypto Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking the archiver (ar) interface... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C99... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for flex... flex Step #3 - "compile-libfuzzer-coverage-x86_64": checking lex output file root... lex.yy Step #3 - "compile-libfuzzer-coverage-x86_64": checking lex library... -lfl Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether yytext is a pointer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bison... bison -y Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inline... inline Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether byte ordering is bigendian... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether -lc should be explicitly linked in... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for the pthreads library -lpthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether pthreads work without any flags... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #3 - "compile-libfuzzer-coverage-x86_64": checking if more special flags are required for pthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to check for GCC pthread/shared inconsistencies... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether -pthread is sufficient with -shared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for isnan in -lm... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for log2 in -lm... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcpy... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcat... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memmem... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for timegm... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _mkgmtime... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clock_gettime... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdbool.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdbool.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdbool.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking pkg-config is at least version 0.9.0... yes Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: Step #3 - "compile-libfuzzer-coverage-x86_64": ***************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": The dotnet module is enabled by default now. No need to specify Step #3 - "compile-libfuzzer-coverage-x86_64": --enable-dotnet. To disable this module please use Step #3 - "compile-libfuzzer-coverage-x86_64": --disable-dotnet. Step #3 - "compile-libfuzzer-coverage-x86_64": ***************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ***************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find OpenSSL library. Some features in "pe" module Step #3 - "compile-libfuzzer-coverage-x86_64": have been disabled. If you want to enable all features please Step #3 - "compile-libfuzzer-coverage-x86_64": install OpenSSL and run this script again. Step #3 - "compile-libfuzzer-coverage-x86_64": ***************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Microsoft Crypto API... checking for wincrypt.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for MacOSX Common Crypto API... checking CommonCrypto/CommonCrypto.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking CommonCrypto/CommonCrypto.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for CommonCrypto/CommonCrypto.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ***************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find alternative APIs for hash functions. The "hash" Step #3 - "compile-libfuzzer-coverage-x86_64": module has been disabled. Step #3 - "compile-libfuzzer-coverage-x86_64": ***************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating yara.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": + make clean Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f yara yarac Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f test-arena test-alignment test-atoms test-api test-rules test-pe test-elf test-version test-bitmask test-math test-stack test-re-split test-async test-string test-exception test-macho test-dex test-dotnet Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "tests/mapper" || rm -f tests/mapper Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "libyara.la" || rm -f libyara.la Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f ./so_locations Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf .libs _libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/.libs libyara/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/console/.libs libyara/modules/console/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/cuckoo/.libs libyara/modules/cuckoo/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/dex/.libs libyara/modules/dex/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/dotnet/.libs libyara/modules/dotnet/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/elf/.libs libyara/modules/elf/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/hash/.libs libyara/modules/hash/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/macho/.libs libyara/modules/macho/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/magic/.libs libyara/modules/magic/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/math/.libs libyara/modules/math/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/pb_tests/.libs libyara/modules/pb_tests/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/pe/.libs libyara/modules/pe/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/pe/authenticode-parser/.libs libyara/modules/pe/authenticode-parser/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/string/.libs libyara/modules/string/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/tests/.libs libyara/modules/tests/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/modules/time/.libs libyara/modules/time/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/proc/.libs libyara/proc/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf libyara/tlshc/.libs libyara/tlshc/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf tests/.libs tests/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f *.