D: [iurt_root_command] chroot Building target platforms: x86_64 Building for target x86_64 Installing /home/pterjan/rpmbuild/SRPMS/webef-0.3.2-13.mga10.src.rpm Executing(%mkbuilddir): /bin/sh -e /home/pterjan/rpmbuild/tmp/rpm-tmp.B8Oboa Executing(%prep): /bin/sh -e /home/pterjan/rpmbuild/tmp/rpm-tmp.Vzn6kO + umask 022 + cd /home/pterjan/rpmbuild/BUILD/webef-0.3.2-build + '[' 1 -eq 1 ']' + '[' 1 -eq 1 ']' + '[' 1 -eq 1 ']' + cd /home/pterjan/rpmbuild/BUILD/webef-0.3.2-build + rm -rf webef-0.3.2 + /usr/lib/rpm/rpmuncompress -x /home/pterjan/rpmbuild/SOURCES/webef-0.3.2.tar.gz + STATUS=0 + '[' 0 -ne 0 ']' + cd webef-0.3.2 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/lib/rpm/rpmuncompress /home/pterjan/rpmbuild/SOURCES/webef-0.3.2-openssl11.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /home/pterjan/rpmbuild/tmp/rpm-tmp.Z388Ei + umask 022 + cd /home/pterjan/rpmbuild/BUILD/webef-0.3.2-build + CFLAGS='-O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full' + export CFLAGS + CXXFLAGS='-O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full' + export CXXFLAGS + FFLAGS='-O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full ' + export FFLAGS + FCFLAGS='-O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full ' + export FCFLAGS + VALAFLAGS=-g + export VALAFLAGS + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none --cap-lints=warn' + export RUSTFLAGS + LDFLAGS='-Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -Wl,-O1 -Wl,--build-id=sha1 -Wl,--enable-new-dtags -specs=/usr/lib/rpm/redhat/redhat-hardened-ld' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib64: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd webef-0.3.2 + '[' 1 -eq 1 ']' + '[' 1 -eq 1 ']' + /usr/bin/make -O -j16 V=1 VERBOSE=1 'CFLAGS=-O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes' gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o base64.o -c base64.c gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o file.o -c file.c gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o main.o -c main.c main.c: In function 'the_end': main.c:50:9: warning: 'ERR_remove_state' is deprecated: Since OpenSSL 1.0.0 [-Wdeprecated-declarations] 50 | ERR_remove_state(0); | ^~~~~~~~~~~~~~~~ In file included from main.c:34: /usr/include/openssl/err.h:488:30: note: declared here 488 | OSSL_DEPRECATEDIN_1_0_0 void ERR_remove_state(unsigned long pid); | ^~~~~~~~~~~~~~~~ gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o ssl.o -c ssl.c gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o fuzz.o -c fuzz.c gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o send.o -c send.c gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o http.o -c http.c http.c: In function 'post': http.c:155:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 155 | strncat(url,data->opt.url.url_pre, strlen(data->opt.url.url_pre)); | ^ http.c:152:26: note: length computed here 152 | if( (strlen(url)+strlen(data->opt.url.url_pre) + 1)>MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:161:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 161 | strncat(url,data->opt.url.host, strlen(data->opt.url.host)); | ^ http.c:161:41: note: length computed here 161 | strncat(url,data->opt.url.host, strlen(data->opt.url.host)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:177:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 177 | strncat(url, data->opt.headers, strlen(data->opt.headers)); | ^ http.c:175:36: note: length computed here 175 | if( (strlen(url) + strlen(data->opt.headers) + 1 ) > MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~ http.c:191:34: warning: '%i' directive writing between 1 and 11 bytes into a region of size 4 [-Wformat-overflow=] 191 | sprintf(length, "%i", size); | ^~ http.c:191:33: note: directive argument in the range [-2147483648, 999] 191 | sprintf(length, "%i", size); | ^~~~ In file included from /usr/include/stdio.h:970, from http.c:32: In function 'sprintf', inlined from 'post' at http.c:191:3: /usr/include/bits/stdio2.h:30:10: note: '__builtin___sprintf_chk' output between 2 and 12 bytes into a destination of size 4 30 | return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1, | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 31 | __glibc_objsize (__s), __fmt, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 32 | __va_arg_pack ()); | ~~~~~~~~~~~~~~~~~ http.c: In function 'post': http.c:199:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 199 | strncat(url, length, strlen(length)); | ^ http.c:199:30: note: length computed here 199 | strncat(url, length, strlen(length)); | ^~~~~~~~~~~~~~ http.c:225:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 225 | strncat(url,data->opt.post.post_pre, strlen(data->opt.post.post_pre)); | ^ http.c:222:26: note: length computed here 222 | if( (strlen(url)+strlen(data->opt.post.post_pre))>MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:230:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 