starting build "170fc5fe-deb3-495f-ad8a-ea8e224d0b0a" FETCHSOURCE BUILD Starting Step #0 Step #0: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #0: Using default tag: latest Step #0: latest: Pulling from oss-fuzz-base/base-runner Step #0: b549f31133a9: Pulling fs layer Step #0: a977fd1d1d2c: Pulling fs layer Step #0: b7af597d0683: Pulling fs layer Step #0: 13e3034c244d: Pulling fs layer Step #0: dec64d51f794: Pulling fs layer Step #0: e31f3b260b9e: Pulling fs layer Step #0: 367f9bb09834: Pulling fs layer Step #0: 5b25d2c94427: Pulling fs layer Step #0: d2a50f9fb1f3: Pulling fs layer Step #0: 8632b0bd8e7d: Pulling fs layer Step #0: 5368468cae7f: Pulling fs layer Step #0: 3c2efcf61031: Pulling fs layer Step #0: ac5a534aec8b: Pulling fs layer Step #0: b7e426295cd7: Pulling fs layer Step #0: dec64d51f794: Waiting Step #0: a3f08180fccf: Pulling fs layer Step #0: e31f3b260b9e: Waiting Step #0: d948d546ccc6: Pulling fs layer Step #0: 367f9bb09834: Waiting Step #0: 0ad7fe872fbd: Pulling fs layer Step #0: 6a857bbda8a0: Pulling fs layer Step #0: 5b25d2c94427: Waiting Step #0: a70462462a24: Pulling fs layer Step #0: 2a0c7f3b0701: Pulling fs layer Step #0: a3f08180fccf: Waiting Step #0: d948d546ccc6: Waiting Step #0: d2a50f9fb1f3: Waiting Step #0: 0ad7fe872fbd: Waiting Step #0: 6a857bbda8a0: Waiting Step #0: 8632b0bd8e7d: Waiting Step #0: a70462462a24: Waiting Step #0: 13e3034c244d: Waiting Step #0: 5368468cae7f: Waiting Step #0: 3c2efcf61031: Waiting Step #0: 2a0c7f3b0701: Waiting Step #0: ac5a534aec8b: Waiting Step #0: b7e426295cd7: Waiting Step #0: b7af597d0683: Verifying Checksum Step #0: b7af597d0683: Download complete Step #0: 13e3034c244d: Download complete Step #0: b549f31133a9: Verifying Checksum Step #0: b549f31133a9: Download complete Step #0: dec64d51f794: Verifying Checksum Step #0: dec64d51f794: Download complete Step #0: e31f3b260b9e: Verifying Checksum Step #0: e31f3b260b9e: Download complete Step #0: 5b25d2c94427: Verifying Checksum Step #0: 5b25d2c94427: Download complete Step #0: d2a50f9fb1f3: Verifying Checksum Step #0: d2a50f9fb1f3: Download complete Step #0: 8632b0bd8e7d: Verifying Checksum Step #0: 8632b0bd8e7d: Download complete Step #0: a977fd1d1d2c: Verifying Checksum Step #0: a977fd1d1d2c: Download complete Step #0: 367f9bb09834: Verifying Checksum Step #0: 367f9bb09834: Download complete Step #0: 3c2efcf61031: Verifying Checksum Step #0: 3c2efcf61031: Download complete Step #0: 5368468cae7f: Verifying Checksum Step #0: 5368468cae7f: Download complete Step #0: b7e426295cd7: Verifying Checksum Step #0: b7e426295cd7: Download complete Step #0: a3f08180fccf: Download complete Step #0: b549f31133a9: Pull complete Step #0: d948d546ccc6: Verifying Checksum Step #0: d948d546ccc6: Download complete Step #0: 0ad7fe872fbd: Verifying Checksum Step #0: 0ad7fe872fbd: Download complete Step #0: 6a857bbda8a0: Verifying Checksum Step #0: 6a857bbda8a0: Download complete Step #0: a70462462a24: Download complete Step #0: 2a0c7f3b0701: Verifying Checksum Step #0: 2a0c7f3b0701: Download complete Step #0: ac5a534aec8b: Verifying Checksum Step #0: ac5a534aec8b: Download complete Step #0: a977fd1d1d2c: Pull complete Step #0: b7af597d0683: Pull complete Step #0: 13e3034c244d: Pull complete Step #0: dec64d51f794: Pull complete Step #0: e31f3b260b9e: Pull complete Step #0: 367f9bb09834: Pull complete Step #0: 5b25d2c94427: Pull complete Step #0: d2a50f9fb1f3: Pull complete Step #0: 8632b0bd8e7d: Pull complete Step #0: 5368468cae7f: Pull complete Step #0: 3c2efcf61031: Pull complete Step #0: ac5a534aec8b: Pull complete Step #0: b7e426295cd7: Pull complete Step #0: a3f08180fccf: Pull complete Step #0: d948d546ccc6: Pull complete Step #0: 0ad7fe872fbd: Pull complete Step #0: 6a857bbda8a0: Pull complete Step #0: a70462462a24: Pull complete Step #0: 2a0c7f3b0701: Pull complete Step #0: Digest: sha256:44d0c2654e5beb6475c2a8205a6abe1b890292906574ed74740db7d2400248f9 Step #0: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #0: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #1: Copying gs://oss-fuzz-coverage/usbguard/textcov_reports/20240907/fuzzer-rules.covreport... Step #1: / [0/3 files][ 0.0 B/ 4.8 MiB] 0% Done Copying gs://oss-fuzz-coverage/usbguard/textcov_reports/20240907/fuzzer-uevent.covreport... Step #1: / [0/3 files][ 0.0 B/ 4.8 MiB] 0% Done Copying gs://oss-fuzz-coverage/usbguard/textcov_reports/20240907/fuzzer-usb-descriptor.covreport... Step #1: / [0/3 files][ 0.0 B/ 4.8 MiB] 0% Done / [1/3 files][315.4 KiB/ 4.8 MiB] 6% Done / [2/3 files][860.6 KiB/ 4.8 MiB] 17% Done / [3/3 files][ 4.8 MiB/ 4.8 MiB] 100% Done Step #1: Operation completed over 3 objects/4.8 MiB. Finished Step #1 Starting Step #2 Step #2: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #2: total 4876 Step #2: -rw-r--r-- 1 root root 322924 Sep 7 10:08 fuzzer-uevent.covreport Step #2: -rw-r--r-- 1 root root 17639 Sep 7 10:08 fuzzer-usb-descriptor.covreport Step #2: -rw-r--r-- 1 root root 4646438 Sep 7 10:08 fuzzer-rules.covreport Finished Step #2 Starting Step #3 Step #3: Already have image (with digest): gcr.io/cloud-builders/git Step #3: Cloning into 'oss-fuzz'... Finished Step #3 Starting Step #4 Step #4: Already have image (with digest): gcr.io/cloud-builders/docker Step #4: Sending build context to Docker daemon 7.68kB Step #4: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder Step #4: latest: Pulling from oss-fuzz-base/base-builder Step #4: b549f31133a9: Already exists Step #4: a977fd1d1d2c: Already exists Step #4: b7af597d0683: Already exists Step #4: 0ad851ab79a7: Pulling fs layer Step #4: 32d6a845953a: Pulling fs layer Step #4: 13291e1f0083: Pulling fs layer Step #4: 12c3fa064ec9: Pulling fs layer Step #4: 5bf877a30e45: Pulling fs layer Step #4: 12c76ab55805: Pulling fs layer Step #4: bcee33c0f2c5: Pulling fs layer Step #4: 00901539164e: Pulling fs layer Step #4: 652e81a6c3ce: Pulling fs layer Step #4: 2bd7184f3186: Pulling fs layer Step #4: 6ef14a282d78: Pulling fs layer Step #4: f0b30797ba63: Pulling fs layer Step #4: c255474facb8: Pulling fs layer Step #4: 2037056aed43: Pulling fs layer Step #4: 4ea8cc67e5b1: Pulling fs layer Step #4: 1593bc33732e: Pulling fs layer Step #4: fac862d0d976: Pulling fs layer Step #4: 8a5f772dc665: Pulling fs layer Step #4: 12c3fa064ec9: Waiting Step #4: a682fa05afee: Pulling fs layer Step #4: 50ae31b489cf: Pulling fs layer Step #4: 5bf877a30e45: Waiting Step #4: bcfe6fcb5c6a: Pulling fs layer Step #4: 88ea93146e84: Pulling fs layer Step #4: 12c76ab55805: Waiting Step #4: 912a9adfcdcb: Pulling fs layer Step #4: 7ec1d093c1da: Pulling fs layer Step #4: 8c8a3977119b: Pulling fs layer Step #4: 7e3654bd47ef: Pulling fs layer Step #4: 390d9580ed9e: Pulling fs layer Step #4: dcd9de8bf193: Pulling fs layer Step #4: f97e0fb3e819: Pulling fs layer Step #4: 00901539164e: Waiting Step #4: 7ec1d093c1da: Waiting Step #4: 652e81a6c3ce: Waiting Step #4: 2bd7184f3186: Waiting Step #4: bcee33c0f2c5: Waiting Step #4: a682fa05afee: Waiting Step #4: 8c8a3977119b: Waiting Step #4: 6ef14a282d78: Waiting Step #4: 50ae31b489cf: Waiting Step #4: f0b30797ba63: Waiting Step #4: 7e3654bd47ef: Waiting Step #4: 1593bc33732e: Waiting Step #4: c255474facb8: Waiting Step #4: fac862d0d976: Waiting Step #4: 2037056aed43: Waiting Step #4: 390d9580ed9e: Waiting Step #4: 8a5f772dc665: Waiting Step #4: bcfe6fcb5c6a: Waiting Step #4: dcd9de8bf193: Waiting Step #4: 88ea93146e84: Waiting Step #4: 4ea8cc67e5b1: Waiting Step #4: f97e0fb3e819: Waiting Step #4: 912a9adfcdcb: Waiting Step #4: 13291e1f0083: Download complete Step #4: 32d6a845953a: Verifying Checksum Step #4: 32d6a845953a: Download complete Step #4: 5bf877a30e45: Download complete Step #4: 12c76ab55805: Verifying Checksum Step #4: 12c76ab55805: Download complete Step #4: 0ad851ab79a7: Verifying Checksum Step #4: 0ad851ab79a7: Download complete Step #4: 00901539164e: Verifying Checksum Step #4: 00901539164e: Download complete Step #4: 652e81a6c3ce: Verifying Checksum Step #4: 652e81a6c3ce: Download complete Step #4: 2bd7184f3186: Verifying Checksum Step #4: 2bd7184f3186: Download complete Step #4: 6ef14a282d78: Verifying Checksum Step #4: 6ef14a282d78: Download complete Step #4: f0b30797ba63: Download complete Step #4: c255474facb8: Verifying Checksum Step #4: c255474facb8: Download complete Step #4: 0ad851ab79a7: Pull complete Step #4: 2037056aed43: Verifying Checksum Step #4: 2037056aed43: Download complete Step #4: bcee33c0f2c5: Verifying Checksum Step #4: bcee33c0f2c5: Download complete Step #4: 4ea8cc67e5b1: Download complete Step #4: 1593bc33732e: Verifying Checksum Step #4: 1593bc33732e: Download complete Step #4: 32d6a845953a: Pull complete Step #4: fac862d0d976: Verifying Checksum Step #4: fac862d0d976: Download complete Step #4: 8a5f772dc665: Verifying Checksum Step #4: 8a5f772dc665: Download complete Step #4: 13291e1f0083: Pull complete Step #4: a682fa05afee: Verifying Checksum Step #4: a682fa05afee: Download complete Step #4: bcfe6fcb5c6a: Download complete Step #4: 50ae31b489cf: Verifying Checksum Step #4: 50ae31b489cf: Download complete Step #4: 88ea93146e84: Verifying Checksum Step #4: 88ea93146e84: Download complete Step #4: 912a9adfcdcb: Verifying Checksum Step #4: 912a9adfcdcb: Download complete Step #4: 12c3fa064ec9: Verifying Checksum Step #4: 12c3fa064ec9: Download complete Step #4: 7ec1d093c1da: Verifying Checksum Step #4: 7ec1d093c1da: Download complete Step #4: 8c8a3977119b: Verifying Checksum Step #4: 8c8a3977119b: Download complete Step #4: 390d9580ed9e: Verifying Checksum Step #4: 390d9580ed9e: Download complete Step #4: dcd9de8bf193: Verifying Checksum Step #4: dcd9de8bf193: Download complete Step #4: 7e3654bd47ef: Download complete Step #4: f97e0fb3e819: Verifying Checksum Step #4: f97e0fb3e819: Download complete Step #4: 12c3fa064ec9: Pull complete Step #4: 5bf877a30e45: Pull complete Step #4: 12c76ab55805: Pull complete Step #4: bcee33c0f2c5: Pull complete Step #4: 00901539164e: Pull complete Step #4: 652e81a6c3ce: Pull complete Step #4: 2bd7184f3186: Pull complete Step #4: 6ef14a282d78: Pull complete Step #4: f0b30797ba63: Pull complete Step #4: c255474facb8: Pull complete Step #4: 2037056aed43: Pull complete Step #4: 4ea8cc67e5b1: Pull complete Step #4: 1593bc33732e: Pull complete Step #4: fac862d0d976: Pull complete Step #4: 8a5f772dc665: Pull complete Step #4: a682fa05afee: Pull complete Step #4: 50ae31b489cf: Pull complete Step #4: bcfe6fcb5c6a: Pull complete Step #4: 88ea93146e84: Pull complete Step #4: 912a9adfcdcb: Pull complete Step #4: 7ec1d093c1da: Pull complete Step #4: 8c8a3977119b: Pull complete Step #4: 7e3654bd47ef: Pull complete Step #4: 390d9580ed9e: Pull complete Step #4: dcd9de8bf193: Pull complete Step #4: f97e0fb3e819: Pull complete Step #4: Digest: sha256:3483860ed8c7c32d28b30449c48c00eb12ea78cd2eb8cc9ab0af89e4d3a0f4b7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #4: ---> 0723cd9b4673 Step #4: Step 2/6 : RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libxml2-utils libxml2-dev xsltproc libprotobuf-dev protobuf-compiler libdbus-1-dev libdbus-glib-1-dev libgio2.0-cil-dev libgcrypt20-dev libpolkit-gobject-1-dev libseccomp-dev libcap-ng-dev Step #4: ---> Running in 5b063e68ee43 Step #4: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #4: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #4: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #4: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #4: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4399 kB] Step #4: Fetched 4527 kB in 2s (2497 kB/s) Step #4: Reading package lists... Step #4: Reading package lists... Step #4: Building dependency tree... Step #4: Reading state information... Step #4: make is already the newest version (4.2.1-1.2). Step #4: make set to manually installed. Step #4: The following additional packages will be installed: Step #4: autotools-dev binfmt-support ca-certificates-mono cli-common dbus file Step #4: gir1.2-glib-2.0 gir1.2-polkit-1.0 icu-devtools libapparmor1 libblkid-dev Step #4: libdbus-1-3 libdbus-glib-1-2 libdbus-glib-1-dev-bin libelf1 libffi-dev Step #4: libgio-cil libgirepository-1.0-1 libglib2.0-0 libglib2.0-bin libglib2.0-cil Step #4: libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libgpg-error-dev Step #4: libicu-dev libicu66 libltdl-dev libltdl7 libmagic-mgc libmagic1 Step #4: libmono-btls-interface4.0-cil libmono-corlib4.5-cil libmono-i18n-west4.0-cil Step #4: libmono-i18n4.0-cil libmono-security4.0-cil Step #4: libmono-system-configuration4.0-cil libmono-system-core4.0-cil Step #4: libmono-system-numerics4.0-cil libmono-system-security4.0-cil Step #4: libmono-system-xml4.0-cil libmono-system4.0-cil libmount-dev libmpdec2 Step #4: libpcre16-3 libpcre2-16-0 libpcre2-32-0 libpcre2-dev libpcre2-posix2 Step #4: libpcre3-dev libpcre32-3 libpcrecpp0v5 libpipeline1 libpolkit-agent-1-0 Step #4: libpolkit-gobject-1-0 libprotobuf-lite17 libprotobuf17 libprotoc17 Step #4: libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib libselinux1-dev Step #4: libsepol1-dev libsigsegv2 libxml2 libxslt1.1 m4 mime-support mono-4.0-gac Step #4: mono-gac mono-runtime mono-runtime-common mono-runtime-sgen python3 Step #4: python3-distutils python3-lib2to3 python3-minimal python3.8 Step #4: python3.8-minimal shared-mime-info uuid-dev xdg-user-dirs zlib1g-dev Step #4: Suggested packages: Step #4: autoconf-archive gnu-standards autoconf-doc gettext default-dbus-session-bus Step #4: | dbus-session-bus libgcrypt20-doc monodoc-gtk2.0-manual Step #4: libgirepository1.0-dev libglib2.0-doc libgdk-pixbuf2.0-bin Step #4: | libgdk-pixbuf2.0-dev icu-doc libtool-doc libmono-i18n4.0-all libasound2 Step #4: libgamin0 seccomp gfortran | fortran95-compiler gcj-jdk m4-doc xdg-utils Step #4: | libgnome2-0 | konqueror python3-doc python3-tk python3-venv python3.8-venv Step #4: python3.8-doc Step #4: The following NEW packages will be installed: Step #4: autoconf automake autotools-dev binfmt-support ca-certificates-mono Step #4: cli-common dbus file gir1.2-glib-2.0 gir1.2-polkit-1.0 icu-devtools Step #4: libapparmor1 libblkid-dev libcap-ng-dev libdbus-1-3 libdbus-1-dev Step #4: libdbus-glib-1-2 libdbus-glib-1-dev libdbus-glib-1-dev-bin libelf1 Step #4: libffi-dev libgcrypt20-dev libgio-cil libgio2.0-cil-dev Step #4: libgirepository-1.0-1 libglib2.0-0 libglib2.0-bin libglib2.0-cil Step #4: libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libgpg-error-dev Step #4: libicu-dev libicu66 libltdl-dev libltdl7 libmagic-mgc libmagic1 Step #4: libmono-btls-interface4.0-cil libmono-corlib4.5-cil libmono-i18n-west4.0-cil Step #4: libmono-i18n4.0-cil libmono-security4.0-cil Step #4: libmono-system-configuration4.0-cil libmono-system-core4.0-cil Step #4: libmono-system-numerics4.0-cil libmono-system-security4.0-cil Step #4: libmono-system-xml4.0-cil libmono-system4.0-cil libmount-dev libmpdec2 Step #4: libpcre16-3 libpcre2-16-0 libpcre2-32-0 libpcre2-dev libpcre2-posix2 Step #4: libpcre3-dev libpcre32-3 libpcrecpp0v5 libpipeline1 libpolkit-agent-1-0 Step #4: libpolkit-gobject-1-0 libpolkit-gobject-1-dev libprotobuf-dev Step #4: libprotobuf-lite17 libprotobuf17 libprotoc17 libpython3-stdlib Step #4: libpython3.8-minimal libpython3.8-stdlib libseccomp-dev libselinux1-dev Step #4: libsepol1-dev libsigsegv2 libtool libxml2 libxml2-dev libxml2-utils Step #4: libxslt1.1 m4 mime-support mono-4.0-gac mono-gac mono-runtime Step #4: mono-runtime-common mono-runtime-sgen pkg-config protobuf-compiler python3 Step #4: python3-distutils python3-lib2to3 python3-minimal python3.8 Step #4: python3.8-minimal shared-mime-info uuid-dev xdg-user-dirs xsltproc Step #4: zlib1g-dev Step #4: 0 upgraded, 99 newly installed, 0 to remove and 0 not upgraded. Step #4: Need to get 44.5 MB of archives. Step #4: After this operation, 202 MB of additional disk space will be used. Step #4: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.11 [719 kB] Step #4: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.11 [1899 kB] Step #4: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #4: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #4: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #4: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.11 [1676 kB] Step #4: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.11 [387 kB] Step #4: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #4: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #4: Get:10 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-runtime-sgen amd64 6.8.0.105+dfsg-2 [1663 kB] Step #4: Get:11 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-runtime amd64 6.8.0.105+dfsg-2 [14.8 kB] Step #4: Get:12 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-corlib4.5-cil all 6.8.0.105+dfsg-2 [1256 kB] Step #4: Get:13 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-core4.0-cil all 6.8.0.105+dfsg-2 [302 kB] Step #4: Get:14 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-numerics4.0-cil all 6.8.0.105+dfsg-2 [48.6 kB] Step #4: Get:15 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-xml4.0-cil all 6.8.0.105+dfsg-2 [816 kB] Step #4: Get:16 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-security4.0-cil all 6.8.0.105+dfsg-2 [114 kB] Step #4: Get:17 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-configuration4.0-cil all 6.8.0.105+dfsg-2 [54.9 kB] Step #4: Get:18 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system4.0-cil all 6.8.0.105+dfsg-2 [802 kB] Step #4: Get:19 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-security4.0-cil all 6.8.0.105+dfsg-2 [95.3 kB] Step #4: Get:20 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-4.0-gac all 6.8.0.105+dfsg-2 [153 kB] Step #4: Get:21 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-gac all 6.8.0.105+dfsg-2 [18.7 kB] Step #4: Get:22 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-runtime-common amd64 6.8.0.105+dfsg-2 [1154 kB] Step #4: Get:23 http://archive.ubuntu.com/ubuntu focal/universe amd64 ca-certificates-mono all 6.8.0.105+dfsg-2 [18.0 kB] Step #4: Get:24 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libapparmor1 amd64 2.13.3-7ubuntu5.3build2 [35.4 kB] Step #4: Get:25 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libdbus-1-3 amd64 1.12.16-2ubuntu2.3 [179 kB] Step #4: Get:26 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 dbus amd64 1.12.16-2ubuntu2.3 [151 kB] Step #4: Get:27 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #4: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #4: Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #4: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.7 [1289 kB] Step #4: Get:31 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libgirepository-1.0-1 amd64 1.64.1-1~ubuntu20.04.1 [85.7 kB] Step #4: Get:32 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 gir1.2-glib-2.0 amd64 1.64.1-1~ubuntu20.04.1 [134 kB] Step #4: Get:33 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libelf1 amd64 0.176-1.1ubuntu0.1 [44.2 kB] Step #4: Get:34 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.7 [5944 B] Step #4: Get:35 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #4: Get:36 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #4: Get:37 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #4: Get:38 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #4: Get:39 http://archive.ubuntu.com/ubuntu focal/main amd64 libpipeline1 amd64 1.5.2-2build1 [27.7 kB] Step #4: Get:40 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpolkit-gobject-1-0 amd64 0.105-26ubuntu1.3 [39.2 kB] Step #4: Get:41 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #4: Get:42 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #4: Get:43 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #4: Get:44 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #4: Get:45 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #4: Get:46 http://archive.ubuntu.com/ubuntu focal/universe amd64 binfmt-support amd64 2.2.0-2 [58.2 kB] Step #4: Get:47 http://archive.ubuntu.com/ubuntu focal/universe amd64 cli-common all 0.10 [171 kB] Step #4: Get:48 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpolkit-agent-1-0 amd64 0.105-26ubuntu1.3 [15.2 kB] Step #4: Get:49 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 gir1.2-polkit-1.0 amd64 0.105-26ubuntu1.3 [7344 B] Step #4: Get:50 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 icu-devtools amd64 66.1-2ubuntu2.1 [189 kB] Step #4: Get:51 http://archive.ubuntu.com/ubuntu focal/main amd64 libcap-ng-dev amd64 0.7.9-2.1build1 [22.1 kB] Step #4: Get:52 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #4: Get:53 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libdbus-1-dev amd64 1.12.16-2ubuntu2.3 [167 kB] Step #4: Get:54 http://archive.ubuntu.com/ubuntu focal/main amd64 libdbus-glib-1-2 amd64 0.110-5fakssync1 [59.1 kB] Step #4: Get:55 http://archive.ubuntu.com/ubuntu focal/main amd64 libdbus-glib-1-dev-bin amd64 0.110-5fakssync1 [39.5 kB] Step #4: Get:56 http://archive.ubuntu.com/ubuntu focal/main amd64 libffi-dev amd64 3.3-4 [57.0 kB] Step #4: Get:57 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-bin amd64 2.64.6-1~ubuntu20.04.7 [72.8 kB] Step #4: Get:58 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-lib2to3 all 3.8.10-0ubuntu1~20.04 [76.3 kB] Step #4: Get:59 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-distutils all 3.8.10-0ubuntu1~20.04 [141 kB] Step #4: Get:60 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-dev-bin amd64 2.64.6-1~ubuntu20.04.7 [109 kB] Step #4: Get:61 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 uuid-dev amd64 2.34-0.1ubuntu9.6 [33.6 kB] Step #4: Get:62 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libblkid-dev amd64 2.34-0.1ubuntu9.6 [167 kB] Step #4: Get:63 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libmount-dev amd64 2.34-0.1ubuntu9.6 [176 kB] Step #4: Get:64 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre16-3 amd64 2:8.39-12ubuntu0.1 [150 kB] Step #4: Get:65 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre32-3 amd64 2:8.39-12ubuntu0.1 [140 kB] Step #4: Get:66 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcrecpp0v5 amd64 2:8.39-12ubuntu0.1 [15.5 kB] Step #4: Get:67 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre3-dev amd64 2:8.39-12ubuntu0.1 [540 kB] Step #4: Get:68 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsepol1-dev amd64 3.0-1ubuntu0.1 [325 kB] Step #4: Get:69 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-16-0 amd64 10.34-7ubuntu0.1 [181 kB] Step #4: Get:70 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-32-0 amd64 10.34-7ubuntu0.1 [170 kB] Step #4: Get:71 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-posix2 amd64 10.34-7ubuntu0.1 [5988 B] Step #4: Get:72 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-dev amd64 10.34-7ubuntu0.1 [672 kB] Step #4: Get:73 http://archive.ubuntu.com/ubuntu focal/main amd64 libselinux1-dev amd64 3.0-1build2 [151 kB] Step #4: Get:74 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #4: Get:75 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-dev amd64 2.64.6-1~ubuntu20.04.7 [1509 kB] Step #4: Get:76 http://archive.ubuntu.com/ubuntu focal/main amd64 libdbus-glib-1-dev amd64 0.110-5fakssync1 [69.2 kB] Step #4: Get:77 http://archive.ubuntu.com/ubuntu focal/main amd64 libgpg-error-dev amd64 1.37-1 [109 kB] Step #4: Get:78 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libgcrypt20-dev amd64 1.8.5-5ubuntu1.1 [471 kB] Step #4: Get:79 http://archive.ubuntu.com/ubuntu focal/universe amd64 libglib2.0-cil amd64 2.12.40-3 [43.7 kB] Step #4: Get:80 http://archive.ubuntu.com/ubuntu focal/universe amd64 libgio-cil all 2.22.3-3 [51.9 kB] Step #4: Get:81 http://archive.ubuntu.com/ubuntu focal/universe amd64 libgio2.0-cil-dev all 2.22.3-3 [20.6 kB] Step #4: Get:82 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu-dev amd64 66.1-2ubuntu2.1 [9451 kB] Step #4: Get:83 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #4: Get:84 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #4: Get:85 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-btls-interface4.0-cil amd64 6.8.0.105+dfsg-2 [26.7 kB] Step #4: Get:86 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-i18n4.0-cil all 6.8.0.105+dfsg-2 [22.9 kB] Step #4: Get:87 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-i18n-west4.0-cil all 6.8.0.105+dfsg-2 [25.9 kB] Step #4: Get:88 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpolkit-gobject-1-dev amd64 0.105-26ubuntu1.3 [59.9 kB] Step #4: Get:89 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf-lite17 amd64 3.6.1.3-2ubuntu5.2 [132 kB] Step #4: Get:90 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf17 amd64 3.6.1.3-2ubuntu5.2 [798 kB] Step #4: Get:91 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotoc17 amd64 3.6.1.3-2ubuntu5.2 [646 kB] Step #4: Get:92 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #4: Get:93 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #4: Get:94 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2-dev amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [735 kB] Step #4: Get:95 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2-utils amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [37.1 kB] Step #4: Get:96 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxslt1.1 amd64 1.1.34-4ubuntu0.20.04.1 [151 kB] Step #4: Get:97 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 xsltproc amd64 1.1.34-4ubuntu0.20.04.1 [14.3 kB] Step #4: Get:98 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf-dev amd64 3.6.1.3-2ubuntu5.2 [1156 kB] Step #4: Get:99 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 protobuf-compiler amd64 3.6.1.3-2ubuntu5.2 [27.6 kB] Step #4: debconf: delaying package configuration, since apt-utils is not installed Step #4: Fetched 44.5 MB in 1s (40.9 MB/s) Step #4: Selecting previously unselected package libpython3.8-minimal:amd64. Step #4: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #4: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.11_amd64.deb ... Step #4: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.11) ... Step #4: Selecting previously unselected package python3.8-minimal. Step #4: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.11_amd64.deb ... Step #4: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.11) ... Step #4: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.11) ... Step #4: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.11) ... Step #4: Selecting previously unselected package python3-minimal. Step #4: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17667 files and directories currently installed.) Step #4: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #4: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #4: Selecting previously unselected package mime-support. Step #4: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #4: Unpacking mime-support (3.64ubuntu1) ... Step #4: Selecting previously unselected package libmpdec2:amd64. Step #4: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #4: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #4: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #4: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.11_amd64.deb ... Step #4: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.11) ... Step #4: Selecting previously unselected package python3.8. Step #4: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.11_amd64.deb ... Step #4: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.11) ... Step #4: Selecting previously unselected package libpython3-stdlib:amd64. Step #4: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #4: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #4: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #4: Selecting previously unselected package python3. Step #4: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18069 files and directories currently installed.) Step #4: Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Step #4: Unpacking python3 (3.8.2-0ubuntu2) ... Step #4: Selecting previously unselected package mono-runtime-sgen. Step #4: Preparing to unpack .../01-mono-runtime-sgen_6.8.0.105+dfsg-2_amd64.deb ... Step #4: Unpacking mono-runtime-sgen (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package mono-runtime. Step #4: Preparing to unpack .../02-mono-runtime_6.8.0.105+dfsg-2_amd64.deb ... Step #4: Unpacking mono-runtime (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-corlib4.5-cil. Step #4: Preparing to unpack .../03-libmono-corlib4.5-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-corlib4.5-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-system-core4.0-cil. Step #4: Preparing to unpack .../04-libmono-system-core4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-system-core4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-system-numerics4.0-cil. Step #4: Preparing to unpack .../05-libmono-system-numerics4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-system-numerics4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-system-xml4.0-cil. Step #4: Preparing to unpack .../06-libmono-system-xml4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-system-xml4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-system-security4.0-cil. Step #4: Preparing to unpack .../07-libmono-system-security4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-system-security4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-system-configuration4.0-cil. Step #4: Preparing to unpack .../08-libmono-system-configuration4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-system-configuration4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-system4.0-cil. Step #4: Preparing to unpack .../09-libmono-system4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-system4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-security4.0-cil. Step #4: Preparing to unpack .../10-libmono-security4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-security4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package mono-4.0-gac. Step #4: Preparing to unpack .../11-mono-4.0-gac_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking mono-4.0-gac (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package mono-gac. Step #4: Preparing to unpack .../12-mono-gac_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking mono-gac (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package mono-runtime-common. Step #4: Preparing to unpack .../13-mono-runtime-common_6.8.0.105+dfsg-2_amd64.deb ... Step #4: Unpacking mono-runtime-common (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-security4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up mono-runtime-sgen (6.8.0.105+dfsg-2) ... Step #4: Setting up mono-runtime (6.8.0.105+dfsg-2) ... Step #4: update-alternatives: using /usr/bin/mono to provide /usr/bin/cli (cli) in auto mode Step #4: update-alternatives: warning: skip creation of /usr/share/man/man1/cli.1.gz because associated file /usr/share/man/man1/mono.1.gz (of link group cli) doesn't exist Step #4: Setting up libmono-corlib4.5-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-system-numerics4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-system-configuration4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-system-xml4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-system-core4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-system4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmono-system-security4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up mono-4.0-gac (6.8.0.105+dfsg-2) ... Step #4: Setting up mono-gac (6.8.0.105+dfsg-2) ... Step #4: update-alternatives: using /usr/bin/gacutil to provide /usr/bin/cli-gacutil (global-assembly-cache-tool) in auto mode Step #4: update-alternatives: warning: skip creation of /usr/share/man/man1/cli-gacutil.1.gz because associated file /usr/share/man/man1/gacutil.1.gz (of link group global-assembly-cache-tool) doesn't exist Step #4: Setting up mono-runtime-common (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package ca-certificates-mono. Step #4: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18237 files and directories currently installed.) Step #4: Preparing to unpack .../00-ca-certificates-mono_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking ca-certificates-mono (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libapparmor1:amd64. Step #4: Preparing to unpack .../01-libapparmor1_2.13.3-7ubuntu5.3build2_amd64.deb ... Step #4: Unpacking libapparmor1:amd64 (2.13.3-7ubuntu5.3build2) ... Step #4: Selecting previously unselected package libdbus-1-3:amd64. Step #4: Preparing to unpack .../02-libdbus-1-3_1.12.16-2ubuntu2.3_amd64.deb ... Step #4: Unpacking libdbus-1-3:amd64 (1.12.16-2ubuntu2.3) ... Step #4: Selecting previously unselected package dbus. Step #4: Preparing to unpack .../03-dbus_1.12.16-2ubuntu2.3_amd64.deb ... Step #4: Unpacking dbus (1.12.16-2ubuntu2.3) ... Step #4: Selecting previously unselected package libmagic-mgc. Step #4: Preparing to unpack .../04-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #4: Unpacking libmagic-mgc (1:5.38-4) ... Step #4: Selecting previously unselected package libmagic1:amd64. Step #4: Preparing to unpack .../05-libmagic1_1%3a5.38-4_amd64.deb ... Step #4: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #4: Selecting previously unselected package file. Step #4: Preparing to unpack .../06-file_1%3a5.38-4_amd64.deb ... Step #4: Unpacking file (1:5.38-4) ... Step #4: Selecting previously unselected package libglib2.0-0:amd64. Step #4: Preparing to unpack .../07-libglib2.0-0_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #4: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #4: Selecting previously unselected package libgirepository-1.0-1:amd64. Step #4: Preparing to unpack .../08-libgirepository-1.0-1_1.64.1-1~ubuntu20.04.1_amd64.deb ... Step #4: Unpacking libgirepository-1.0-1:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #4: Selecting previously unselected package gir1.2-glib-2.0:amd64. Step #4: Preparing to unpack .../09-gir1.2-glib-2.0_1.64.1-1~ubuntu20.04.1_amd64.deb ... Step #4: Unpacking gir1.2-glib-2.0:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #4: Selecting previously unselected package libelf1:amd64. Step #4: Preparing to unpack .../10-libelf1_0.176-1.1ubuntu0.1_amd64.deb ... Step #4: Unpacking libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #4: Selecting previously unselected package libglib2.0-data. Step #4: Preparing to unpack .../11-libglib2.0-data_2.64.6-1~ubuntu20.04.7_all.deb ... Step #4: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #4: Selecting previously unselected package libicu66:amd64. Step #4: Preparing to unpack .../12-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #4: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #4: Selecting previously unselected package libxml2:amd64. Step #4: Preparing to unpack .../13-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #4: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #4: Selecting previously unselected package shared-mime-info. Step #4: Preparing to unpack .../14-shared-mime-info_1.15-1_amd64.deb ... Step #4: Unpacking shared-mime-info (1.15-1) ... Step #4: Selecting previously unselected package xdg-user-dirs. Step #4: Preparing to unpack .../15-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #4: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #4: Selecting previously unselected package libpipeline1:amd64. Step #4: Preparing to unpack .../16-libpipeline1_1.5.2-2build1_amd64.deb ... Step #4: Unpacking libpipeline1:amd64 (1.5.2-2build1) ... Step #4: Selecting previously unselected package libpolkit-gobject-1-0:amd64. Step #4: Preparing to unpack .../17-libpolkit-gobject-1-0_0.105-26ubuntu1.3_amd64.deb ... Step #4: Unpacking libpolkit-gobject-1-0:amd64 (0.105-26ubuntu1.3) ... Step #4: Selecting previously unselected package libsigsegv2:amd64. Step #4: Preparing to unpack .../18-libsigsegv2_2.12-2_amd64.deb ... Step #4: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #4: Selecting previously unselected package m4. Step #4: Preparing to unpack .../19-m4_1.4.18-4_amd64.deb ... Step #4: Unpacking m4 (1.4.18-4) ... Step #4: Selecting previously unselected package autoconf. Step #4: Preparing to unpack .../20-autoconf_2.69-11.1_all.deb ... Step #4: Unpacking autoconf (2.69-11.1) ... Step #4: Selecting previously unselected package autotools-dev. Step #4: Preparing to unpack .../21-autotools-dev_20180224.1_all.deb ... Step #4: Unpacking autotools-dev (20180224.1) ... Step #4: Selecting previously unselected package automake. Step #4: Preparing to unpack .../22-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #4: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #4: Selecting previously unselected package binfmt-support. Step #4: Preparing to unpack .../23-binfmt-support_2.2.0-2_amd64.deb ... Step #4: Unpacking binfmt-support (2.2.0-2) ... Step #4: Selecting previously unselected package cli-common. Step #4: Preparing to unpack .../24-cli-common_0.10_all.deb ... Step #4: Unpacking cli-common (0.10) ... Step #4: Selecting previously unselected package libpolkit-agent-1-0:amd64. Step #4: Preparing to unpack .../25-libpolkit-agent-1-0_0.105-26ubuntu1.3_amd64.deb ... Step #4: Unpacking libpolkit-agent-1-0:amd64 (0.105-26ubuntu1.3) ... Step #4: Selecting previously unselected package gir1.2-polkit-1.0. Step #4: Preparing to unpack .../26-gir1.2-polkit-1.0_0.105-26ubuntu1.3_amd64.deb ... Step #4: Unpacking gir1.2-polkit-1.0 (0.105-26ubuntu1.3) ... Step #4: Selecting previously unselected package icu-devtools. Step #4: Preparing to unpack .../27-icu-devtools_66.1-2ubuntu2.1_amd64.deb ... Step #4: Unpacking icu-devtools (66.1-2ubuntu2.1) ... Step #4: Selecting previously unselected package libcap-ng-dev. Step #4: Preparing to unpack .../28-libcap-ng-dev_0.7.9-2.1build1_amd64.deb ... Step #4: Unpacking libcap-ng-dev (0.7.9-2.1build1) ... Step #4: Selecting previously unselected package pkg-config. Step #4: Preparing to unpack .../29-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #4: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #4: Selecting previously unselected package libdbus-1-dev:amd64. Step #4: Preparing to unpack .../30-libdbus-1-dev_1.12.16-2ubuntu2.3_amd64.deb ... Step #4: Unpacking libdbus-1-dev:amd64 (1.12.16-2ubuntu2.3) ... Step #4: Selecting previously unselected package libdbus-glib-1-2:amd64. Step #4: Preparing to unpack .../31-libdbus-glib-1-2_0.110-5fakssync1_amd64.deb ... Step #4: Unpacking libdbus-glib-1-2:amd64 (0.110-5fakssync1) ... Step #4: Selecting previously unselected package libdbus-glib-1-dev-bin. Step #4: Preparing to unpack .../32-libdbus-glib-1-dev-bin_0.110-5fakssync1_amd64.deb ... Step #4: Unpacking libdbus-glib-1-dev-bin (0.110-5fakssync1) ... Step #4: Selecting previously unselected package libffi-dev:amd64. Step #4: Preparing to unpack .../33-libffi-dev_3.3-4_amd64.deb ... Step #4: Unpacking libffi-dev:amd64 (3.3-4) ... Step #4: Selecting previously unselected package libglib2.0-bin. Step #4: Preparing to unpack .../34-libglib2.0-bin_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #4: Unpacking libglib2.0-bin (2.64.6-1~ubuntu20.04.7) ... Step #4: Selecting previously unselected package python3-lib2to3. Step #4: Preparing to unpack .../35-python3-lib2to3_3.8.10-0ubuntu1~20.04_all.deb ... Step #4: Unpacking python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #4: Selecting previously unselected package python3-distutils. Step #4: Preparing to unpack .../36-python3-distutils_3.8.10-0ubuntu1~20.04_all.deb ... Step #4: Unpacking python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #4: Selecting previously unselected package libglib2.0-dev-bin. Step #4: Preparing to unpack .../37-libglib2.0-dev-bin_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #4: Unpacking libglib2.0-dev-bin (2.64.6-1~ubuntu20.04.7) ... Step #4: Selecting previously unselected package uuid-dev:amd64. Step #4: Preparing to unpack .../38-uuid-dev_2.34-0.1ubuntu9.6_amd64.deb ... Step #4: Unpacking uuid-dev:amd64 (2.34-0.1ubuntu9.6) ... Step #4: Selecting previously unselected package libblkid-dev:amd64. Step #4: Preparing to unpack .../39-libblkid-dev_2.34-0.1ubuntu9.6_amd64.deb ... Step #4: Unpacking libblkid-dev:amd64 (2.34-0.1ubuntu9.6) ... Step #4: Selecting previously unselected package libmount-dev:amd64. Step #4: Preparing to unpack .../40-libmount-dev_2.34-0.1ubuntu9.6_amd64.deb ... Step #4: Unpacking libmount-dev:amd64 (2.34-0.1ubuntu9.6) ... Step #4: Selecting previously unselected package libpcre16-3:amd64. Step #4: Preparing to unpack .../41-libpcre16-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Selecting previously unselected package libpcre32-3:amd64. Step #4: Preparing to unpack .../42-libpcre32-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Selecting previously unselected package libpcrecpp0v5:amd64. Step #4: Preparing to unpack .../43-libpcrecpp0v5_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Selecting previously unselected package libpcre3-dev:amd64. Step #4: Preparing to unpack .../44-libpcre3-dev_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Selecting previously unselected package libsepol1-dev:amd64. Step #4: Preparing to unpack .../45-libsepol1-dev_3.0-1ubuntu0.1_amd64.deb ... Step #4: Unpacking libsepol1-dev:amd64 (3.0-1ubuntu0.1) ... Step #4: Selecting previously unselected package libpcre2-16-0:amd64. Step #4: Preparing to unpack .../46-libpcre2-16-0_10.34-7ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre2-16-0:amd64 (10.34-7ubuntu0.1) ... Step #4: Selecting previously unselected package libpcre2-32-0:amd64. Step #4: Preparing to unpack .../47-libpcre2-32-0_10.34-7ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre2-32-0:amd64 (10.34-7ubuntu0.1) ... Step #4: Selecting previously unselected package libpcre2-posix2:amd64. Step #4: Preparing to unpack .../48-libpcre2-posix2_10.34-7ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre2-posix2:amd64 (10.34-7ubuntu0.1) ... Step #4: Selecting previously unselected package libpcre2-dev:amd64. Step #4: Preparing to unpack .../49-libpcre2-dev_10.34-7ubuntu0.1_amd64.deb ... Step #4: Unpacking libpcre2-dev:amd64 (10.34-7ubuntu0.1) ... Step #4: Selecting previously unselected package libselinux1-dev:amd64. Step #4: Preparing to unpack .../50-libselinux1-dev_3.0-1build2_amd64.deb ... Step #4: Unpacking libselinux1-dev:amd64 (3.0-1build2) ... Step #4: Selecting previously unselected package zlib1g-dev:amd64. Step #4: Preparing to unpack .../51-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #4: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #4: Selecting previously unselected package libglib2.0-dev:amd64. Step #4: Preparing to unpack .../52-libglib2.0-dev_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #4: Unpacking libglib2.0-dev:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #4: Selecting previously unselected package libdbus-glib-1-dev:amd64. Step #4: Preparing to unpack .../53-libdbus-glib-1-dev_0.110-5fakssync1_amd64.deb ... Step #4: Unpacking libdbus-glib-1-dev:amd64 (0.110-5fakssync1) ... Step #4: Selecting previously unselected package libgpg-error-dev. Step #4: Preparing to unpack .../54-libgpg-error-dev_1.37-1_amd64.deb ... Step #4: Unpacking libgpg-error-dev (1.37-1) ... Step #4: Selecting previously unselected package libgcrypt20-dev. Step #4: Preparing to unpack .../55-libgcrypt20-dev_1.8.5-5ubuntu1.1_amd64.deb ... Step #4: Unpacking libgcrypt20-dev (1.8.5-5ubuntu1.1) ... Step #4: Selecting previously unselected package libglib2.0-cil. Step #4: Preparing to unpack .../56-libglib2.0-cil_2.12.40-3_amd64.deb ... Step #4: Unpacking libglib2.0-cil (2.12.40-3) ... Step #4: Selecting previously unselected package libgio-cil. Step #4: Preparing to unpack .../57-libgio-cil_2.22.3-3_all.deb ... Step #4: Unpacking libgio-cil (2.22.3-3) ... Step #4: Selecting previously unselected package libgio2.0-cil-dev. Step #4: Preparing to unpack .../58-libgio2.0-cil-dev_2.22.3-3_all.deb ... Step #4: Unpacking libgio2.0-cil-dev (2.22.3-3) ... Step #4: Selecting previously unselected package libicu-dev:amd64. Step #4: Preparing to unpack .../59-libicu-dev_66.1-2ubuntu2.1_amd64.deb ... Step #4: Unpacking libicu-dev:amd64 (66.1-2ubuntu2.1) ... Step #4: Selecting previously unselected package libltdl7:amd64. Step #4: Preparing to unpack .../60-libltdl7_2.4.6-14_amd64.deb ... Step #4: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #4: Selecting previously unselected package libltdl-dev:amd64. Step #4: Preparing to unpack .../61-libltdl-dev_2.4.6-14_amd64.deb ... Step #4: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #4: Selecting previously unselected package libmono-btls-interface4.0-cil. Step #4: Preparing to unpack .../62-libmono-btls-interface4.0-cil_6.8.0.105+dfsg-2_amd64.deb ... Step #4: Unpacking libmono-btls-interface4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-i18n4.0-cil. Step #4: Preparing to unpack .../63-libmono-i18n4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-i18n4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libmono-i18n-west4.0-cil. Step #4: Preparing to unpack .../64-libmono-i18n-west4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #4: Unpacking libmono-i18n-west4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Selecting previously unselected package libpolkit-gobject-1-dev. Step #4: Preparing to unpack .../65-libpolkit-gobject-1-dev_0.105-26ubuntu1.3_amd64.deb ... Step #4: Unpacking libpolkit-gobject-1-dev (0.105-26ubuntu1.3) ... Step #4: Selecting previously unselected package libprotobuf-lite17:amd64. Step #4: Preparing to unpack .../66-libprotobuf-lite17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #4: Unpacking libprotobuf-lite17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Selecting previously unselected package libprotobuf17:amd64. Step #4: Preparing to unpack .../67-libprotobuf17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #4: Unpacking libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Selecting previously unselected package libprotoc17:amd64. Step #4: Preparing to unpack .../68-libprotoc17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #4: Unpacking libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Selecting previously unselected package libseccomp-dev:amd64. Step #4: Preparing to unpack .../69-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #4: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #4: Selecting previously unselected package libtool. Step #4: Preparing to unpack .../70-libtool_2.4.6-14_all.deb ... Step #4: Unpacking libtool (2.4.6-14) ... Step #4: Selecting previously unselected package libxml2-dev:amd64. Step #4: Preparing to unpack .../71-libxml2-dev_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #4: Unpacking libxml2-dev:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #4: Selecting previously unselected package libxml2-utils. Step #4: Preparing to unpack .../72-libxml2-utils_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #4: Unpacking libxml2-utils (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #4: Selecting previously unselected package libxslt1.1:amd64. Step #4: Preparing to unpack .../73-libxslt1.1_1.1.34-4ubuntu0.20.04.1_amd64.deb ... Step #4: Unpacking libxslt1.1:amd64 (1.1.34-4ubuntu0.20.04.1) ... Step #4: Selecting previously unselected package xsltproc. Step #4: Preparing to unpack .../74-xsltproc_1.1.34-4ubuntu0.20.04.1_amd64.deb ... Step #4: Unpacking xsltproc (1.1.34-4ubuntu0.20.04.1) ... Step #4: Selecting previously unselected package libprotobuf-dev:amd64. Step #4: Preparing to unpack .../75-libprotobuf-dev_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #4: Unpacking libprotobuf-dev:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Selecting previously unselected package protobuf-compiler. Step #4: Preparing to unpack .../76-protobuf-compiler_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #4: Unpacking protobuf-compiler (3.6.1.3-2ubuntu5.2) ... Step #4: Setting up libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Setting up libpipeline1:amd64 (1.5.2-2build1) ... Step #4: Setting up libmono-btls-interface4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #4: Setting up libapparmor1:amd64 (2.13.3-7ubuntu5.3build2) ... Step #4: Setting up mime-support (3.64ubuntu1) ... Step #4: Setting up libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Setting up ca-certificates-mono (6.8.0.105+dfsg-2) ... Step #4: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #4: Setting up libmagic-mgc (1:5.38-4) ... Step #4: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #4: No schema files found: doing nothing. Step #4: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #4: Setting up libprotobuf-lite17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Setting up libmono-i18n4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libmagic1:amd64 (1:5.38-4) ... Step #4: Setting up libsepol1-dev:amd64 (3.0-1ubuntu0.1) ... Step #4: Setting up file (1:5.38-4) ... Step #4: Setting up libffi-dev:amd64 (3.3-4) ... Step #4: Setting up libpcre2-16-0:amd64 (10.34-7ubuntu0.1) ... Step #4: Setting up autotools-dev (20180224.1) ... Step #4: Setting up libpcre2-32-0:amd64 (10.34-7ubuntu0.1) ... Step #4: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #4: Setting up libgpg-error-dev (1.37-1) ... Step #4: Setting up cli-common (0.10) ... Step #4: Setting up uuid-dev:amd64 (2.34-0.1ubuntu9.6) ... Step #4: Setting up libmono-i18n-west4.0-cil (6.8.0.105+dfsg-2) ... Step #4: Setting up libdbus-1-3:amd64 (1.12.16-2ubuntu2.3) ... Step #4: Setting up dbus (1.12.16-2ubuntu2.3) ... Step #4: Setting up libsigsegv2:amd64 (2.12-2) ... Step #4: Setting up libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Setting up binfmt-support (2.2.0-2) ... Step #4: invoke-rc.d: could not determine current runlevel Step #4: invoke-rc.d: policy-rc.d denied execution of start. Step #4: Setting up icu-devtools (66.1-2ubuntu2.1) ... Step #4: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #4: Setting up libpcre2-posix2:amd64 (10.34-7ubuntu0.1) ... Step #4: Setting up libltdl7:amd64 (2.4.6-14) ... Step #4: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #4: Setting up libcap-ng-dev (0.7.9-2.1build1) ... Step #4: Setting up libgirepository-1.0-1:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #4: Setting up libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #4: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.11) ... Step #4: Setting up python3.8 (3.8.10-0ubuntu1~20.04.11) ... Step #4: Setting up libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #4: Setting up libicu-dev:amd64 (66.1-2ubuntu2.1) ... Step #4: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #4: Setting up libpolkit-gobject-1-0:amd64 (0.105-26ubuntu1.3) ... Step #4: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #4: Setting up libblkid-dev:amd64 (2.34-0.1ubuntu9.6) ... Step #4: Setting up libglib2.0-cil (2.12.40-3) ... Step #4: * Installing 1 assembly from libglib2.0-cil into Mono Step #4: Setting up libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Setting up libpcre2-dev:amd64 (10.34-7ubuntu0.1) ... Step #4: Setting up protobuf-compiler (3.6.1.3-2ubuntu5.2) ... Step #4: Setting up libtool (2.4.6-14) ... Step #4: Setting up libselinux1-dev:amd64 (3.0-1build2) ... Step #4: Setting up libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #4: Setting up libglib2.0-bin (2.64.6-1~ubuntu20.04.7) ... Step #4: Setting up m4 (1.4.18-4) ... Step #4: Setting up python3 (3.8.2-0ubuntu2) ... Step #4: Setting up libprotobuf-dev:amd64 (3.6.1.3-2ubuntu5.2) ... Step #4: Setting up libxml2-dev:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #4: Setting up libgcrypt20-dev (1.8.5-5ubuntu1.1) ... Step #4: Setting up libdbus-1-dev:amd64 (1.12.16-2ubuntu2.3) ... Step #4: Setting up libdbus-glib-1-2:amd64 (0.110-5fakssync1) ... Step #4: Setting up shared-mime-info (1.15-1) ... Step #4: Setting up gir1.2-glib-2.0:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #4: Setting up autoconf (2.69-11.1) ... Step #4: Setting up libgio-cil (2.22.3-3) ... Step #4: Setting up libxslt1.1:amd64 (1.1.34-4ubuntu0.20.04.1) ... Step #4: Setting up libpolkit-agent-1-0:amd64 (0.105-26ubuntu1.3) ... Step #4: Setting up libxml2-utils (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #4: Setting up python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #4: Setting up libmount-dev:amd64 (2.34-0.1ubuntu9.6) ... Step #4: Setting up automake (1:1.16.1-4ubuntu6) ... Step #4: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #4: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #4: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #4: Setting up python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #4: Setting up libglib2.0-dev-bin (2.64.6-1~ubuntu20.04.7) ... Step #4: Setting up xsltproc (1.1.34-4ubuntu0.20.04.1) ... Step #4: Setting up libdbus-glib-1-dev-bin (0.110-5fakssync1) ... Step #4: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #4: Setting up libglib2.0-dev:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #4: Setting up libgio2.0-cil-dev (2.22.3-3) ... Step #4: Setting up gir1.2-polkit-1.0 (0.105-26ubuntu1.3) ... Step #4: Setting up libdbus-glib-1-dev:amd64 (0.110-5fakssync1) ... Step #4: Setting up libpolkit-gobject-1-dev (0.105-26ubuntu1.3) ... Step #4: Processing triggers for ca-certificates (20230311ubuntu0.20.04.1) ... Step #4: Updating certificates in /etc/ssl/certs... Step #4: 0 added, 0 removed; done. Step #4: Running hooks in /etc/ca-certificates/update.d... Step #4: Updating Mono key store Step #4: Mono Certificate Store Sync - version 6.8.0.105 Step #4: Populate Mono certificate store from a concatenated list of certificates. Step #4: Copyright 2002, 2003 Motus Technologies. Copyright 2004-2008 Novell. BSD licensed. Step #4: Step #4: Importing into legacy system store: Step #4: I already trust 0, your new list has 137 Step #4: Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Step #4: Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Step #4: Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Step #4: Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Step #4: Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Step #4: Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Step #4: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #4: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #4: Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Step #4: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Step #4: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Step #4: Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Step #4: Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Step #4: Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Step #4: Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Step #4: Certificate added: C=FR, O=Dhimyotis, CN=Certigna Step #4: Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Step #4: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Step #4: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Step #4: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Step #4: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Step #4: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Step #4: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Step #4: Certificate added: C=TR, L=Ankara, O=E-Tu?ra EBG Bili?im Teknolojileri ve Hizmetleri A.?., OU=E-Tugra Sertifikasyon Merkezi, CN=E-Tugra Certification Authority Step #4: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA ECC v3 Step #4: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA RSA v3 Step #4: Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2015 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G4 Step #4: Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Step #4: Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Step #4: Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Step #4: Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Step #4: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Step #4: Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Step #4: Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Step #4: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Step #4: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Step #4: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Step #4: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Step #4: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Step #4: Certificate added: C=HK, O=Hongkong Post, CN=Hongkong Post Root CA 1 Step #4: Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Step #4: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Step #4: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Step #4: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Step #4: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Step #4: Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Step #4: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Step #4: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Step #4: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Step #4: Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Step #4: Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tan?s?tv?nykiad?k (Certification Services), CN=NetLock Arany (Class Gold) F?tan?s?tv?ny Step #4: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Step #4: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Step #4: Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Step #4: Certificate added: C=JP, O="Japan Certification Services, Inc.", CN=SecureSign RootCA11 Step #4: Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Step #4: Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Step #4: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Step #4: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Step #4: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication RootCA3 Step #4: Certificate added: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1 Step #4: Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Step #4: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Step #4: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Step #4: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Step #4: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Step #4: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Step #4: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Step #4: Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Step #4: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Step #4: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Step #4: Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Step #4: Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Step #4: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Step #4: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Step #4: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Step #4: Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Step #4: Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Step #4: Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Step #4: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Step #4: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Step #4: Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Step #4: Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Step #4: Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Step #4: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Step #4: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Step #4: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Step #4: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Step #4: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Step #4: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Step #4: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Step #4: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA Step #4: 137 new root certificates were added to your trust store. Step #4: Import process completed. Step #4: Step #4: Importing into BTLS system store: Step #4: I already trust 0, your new list has 137 Step #4: Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Step #4: Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Step #4: Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Step #4: Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Step #4: Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Step #4: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Step #4: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Step #4: Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Step #4: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #4: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #4: Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Step #4: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Step #4: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Step #4: Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Step #4: Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Step #4: Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Step #4: Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Step #4: Certificate added: C=FR, O=Dhimyotis, CN=Certigna Step #4: Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Step #4: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Step #4: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Step #4: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Step #4: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Step #4: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Step #4: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Step #4: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Step #4: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Step #4: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Step #4: Certificate added: C=TR, L=Ankara, O=E-Tu?ra EBG Bili?im Teknolojileri ve Hizmetleri A.?., OU=E-Tugra Sertifikasyon Merkezi, CN=E-Tugra Certification Authority Step #4: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA ECC v3 Step #4: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA RSA v3 Step #4: Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Step #4: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2015 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G4 Step #4: Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Step #4: Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Step #4: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Step #4: Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Step #4: Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Step #4: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Step #4: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Step #4: Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Step #4: Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Step #4: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Step #4: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Step #4: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Step #4: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Step #4: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Step #4: Certificate added: C=HK, O=Hongkong Post, CN=Hongkong Post Root CA 1 Step #4: Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Step #4: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Step #4: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Step #4: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Step #4: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Step #4: Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Step #4: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Step #4: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Step #4: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Step #4: Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Step #4: Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tan?s?tv?nykiad?k (Certification Services), CN=NetLock Arany (Class Gold) F?tan?s?tv?ny Step #4: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Step #4: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Step #4: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Step #4: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Step #4: Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Step #4: Certificate added: C=JP, O="Japan Certification Services, Inc.", CN=SecureSign RootCA11 Step #4: Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Step #4: Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Step #4: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Step #4: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Step #4: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication RootCA3 Step #4: Certificate added: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1 Step #4: Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Step #4: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Step #4: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Step #4: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Step #4: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Step #4: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Step #4: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Step #4: Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Step #4: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Step #4: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Step #4: Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Step #4: Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Step #4: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Step #4: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Step #4: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Step #4: Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Step #4: Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Step #4: Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Step #4: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Step #4: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Step #4: Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Step #4: Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Step #4: Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Step #4: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Step #4: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Step #4: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Step #4: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Step #4: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Step #4: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Step #4: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Step #4: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA Step #4: 137 new root certificates were added to your trust store. Step #4: Import process completed. Step #4: Done Step #4: done. Step #4: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #4: Removing intermediate container 5b063e68ee43 Step #4: ---> f45382016757 Step #4: Step 3/6 : RUN git clone https://github.com/ClusterLabs/libqb && cd libqb && ./autogen.sh && ./configure && make && make install Step #4: ---> Running in a0afff2e6c7f Step #4: Cloning into 'libqb'... Step #4: autoreconf: Entering directory `.' Step #4: autoreconf: configure.ac: not using Gettext Step #4: autoreconf: running: aclocal --force -I m4 Step #4: autoreconf: configure.ac: tracing Step #4: autoreconf: running: libtoolize --copy --force Step #4: libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'. Step #4: libtoolize: copying file 'build-aux/ltmain.sh' Step #4: libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #4: libtoolize: copying file 'm4/libtool.m4' Step #4: libtoolize: copying file 'm4/ltoptions.m4' Step #4: libtoolize: copying file 'm4/ltsugar.m4' Step #4: libtoolize: copying file 'm4/ltversion.m4' Step #4: libtoolize: copying file 'm4/lt~obsolete.m4' Step #4: autoreconf: running: /usr/bin/autoconf --force Step #4: autoreconf: running: /usr/bin/autoheader --force Step #4: autoreconf: running: automake --add-missing --copy --force-missing Step #4: configure.ac:20: installing 'build-aux/compile' Step #4: configure.ac:38: installing 'build-aux/config.guess' Step #4: configure.ac:38: installing 'build-aux/config.sub' Step #4: configure.ac:22: installing 'build-aux/install-sh' Step #4: configure.ac:22: installing 'build-aux/missing' Step #4: doxygen2man/Makefile.am: installing 'build-aux/depcomp' Step #4: parallel-tests: installing 'build-aux/test-driver' Step #4: autoreconf: Leaving directory `.' Step #4: : About to consume a checked out tree (dedicated for maintenance!)... Step #4: : Now run ./configure && make Step #4: checking for gcc... clang Step #4: checking whether the C compiler works... yes Step #4: checking for C compiler default output file name... a.out Step #4: checking for suffix of executables... Step #4: checking whether we are cross compiling... no Step #4: checking for suffix of object files... o Step #4: checking whether we are using the GNU C compiler... yes Step #4: checking whether clang accepts -g... yes Step #4: checking for clang option to accept ISO C89... none needed Step #4: checking whether clang understands -c and -o together... yes Step #4: checking how to run the C preprocessor... clang -E Step #4: checking for grep that handles long lines and -e... /usr/bin/grep Step #4: checking for egrep... /usr/bin/grep -E Step #4: checking for ANSI C header files... yes Step #4: checking for sys/types.h... yes Step #4: checking for sys/stat.h... yes Step #4: checking for stdlib.h... yes Step #4: checking for string.h... yes Step #4: checking for memory.h... yes Step #4: checking for strings.h... yes Step #4: checking for inttypes.h... yes Step #4: checking for stdint.h... yes Step #4: checking for unistd.h... yes Step #4: checking minix/config.h usability... no Step #4: checking minix/config.h presence... no Step #4: checking for minix/config.h... no Step #4: checking whether it is safe to define __EXTENSIONS__... yes Step #4: checking for a BSD-compatible install... /usr/bin/install -c Step #4: checking whether build environment is sane... yes Step #4: checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #4: checking for gawk... no Step #4: checking for mawk... mawk Step #4: checking whether make sets $(MAKE)... yes Step #4: checking whether make supports the include directive... yes (GNU style) Step #4: checking whether make supports nested variables... yes Step #4: checking dependency style of clang... gcc3 Step #4: checking whether make supports nested variables... (cached) yes Step #4: checking whether the linker accepts -Wl,--enable-new-dtags... yes Step #4: checking build system type... x86_64-pc-linux-gnu Step #4: checking host system type... x86_64-pc-linux-gnu Step #4: checking how to print strings... printf Step #4: checking for a sed that does not truncate output... /usr/bin/sed Step #4: checking for fgrep... /usr/bin/grep -F Step #4: checking for ld used by clang... /usr/bin/ld Step #4: checking if the linker (/usr/bin/ld) is GNU ld... yes Step #4: checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #4: checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #4: checking whether ln -s works... yes Step #4: checking the maximum length of command line arguments... 1572864 Step #4: checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #4: checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #4: checking for /usr/bin/ld option to reload object files... -r Step #4: checking for objdump... objdump Step #4: checking how to recognize dependent libraries... pass_all Step #4: checking for dlltool... no Step #4: checking how to associate runtime and link libraries... printf %s\n Step #4: checking for ar... ar Step #4: checking for archiver @FILE support... @ Step #4: checking for strip... strip Step #4: checking for ranlib... ranlib Step #4: checking command to parse /usr/bin/nm -B output from clang object... ok Step #4: checking for sysroot... no Step #4: checking for a working dd... /usr/bin/dd Step #4: checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #4: checking for mt... no Step #4: checking if : is a manifest tool... no Step #4: checking for dlfcn.h... yes Step #4: checking for objdir... .libs Step #4: checking if clang supports -fno-rtti -fno-exceptions... yes Step #4: checking for clang option to produce PIC... -fPIC -DPIC Step #4: checking if clang PIC flag -fPIC -DPIC works... yes Step #4: checking if clang static flag -static works... yes Step #4: checking if clang supports -c -o file.o... yes Step #4: checking if clang supports -c -o file.o... (cached) yes Step #4: checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #4: checking whether -lc should be explicitly linked in... no Step #4: checking dynamic linker characteristics... GNU/Linux ld.so Step #4: checking how to hardcode library paths into programs... immediate Step #4: checking whether stripping libraries is possible... yes Step #4: checking if libtool supports shared libraries... yes Step #4: checking whether to build shared libraries... yes Step #4: checking whether to build static libraries... yes Step #4: configure: building in place srcdir:. Step #4: checking whether we are using the GNU C++ compiler... yes Step #4: checking whether clang++ accepts -g... yes Step #4: checking dependency style of clang++... gcc3 Step #4: checking how to run the C++ preprocessor... clang++ -E Step #4: checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #4: checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #4: checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #4: checking for clang++ option to produce PIC... -fPIC -DPIC Step #4: checking if clang++ PIC flag -fPIC -DPIC works... yes Step #4: checking if clang++ static flag -static works... yes Step #4: checking if clang++ supports -c -o file.o... yes Step #4: checking if clang++ supports -c -o file.o... (cached) yes Step #4: checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #4: checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #4: checking how to hardcode library paths into programs... immediate Step #4: checking for gawk... (cached) mawk Step #4: checking for gcc... (cached) clang Step #4: checking whether we are using the GNU C compiler... (cached) yes Step #4: checking whether clang accepts -g... (cached) yes Step #4: checking for clang option to accept ISO C89... (cached) none needed Step #4: checking whether clang understands -c and -o together... (cached) yes Step #4: checking how to run the C preprocessor... clang -E Step #4: checking for clang option to accept ISO C99... none needed Step #4: checking whether ln -s works... yes Step #4: checking whether make sets $(MAKE)... (cached) yes Step #4: checking for pkg-config... pkg-config Step #4: checking for doxygen... no Step #4: checking for eu-readelf... no Step #4: checking for readelf... readelf Step #4: checking for a Python interpreter with version >= 2.6... python Step #4: checking for python... /usr/bin/python Step #4: checking for python version... 