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f cli/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/console/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/console/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/cuckoo/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/cuckoo/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/dex/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/dex/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/dotnet/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/dotnet/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/elf/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/elf/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/hash/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/hash/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/macho/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/macho/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/magic/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/magic/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/math/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/math/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/pb_tests/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/pb_tests/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/pe/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/pe/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/pe/authenticode-parser/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/pe/authenticode-parser/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/string/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/string/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/tests/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/tests/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/time/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/modules/time/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/proc/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/proc/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/tlshc/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libyara/tlshc/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f tests/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "" || rm -f Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "test-arena.log test-alignment.log test-atoms.log test-api.log test-rules.log test-pe.log test-elf.log test-version.log test-bitmask.log test-math.log test-stack.log test-re-split.log test-async.log test-string.log test-exception.log test-macho.log test-dex.log test-dotnet.log" || rm -f test-arena.log test-alignment.log test-atoms.log test-api.log test-rules.log test-pe.log test-elf.log test-version.log test-bitmask.log test-math.log test-stack.log test-re-split.log test-async.log test-string.log test-exception.log test-macho.log test-dex.log test-dotnet.log Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "test-arena.trs test-alignment.trs test-atoms.trs test-api.trs test-rules.trs test-pe.trs test-elf.trs test-version.trs test-bitmask.trs test-math.trs test-stack.trs test-re-split.trs test-async.trs test-string.trs test-exception.trs test-macho.trs test-dex.trs test-dotnet.trs" || rm -f test-arena.trs test-alignment.trs test-atoms.trs test-api.trs test-rules.trs test-pe.trs test-elf.trs test-version.trs test-bitmask.trs test-math.trs test-stack.trs test-re-split.trs test-async.trs test-string.trs test-exception.trs test-macho.trs test-dex.trs test-dotnet.trs Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "test-suite.log" || rm -f test-suite.log Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f *.lo Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 all Step #3 - "compile-libfuzzer-coverage-x86_64": make all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": CC cli/yarac.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC cli/args.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC cli/common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC cli/threading.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC cli/yara.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/tests/la-tests.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/elf/la-elf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/math/la-math.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/pe/la-pe.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/time/la-time.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/pe/la-pe_utils.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/string/la-string.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/console/la-console.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/dotnet/la-dotnet.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/macho/la-macho.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/modules/dex/la-dex.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-grammar.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-arena.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-ahocorasick.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-atoms.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-base64.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-bitmask.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-compiler.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-endian.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-exec.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-exefiles.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-filemap.