230 | strncat(url,word1, strlen(word1)); | ^ http.c:227:25: note: length computed here 227 | if((strlen(url)+strlen(word1)+1)>MAX_SIZE_URL) | ^~~~~~~~~~~~~ http.c:236:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 236 | strncat(url, data->opt.post.post_mid, strlen(data->opt.post.post_mid)); | ^ http.c:234:34: note: length computed here 234 | if( (strlen(url)+strlen(data->opt.post.post_mid)+1 > MAX_SIZE_URL)) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:244:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 244 | strncat(url,word2, strlen(word2)); | ^ http.c:241:34: note: length computed here 241 | if( (strlen(url)+strlen(word2)+1>MAX_SIZE_URL)) | ^~~~~~~~~~~~~ http.c:252:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 252 | strncat(url, data->opt.post.post_end, strlen(data->opt.post.post_end)); | ^ http.c:249:34: note: length computed here 249 | if( (strlen(url)+strlen(data->opt.post.post_end)+1)>MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c: In function 'get': http.c:279:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 279 | strncat(url,data->opt.url.url_pre, strlen(data->opt.url.url_pre)); | ^ http.c:276:26: note: length computed here 276 | if( (strlen(url)+strlen(data->opt.url.url_pre))>MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:285:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 285 | strncat(url,word1, strlen(word1)); | ^ http.c:283:51: note: length computed here 283 | if(word1 == NULL || ((strlen(url)+strlen(word1)+1)>MAX_SIZE_URL)) | ^~~~~~~~~~~~~ http.c:292:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 292 | strncat(url, data->opt.url.url_mid, strlen(data->opt.url.url_mid)); | ^ http.c:290:34: note: length computed here 290 | if( (strlen(url)+strlen(data->opt.url.url_mid)+1 > MAX_SIZE_URL)) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:300:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 300 | strncat(url,word2, strlen(word2)); | ^ http.c:297:34: note: length computed here 297 | if( (strlen(url)+strlen(word2)+1>MAX_SIZE_URL)) | ^~~~~~~~~~~~~ http.c:308:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 308 | strncat(url, data->opt.url.url_end, strlen(data->opt.url.url_end)); | ^ http.c:305:34: note: length computed here 305 | if( (strlen(url)+strlen(data->opt.url.url_end)+1)>MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:315:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 315 | strncat(url,data->opt.url.host, strlen(data->opt.url.host)); | ^ http.c:315:41: note: length computed here 315 | strncat(url,data->opt.url.host, strlen(data->opt.url.host)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:330:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 330 | strncat(url, data->opt.headers, strlen(data->opt.headers)); | ^ http.c:328:36: note: length computed here 328 | if( (strlen(url) + strlen(data->opt.headers) + 1 ) > MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~ http.c: In function 'basic_auth': http.c:391:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 391 | strncat(url,data->opt.url.url_pre, strlen(data->opt.url.url_pre)); | ^ http.c:388:26: note: length computed here 388 | if( (strlen(url)+strlen(data->opt.url.url_pre))>MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:397:9: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 397 | strncat(url,data->opt.url.host, strlen(data->opt.url.host)); | ^ http.c:397:41: note: length computed here 397 | strncat(url,data->opt.url.host, strlen(data->opt.url.host)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~ http.c:412:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 412 | strncat(url, data->opt.headers, strlen(data->opt.headers)); | ^ http.c:410:36: note: length computed here 410 | if( (strlen(url) + strlen(data->opt.headers) + 1 ) > MAX_SIZE_URL) | ^~~~~~~~~~~~~~~~~~~~~~~~~ gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -o options.o -c options.c options.c: In function 'parse_headers.part.0': options.c:230:17: warning: '__builtin___strncat_chk' specified bound depends on the length of the source argument [-Wstringop-overflow=] 230 | strncat(opt_file->headers, head, strlen(head)); | ^ options.c:230:50: note: length computed here 230 | strncat(opt_file->headers, head, strlen(head)); | ^~~~~~~~~~~~ gcc -O2 -g -pipe -Wformat -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -m64 -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection=full -D_GNU_SOURCE -I includes -lpthread -D_REENTRANT -lssl -o webef main.o options.o fuzz.o file.o send.o ssl.o http.o base64.o -lcrypto /usr/bin/ld: final link failed: No space left on device collect2: error: ld returned 1 exit status make: *** [Makefile:13: webef] Error 1 error: Bad exit status from /home/pterjan/rpmbuild/tmp/rpm-tmp.Z388Ei (%build) RPM build errors: Bad exit status from /home/pterjan/rpmbuild/tmp/rpm-tmp.Z388Ei (%build) I: [iurt_root_command] ERROR: chroot