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-hash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-hex_grammar.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-hex_lexer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-lexer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-libyara.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-mem.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-modules.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-notebook.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-object.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-parser.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-proc.lo Step #3 - "compile-libfuzzer-coverage-x86_64": hex_grammar.c:1012:9: warning: variable 'hex_yynerrs' set but not used [-Wunused-but-set-variable] Step #3 - "compile-libfuzzer-coverage-x86_64": 1012 | int yynerrs = 0; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./libyara/include/yara/hex_lexer.h:52:22: note: expanded from macro 'yynerrs' Step #3 - "compile-libfuzzer-coverage-x86_64": 52 | #define yynerrs hex_yynerrs Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": libyara/grammar.c:1895:9: warning: variable 'yara_yynerrs' set but not used [-Wunused-but-set-variable] Step #3 - "compile-libfuzzer-coverage-x86_64": 1895 | int yynerrs = 0; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./libyara/include/yara/lexer.h:53:22: note: expanded from macro 'yynerrs' Step #3 - "compile-libfuzzer-coverage-x86_64": 53 | #define yynerrs yara_yynerrs Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": libyara/modules/dex/dex.c:579:18: warning: unused variable 'data_cur_start' [-Wunused-variable] Step #3 - "compile-libfuzzer-coverage-x86_64": 579 | const uint8_t* data_cur_start = dex->data + start_offset; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":  CC libyara/la-re.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-re_grammar.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-re_lexer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-rules.lo Step #3 - "compile-libfuzzer-coverage-x86_64": In file included from libyara/modules/elf/elf.c:42: Step #3 - "compile-libfuzzer-coverage-x86_64": ./libyara/include/../exception.h:167:13: warning: unused function 'exception_handler' [-Wunused-function] Step #3 - "compile-libfuzzer-coverage-x86_64": 167 | static void exception_handler(int sig, siginfo_t * info, void *context) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":  CC libyara/la-scan.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-scanner.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-simple_str.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-sizedstr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-stack.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-stopwatch.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-strutils.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-stream.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/tlshc/la-tlsh.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/tlshc/la-tlsh_impl.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/tlshc/la-tlsh_util.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/la-threading.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libyara/proc/la-linux.lo Step #3 - "compile-libfuzzer-coverage-x86_64": re_grammar.c:1021:9: warning: variable 're_yynerrs' set but not used [-Wunused-but-set-variable] Step #3 - "compile-libfuzzer-coverage-x86_64": 1021 | int yynerrs = 0; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./libyara/include/yara/re_lexer.h:52:22: note: expanded from macro 'yynerrs' Step #3 - "compile-libfuzzer-coverage-x86_64": 52 | #define yynerrs re_yynerrs Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libyara.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD yara Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD yarac Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": make install-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c libyara.la '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libyara.so.10.0.0 /usr/local/lib/libyara.so.10.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libyara.so.10.0.0 libyara.so.10 || { rm -f libyara.so.10 && ln -s libyara.so.10.0.0 libyara.so.10; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libyara.so.10.0.0 libyara.so || { rm -f libyara.so && ln -s libyara.so.10.0.0 libyara.so; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libyara.lai /usr/local/lib/libyara.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libyara.a /usr/local/lib/libyara.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libyara.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /usr/local/lib/libyara.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c yara yarac '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/yara /usr/local/bin/yara Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/yarac /usr/local/bin/yarac Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 libyara/include/yara.h '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/man/man1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 'yara.man' '/usr/local/share/man/man1/yara.1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 'yarac.man' '/usr/local/share/man/man1/yarac.1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 yara.pc '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 libyara/include/yara/ahocorasick.h libyara/include/yara/arena.h libyara/include/yara/atoms.h libyara/include/yara/base64.h libyara/include/yara/bitmask.h libyara/include/yara/compiler.h libyara/include/yara/error.h libyara/include/yara/exec.h libyara/include/yara/exefiles.h libyara/include/yara/filemap.h libyara/include/yara/hash.h libyara/include/yara/integers.h libyara/include/yara/libyara.h libyara/include/yara/limits.h libyara/include/yara/mem.h libyara/include/yara/modules.h libyara/include/yara/notebook.h libyara/include/yara/object.h libyara/include/yara/parser.h libyara/include/yara/proc.h libyara/include/yara/re.h libyara/include/yara/rules.h libyara/include/yara/scan.h libyara/include/yara/scanner.h libyara/include/yara/simple_str.h libyara/include/yara/sizedstr.h libyara/include/yara/stack.h libyara/include/yara/stopwatch.h libyara/include/yara/stream.h libyara/include/yara/strutils.h libyara/include/yara/threading.h libyara/include/yara/types.h libyara/include/yara/unaligned.h libyara/include/yara/utils.h '/usr/local/include/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/yara' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /src/yara/tests/oss-fuzz/ -name '*.cc' Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzers='/src/yara/tests/oss-fuzz/elf_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": /src/yara/tests/oss-fuzz/dex_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": /src/yara/tests/oss-fuzz/pe_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": /src/yara/tests/oss-fuzz/rules_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": /src/yara/tests/oss-fuzz/macho_fuzzer.cc' Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .cc /src/yara/tests/oss-fuzz/elf_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=elf_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building elf_fuzzer' Step #3 - "compile-libfuzzer-coverage-x86_64": Building elf_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 -I. /src/yara/tests/oss-fuzz/elf_fuzzer.cc -o /workspace/out/libfuzzer-coverage-x86_64/elf_fuzzer ./.libs/libyara.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d /src/yara/tests/oss-fuzz/elf_fuzzer_corpus ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/elf_fuzzer_seed_corpus.zip /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-03bca75466ee42801a8bff280de04afc3d1a3637 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-086300bbce1c6537573057336a343a82d483e2c0 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-2cafe4de66d87a83d83aaf65d8e4cea48f2c1144 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-370485c5b087f780a2447a03d775f7188e323d31 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-49bb55d669fda0683f945b89396a6bd458caf2d8 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-49d00b6b033eaeb07cd39809dbc1d7ba2df196ec /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-723296cdc1c0dba83ea767d69286429e608c46c3 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-7dc27920ae1cb85333e7f2735a45014488134673 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-7e945ce5f43f515ea078c558a2e3205089d414e5 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-a809561e75b94bd5d4d8cf7488d9e2663fc1ccdc /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-a8715a38a94161c9509309f5dbb5a7936aba8376 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-aee928239444a7b039500d4499035e6d30cb89da /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-c4002396c52065d21fe1c1f05f8937aab8d59c18 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-c610b3036f195ad7fb05248a530278aad37b438d /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-c6569e6e28f0a18bb2f3bf49c982333a359bed67 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-cc6844f44825a785de1b079c88f728e1c0f779fb /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/crash-f1fd008da535b110853885221ebfaac3f262a1c1e280f10929f7b353c44996c8 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/poc-6bf54fca69bb5029676d747b12c74b597dd8c5939343ea8f2cbfea9e666dd6b1 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/poc-789fc6da83de39c3ff394a950b0831f6fe5b63a85a46aaa236048b5c1dcf0e59 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/poc-939e9cd87b0d80834210fbf54edc66341aebf416d7509f6633f1d49766978b22 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/poc-93a9fd1909dd49fc2a9b654333504f249cdac58126d3cfc4728577e78cb3eb89 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/poc-b5b03a1f305b2cc1c158e01fee6c08c65145325d4e073f04d969329577077862 /src/yara/tests/oss-fuzz/elf_fuzzer_corpus/poc-fa8bbacb5a12f057a0ed3999c37d78b4991e6b201bda4dc9a75a7c7970c7690d Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-03bca75466ee42801a8bff280de04afc3d1a3637 (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-086300bbce1c6537573057336a343a82d483e2c0 (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-2cafe4de66d87a83d83aaf65d8e4cea48f2c1144 (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-370485c5b087f780a2447a03d775f7188e323d31 (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-49bb55d669fda0683f945b89396a6bd458caf2d8 (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-49d00b6b033eaeb07cd39809dbc1d7ba2df196ec (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-723296cdc1c0dba83ea767d69286429e608c46c3 (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-7dc27920ae1cb85333e7f2735a45014488134673 (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-7e945ce5f43f515ea078c558a2e3205089d414e5 (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-a809561e75b94bd5d4d8cf7488d9e2663fc1ccdc (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-a8715a38a94161c9509309f5dbb5a7936aba8376 (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-aee928239444a7b039500d4499035e6d30cb89da (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-c4002396c52065d21fe1c1f05f8937aab8d59c18 (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-c610b3036f195ad7fb05248a530278aad37b438d (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-c6569e6e28f0a18bb2f3bf49c982333a359bed67 (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-cc6844f44825a785de1b079c88f728e1c0f779fb (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-f1fd008da535b110853885221ebfaac3f262a1c1e280f10929f7b353c44996c8 (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: poc-6bf54fca69bb5029676d747b12c74b597dd8c5939343ea8f2cbfea9e666dd6b1 (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: poc-789fc6da83de39c3ff394a950b0831f6fe5b63a85a46aaa236048b5c1dcf0e59 (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: poc-939e9cd87b0d80834210fbf54edc66341aebf416d7509f6633f1d49766978b22 (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: poc-93a9fd1909dd49fc2a9b654333504f249cdac58126d3cfc4728577e78cb3eb89 (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: poc-b5b03a1f305b2cc1c158e01fee6c08c65145325d4e073f04d969329577077862 (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: poc-fa8bbacb5a12f057a0ed3999c37d78b4991e6b201bda4dc9a75a7c7970c7690d (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .cc /src/yara/tests/oss-fuzz/dex_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=dex_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building dex_fuzzer' Step #3 - "compile-libfuzzer-coverage-x86_64": Building dex_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 -I. /src/yara/tests/oss-fuzz/dex_fuzzer.cc -o /workspace/out/libfuzzer-coverage-x86_64/dex_fuzzer ./.libs/libyara.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d /src/yara/tests/oss-fuzz/dex_fuzzer_corpus ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/dex_fuzzer_seed_corpus.zip /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/1cf540db2f048bb21bd89379a57279b9ff4c308558715a3baee666a47393d86e /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/25ef27f9543444652f0c68fe412d3da627a1d2a590b0a2b30e47466c1e962136 /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/27fb31059503773723597edb875c937af971a6c15f91aac8c03c1fbdfa9e918c /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/3ba9c082050f62e725c87ce4cf9f592fe9f177faf3a0c879f8fbe87312ca4b2c /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/b1203d95c56f02e7e6dbea714275cc05b47ac2510958b85f436571b801af44e7 /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/b343d1058063e6e4b652ccf0589f93d0dbb6b092960e4aebc3c3c58894831359 /src/yara/tests/oss-fuzz/dex_fuzzer_corpus/crash.poc Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 1cf540db2f048bb21bd89379a57279b9ff4c308558715a3baee666a47393d86e (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 25ef27f9543444652f0c68fe412d3da627a1d2a590b0a2b30e47466c1e962136 (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 27fb31059503773723597edb875c937af971a6c15f91aac8c03c1fbdfa9e918c (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 3ba9c082050f62e725c87ce4cf9f592fe9f177faf3a0c879f8fbe87312ca4b2c (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: b1203d95c56f02e7e6dbea714275cc05b47ac2510958b85f436571b801af44e7 (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: b343d1058063e6e4b652ccf0589f93d0dbb6b092960e4aebc3c3c58894831359 (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash.poc (deflated 96%) Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .cc /src/yara/tests/oss-fuzz/pe_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=pe_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building pe_fuzzer' Step #3 - "compile-libfuzzer-coverage-x86_64": Building pe_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 -I. /src/yara/tests/oss-fuzz/pe_fuzzer.cc -o /workspace/out/libfuzzer-coverage-x86_64/pe_fuzzer ./.libs/libyara.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d /src/yara/tests/oss-fuzz/pe_fuzzer_corpus ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/pe_fuzzer_seed_corpus.zip /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/00388b550a2603a9e219bcb48acaf8cc115653cb1ea84cb4bccceb1aabe755b6 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/12f50a7dbf0c42f61ae1c351b2a9f75e8edb3bb55e582619edc7ece4eb0a3094 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/967af267b4124bada8f507cebf25f2192d146a4d63be71b45bfc03c5da7f21a7 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/99e98cb7096dee974e28fea0f76f1c30bc44fd5762cb12b2702910a28b28f95f /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/clusterfuzz-testcase-minimized-5211130361282560 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/clusterfuzz-testcase-minimized-5839717883969536 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/clusterfuzz-testcase-minimized-pe_fuzzer-5671228022718464 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/clusterfuzz-testcase-minimized-pe_fuzzer-5741846293643264 /src/yara/tests/oss-fuzz/pe_fuzzer_corpus/e5af0352010b1879ac1c63a69d3d9a02d577fa834165f855bd5ebee0f1105de1 Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 00388b550a2603a9e219bcb48acaf8cc115653cb1ea84cb4bccceb1aabe755b6 (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 12f50a7dbf0c42f61ae1c351b2a9f75e8edb3bb55e582619edc7ece4eb0a3094 (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 967af267b4124bada8f507cebf25f2192d146a4d63be71b45bfc03c5da7f21a7 (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 99e98cb7096dee974e28fea0f76f1c30bc44fd5762cb12b2702910a28b28f95f (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-5211130361282560 (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-5839717883969536 (deflated 96%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-pe_fuzzer-5671228022718464 (deflated 100%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-pe_fuzzer-5741846293643264 (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: e5af0352010b1879ac1c63a69d3d9a02d577fa834165f855bd5ebee0f1105de1 (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .cc /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=dotnet_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building dotnet_fuzzer' Step #3 - "compile-libfuzzer-coverage-x86_64": Building dotnet_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 -I. /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc -o /workspace/out/libfuzzer-coverage-x86_64/dotnet_fuzzer ./.libs/libyara.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/dotnet_fuzzer_seed_corpus.zip /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/buggy_stream_names /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/clusterfuzz-testcase-minimized-dotnet_fuzzer-5105966966636544 /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/clusterfuzz-testcase-minimized-dotnet_fuzzer-5195285818507264 /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/clusterfuzz-testcase-minimized-dotnet_fuzzer-5636481138556928 /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/clusterfuzz-testcase-minimized-dotnet_fuzzer-5725060321509376 /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/clusterfuzz-testcase-minimized-dotnet_fuzzer-5880393521430528 /src/yara/tests/oss-fuzz/dotnet_fuzzer_corpus/obfuscated Step #3 - "compile-libfuzzer-coverage-x86_64": adding: buggy_stream_names (deflated 6%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-dotnet_fuzzer-5105966966636544 (deflated 89%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-dotnet_fuzzer-5195285818507264 (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-dotnet_fuzzer-5636481138556928 (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-dotnet_fuzzer-5725060321509376 (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-dotnet_fuzzer-5880393521430528 (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: obfuscated (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .cc /src/yara/tests/oss-fuzz/rules_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=rules_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building rules_fuzzer' Step #3 - "compile-libfuzzer-coverage-x86_64": Building rules_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 -I. /src/yara/tests/oss-fuzz/rules_fuzzer.cc -o /workspace/out/libfuzzer-coverage-x86_64/rules_fuzzer ./.libs/libyara.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d /src/yara/tests/oss-fuzz/rules_fuzzer_corpus ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/rules_fuzzer_seed_corpus.zip /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/1 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/2 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/3 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/4 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/5 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/6 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/7 /src/yara/tests/oss-fuzz/rules_fuzzer_corpus/8 Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 1 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 2 (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 3 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 4 (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 5 (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 6 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 7 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 8 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .cc /src/yara/tests/oss-fuzz/macho_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=macho_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building macho_fuzzer' Step #3 - "compile-libfuzzer-coverage-x86_64": Building macho_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 -I. /src/yara/tests/oss-fuzz/macho_fuzzer.cc -o /workspace/out/libfuzzer-coverage-x86_64/macho_fuzzer ./.libs/libyara.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d /src/yara/tests/oss-fuzz/macho_fuzzer_corpus ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/macho_fuzzer_seed_corpus.zip /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/1443c3cfb47c5eb41022a7063c24ab1bc9e45bfc31e98d5e6d3aa8377599b983 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/589f7b0e30d885ed91229646e58ccc7615007d2fab06451fef8785c6126adba7 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/5eefacbe52990526e4953802249447dd8c0a4b537459ca41e005a7173ca46138 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/6164a837fd33574f37464a765ab461fff94b52e659b114fb6109f2635678c564 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/66528aeb35dd705cc26a7daf4b8eda684f620efebfa0740fab84043e371ed566 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/678d89b32eecd7d01390aaaf3507935b27854f4f3a7055e3f6b1b0ccf0ca5072 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/6af5d157184d9144f86668f83e81760898df5db3c9e209596eb5fd9a91a7eeba /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/797d1d450421b771482c0cc03f472e4eccbc9e4f544b6c12c1d4f070dec3c381 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/85494d8cb5753f1ad09be39428135feb35eb4ef44f39d6e1e75e2ad30d93e158 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/b225048e85b14f08a43dd4752b9bb4b20840f5a8726eac0ff765d45c9e619828 /src/yara/tests/oss-fuzz/macho_fuzzer_corpus/fda81421d7403180923717a94e77aade8c9286d5b8de3ae0e2812343b666c6a7 Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 1443c3cfb47c5eb41022a7063c24ab1bc9e45bfc31e98d5e6d3aa8377599b983 (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 589f7b0e30d885ed91229646e58ccc7615007d2fab06451fef8785c6126adba7 (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 5eefacbe52990526e4953802249447dd8c0a4b537459ca41e005a7173ca46138 (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 6164a837fd33574f37464a765ab461fff94b52e659b114fb6109f2635678c564 (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 66528aeb35dd705cc26a7daf4b8eda684f620efebfa0740fab84043e371ed566 (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 678d89b32eecd7d01390aaaf3507935b27854f4f3a7055e3f6b1b0ccf0ca5072 (deflated 1%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 6af5d157184d9144f86668f83e81760898df5db3c9e209596eb5fd9a91a7eeba (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 797d1d450421b771482c0cc03f472e4eccbc9e4f544b6c12c1d4f070dec3c381 (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: 85494d8cb5753f1ad09be39428135feb35eb4ef44f39d6e1e75e2ad30d93e158 (deflated 10%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: b225048e85b14f08a43dd4752b9bb4b20840f5a8726eac0ff765d45c9e619828 (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fda81421d7403180923717a94e77aade8c9286d5b8de3ae0e2812343b666c6a7 (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": + find /src/yara/tests/oss-fuzz -name '*.dict' -exec cp '{}' /workspace/out/libfuzzer-coverage-x86_64 ';' Step #3 - "compile-libfuzzer-coverage-x86_64": + find /src/yara/tests/oss-fuzz -name '*.options' -exec cp '{}' /workspace/out/libfuzzer-coverage-x86_64 ';' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: c1110612ab5c: Already exists Step #4: 0cb138318394: Already exists Step #4: 167fea49d7e8: Pulling fs layer Step #4: be9c8ba2cd21: Pulling fs layer Step #4: 5b1b95cae813: Pulling fs layer Step #4: 32f1af2365be: Pulling fs layer Step #4: 3f100b6efe4d: Pulling fs layer Step #4: 4acbffa414ca: Pulling fs layer Step #4: 9be2211ce234: Pulling fs layer Step #4: 6c7fc219f5cd: Pulling fs layer Step #4: f6d300f98ed1: Pulling fs layer Step #4: db420c681334: Pulling fs layer Step #4: 8d217819e5eb: Pulling fs layer Step #4: 948aeae64cb2: Pulling fs layer Step #4: 2e1baa7773ce: Pulling fs layer Step #4: e068da68486c: Pulling fs layer Step #4: b64e97fc5598: Pulling fs layer Step #4: aa03a9436289: Pulling fs layer Step #4: cb237aa902a3: Pulling fs layer Step #4: 9be2211ce234: Waiting Step #4: 6c7fc219f5cd: Waiting Step #4: f6d300f98ed1: Waiting Step #4: db420c681334: Waiting Step #4: 8d217819e5eb: Waiting Step #4: 948aeae64cb2: Waiting Step #4: 2e1baa7773ce: Waiting Step #4: 32f1af2365be: Waiting Step #4: e068da68486c: Waiting Step #4: cb237aa902a3: Waiting Step #4: b64e97fc5598: Waiting Step #4: aa03a9436289: Waiting Step #4: 3f100b6efe4d: Waiting Step #4: 4acbffa414ca: Waiting Step #4: 167fea49d7e8: Verifying Checksum Step #4: 5b1b95cae813: Download complete Step #4: be9c8ba2cd21: Verifying Checksum Step #4: be9c8ba2cd21: Download complete Step #4: 167fea49d7e8: Pull complete Step #4: 3f100b6efe4d: Verifying Checksum Step #4: 3f100b6efe4d: Download complete Step #4: 4acbffa414ca: Verifying Checksum Step #4: 4acbffa414ca: Download complete Step #4: 9be2211ce234: Verifying Checksum Step #4: 9be2211ce234: Download complete Step #4: be9c8ba2cd21: Pull complete Step #4: 5b1b95cae813: Pull complete Step #4: f6d300f98ed1: Verifying Checksum Step #4: f6d300f98ed1: Download complete Step #4: 6c7fc219f5cd: Verifying Checksum Step #4: 6c7fc219f5cd: Download complete Step #4: 32f1af2365be: Download complete Step #4: 8d217819e5eb: Verifying Checksum Step #4: 8d217819e5eb: Download complete Step #4: 948aeae64cb2: Verifying Checksum Step #4: 948aeae64cb2: Download complete Step #4: 2e1baa7773ce: Verifying Checksum Step #4: 2e1baa7773ce: Download complete Step #4: e068da68486c: Verifying Checksum Step #4: e068da68486c: Download complete Step #4: b64e97fc5598: Verifying Checksum Step #4: b64e97fc5598: Download complete Step #4: aa03a9436289: Verifying Checksum Step #4: aa03a9436289: Download complete Step #4: cb237aa902a3: Verifying Checksum Step #4: cb237aa902a3: Download complete Step #4: db420c681334: Verifying Checksum Step #4: db420c681334: Download complete Step #4: 32f1af2365be: Pull complete Step #4: 3f100b6efe4d: Pull complete Step #4: 4acbffa414ca: Pull complete Step #4: 9be2211ce234: Pull complete Step #4: 6c7fc219f5cd: Pull complete Step #4: f6d300f98ed1: Pull complete Step #4: db420c681334: Pull complete Step #4: 8d217819e5eb: Pull complete Step #4: 948aeae64cb2: Pull complete Step #4: 2e1baa7773ce: Pull complete Step #4: e068da68486c: Pull complete Step #4: b64e97fc5598: Pull complete Step #4: aa03a9436289: Pull complete Step #4: cb237aa902a3: Pull complete Step #4: Digest: sha256:62be9a60faa0151c33ff65d4b2515cb37b746b9b80650fcebc297af83c561e4e Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/dex_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/dex_fuzzer.zip or Step #5: /corpus/dex_fuzzer.zip.zip, and cannot find /corpus/dex_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for dex_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/dotnet_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/dotnet_fuzzer.zip or Step #5: /corpus/dotnet_fuzzer.zip.zip, and cannot find /corpus/dotnet_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for dotnet_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/elf_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/elf_fuzzer.zip or Step #5: /corpus/elf_fuzzer.zip.zip, and cannot find /corpus/elf_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for elf_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/macho_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/macho_fuzzer.zip or Step #5: /corpus/macho_fuzzer.zip.zip, and cannot find /corpus/macho_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for macho_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/pe_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/pe_fuzzer.zip or Step #5: /corpus/pe_fuzzer.zip.zip, and cannot find /corpus/pe_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for pe_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/rules_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/rules_fuzzer.zip or Step #5: /corpus/rules_fuzzer.zip.zip, and cannot find /corpus/rules_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for rules_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image yara Step #5: python infra/helper.py build_fuzzers --sanitizer coverage yara Step #5: python infra/helper.py coverage yara Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1