3.8 Step #4: checking for python platform... linux Step #4: checking for python script directory... ${prefix}/lib/python3.8/site-packages Step #4: checking for python extension module directory... ${exec_prefix}/lib/python3.8/site-packages Step #4: configure: Sanitizing prefix: /usr Step #4: configure: Sanitizing exec_prefix: NONE Step #4: checking whether clang is Clang... yes Step #4: checking whether pthreads work with "-pthread" and "-lpthread"... yes Step #4: checking whether Clang needs flag to prevent "argument unused" warning when linking with -pthread... no Step #4: checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #4: checking whether more special flags are required for pthreads... no Step #4: checking for PTHREAD_PRIO_INHERIT... yes Step #4: checking for library containing dlopen... -ldl Step #4: checking for library containing socket... none required Step #4: checking for library containing gethostbyname... none required Step #4: checking for library containing clock_gettime... none required Step #4: checking for pkg-config... /usr/bin/pkg-config Step #4: checking pkg-config is at least version 0.9.0... yes Step #4: checking for SYSTEMD... no Step #4: checking for CHECK... no Step #4: checking for GLIB... yes Step #4: checking for libxml... yes Step #4: checking for sys/wait.h that is POSIX.1 compatible... yes Step #4: checking arpa/inet.h usability... yes Step #4: checking arpa/inet.h presence... yes Step #4: checking for arpa/inet.h... yes Step #4: checking link.h usability... yes Step #4: checking link.h presence... yes Step #4: checking for link.h... yes Step #4: checking fcntl.h usability... yes Step #4: checking fcntl.h presence... yes Step #4: checking for fcntl.h... yes Step #4: checking for inttypes.h... (cached) yes Step #4: checking limits.h usability... yes Step #4: checking limits.h presence... yes Step #4: checking for limits.h... yes Step #4: checking netinet/in.h usability... yes Step #4: checking netinet/in.h presence... yes Step #4: checking for netinet/in.h... yes Step #4: checking for stdint.h... (cached) yes Step #4: checking stddef.h usability... yes Step #4: checking stddef.h presence... yes Step #4: checking for stddef.h... yes Step #4: checking for stdlib.h... (cached) yes Step #4: checking for string.h... (cached) yes Step #4: checking for strings.h... (cached) yes Step #4: checking for dlfcn.h... (cached) yes Step #4: checking time.h usability... yes Step #4: checking time.h presence... yes Step #4: checking for time.h... yes Step #4: checking sys/time.h usability... yes Step #4: checking sys/time.h presence... yes Step #4: checking for sys/time.h... yes Step #4: checking for sys/types.h... (cached) yes Step #4: checking for sys/stat.h... (cached) yes Step #4: checking sys/param.h usability... yes Step #4: checking sys/param.h presence... yes Step #4: checking for sys/param.h... yes Step #4: checking sys/socket.h usability... yes Step #4: checking sys/socket.h presence... yes Step #4: checking for sys/socket.h... yes Step #4: checking for sys/time.h... (cached) yes Step #4: checking sys/poll.h usability... yes Step #4: checking sys/poll.h presence... yes Step #4: checking for sys/poll.h... yes Step #4: checking sys/epoll.h usability... yes Step #4: checking sys/epoll.h presence... yes Step #4: checking for sys/epoll.h... yes Step #4: checking sys/uio.h usability... yes Step #4: checking sys/uio.h presence... yes Step #4: checking for sys/uio.h... yes Step #4: checking sys/event.h usability... no Step #4: checking sys/event.h presence... no Step #4: checking for sys/event.h... no Step #4: checking sys/sockio.h usability... no Step #4: checking sys/sockio.h presence... no Step #4: checking for sys/sockio.h... no Step #4: checking sys/un.h usability... yes Step #4: checking sys/un.h presence... yes Step #4: checking for sys/un.h... yes Step #4: checking sys/resource.h usability... yes Step #4: checking sys/resource.h presence... yes Step #4: checking for sys/resource.h... yes Step #4: checking syslog.h usability... yes Step #4: checking syslog.h presence... yes Step #4: checking for syslog.h... yes Step #4: checking errno.h usability... yes Step #4: checking errno.h presence... yes Step #4: checking for errno.h... yes Step #4: checking for unistd.h... (cached) yes Step #4: checking sys/mman.h usability... yes Step #4: checking sys/mman.h presence... yes Step #4: checking for sys/mman.h... yes Step #4: checking sys/sem.h usability... yes Step #4: checking sys/sem.h presence... yes Step #4: checking for sys/sem.h... yes Step #4: checking sys/ipc.h usability... yes Step #4: checking sys/ipc.h presence... yes Step #4: checking for sys/ipc.h... yes Step #4: checking sys/msg.h usability... yes Step #4: checking sys/msg.h presence... yes Step #4: checking for sys/msg.h... yes Step #4: checking netdb.h usability... yes Step #4: checking netdb.h presence... yes Step #4: checking for netdb.h... yes Step #4: checking for uid_t in sys/types.h... yes Step #4: checking for inline... inline Step #4: checking for int32_t... yes Step #4: checking for int64_t... yes Step #4: checking for int8_t... yes Step #4: checking for mode_t... yes Step #4: checking for pid_t... yes Step #4: checking for size_t... yes Step #4: checking for ssize_t... yes Step #4: checking for uint64_t... yes Step #4: checking for uint32_t... yes Step #4: checking for uint16_t... yes Step #4: checking for uint8_t... yes Step #4: checking for struct sockaddr_un.sun_len... no Step #4: checking looking for union semun in sys/sem.h... no Step #4: checking for clock_gettime... yes Step #4: checking for unistd.h... (cached) yes Step #4: checking for working chown... yes Step #4: checking vfork.h usability... no Step #4: checking vfork.h presence... no Step #4: checking for vfork.h... no Step #4: checking for fork... yes Step #4: checking for vfork... yes Step #4: checking for working fork... yes Step #4: checking for working vfork... (cached) yes Step #4: checking for stdlib.h... (cached) yes Step #4: checking for unistd.h... (cached) yes Step #4: checking for sys/param.h... (cached) yes Step #4: checking for getpagesize... yes Step #4: checking for working mmap... yes Step #4: checking whether strerror_r is declared... yes Step #4: checking for strerror_r... yes Step #4: checking whether strerror_r returns char *... yes Step #4: checking for alarm... yes Step #4: checking for fsync... yes Step #4: checking for fdatasync... yes Step #4: checking for ftruncate... yes Step #4: checking for posix_fallocate... yes Step #4: checking for gettimeofday... yes Step #4: checking for localtime... yes Step #4: checking for localtime_r... yes Step #4: checking for memset... yes Step #4: checking for munmap... yes Step #4: checking for socket... yes Step #4: checking for strchr... yes Step #4: checking for strrchr... yes Step #4: checking for strdup... yes Step #4: checking for strstr... yes Step #4: checking for strcasecmp... yes Step #4: checking for poll... yes Step #4: checking for epoll_create... yes Step #4: checking for epoll_create1... yes Step #4: checking for kqueue... no Step #4: checking for random... yes Step #4: checking for rand... yes Step #4: checking for getrlimit... yes Step #4: checking for sysconf... yes Step #4: checking for getpeerucred... no Step #4: checking for getpeereid... no Step #4: checking for openat... yes Step #4: checking for unlinkat... yes Step #4: checking for pthread_spin_lock... yes Step #4: checking for pthread_setschedparam... yes Step #4: checking for pthread_mutexattr_setpshared... yes Step #4: checking for pthread_condattr_setpshared... yes Step #4: checking for sem_timedwait... yes Step #4: checking for semtimedop... yes Step #4: checking for MSG_NOSIGNAL... yes Step #4: checking for SO_NOSIGPIPE ... no Step #4: checking for RTLD_NEXT... yes Step #4: checking for strlcpy... no Step #4: checking for strlcat... no Step #4: checking for strchrnul... yes Step #4: checking for architecture in x86_64... x86_64 Step #4: checking for os in linux-gnu... Linux Step #4: checking whether GCC supports builtin sync intrinsics... yes Step #4: checking whether GCC supports builtin atomic intrinsics... yes Step #4: checking whether atomics need memory barrier... yes Step #4: checking whether clang supports "-Wall"... yes Step #4: checking whether clang supports "-Wextra"... yes Step #4: checking whether clang supports "-Wunused"... yes Step #4: checking whether clang supports "-Wshadow"... yes Step #4: checking whether clang supports "-Wmissing-prototypes"... yes Step #4: checking whether clang supports "-Wmissing-declarations"... yes Step #4: checking whether clang supports "-Wsuggest-attribute=noreturn"... no Step #4: checking whether clang supports "-Wsuggest-attribute=format"... no Step #4: checking whether clang supports "-Wproperty-attribute-mismatch"... yes Step #4: checking whether clang supports "-Wstrict-prototypes"... no Step #4: checking whether clang supports "-Wpointer-arith"... yes Step #4: checking whether clang supports "-Wwrite-strings"... yes Step #4: checking whether clang supports "-Wcast-align"... yes Step #4: checking whether clang supports "-Wbad-function-cast"... yes Step #4: checking whether clang supports "-Wmissing-format-attribute"... yes Step #4: checking whether clang supports "-Wfloat-equal"... yes Step #4: checking whether clang supports "-Wformat=2"... yes Step #4: checking whether clang supports "-Wformat-signedness"... no Step #4: checking whether clang supports "-Wshift-overflow"... yes Step #4: checking whether clang supports "-Wshift-overflow=2"... no Step #4: checking whether clang supports "-Woverlength-strings"... yes Step #4: checking whether clang supports "-Wredundent-decls"... no Step #4: checking whether clang supports "-Winit-self"... yes Step #4: checking whether clang supports "-Wuninitialized"... yes Step #4: checking whether clang supports "-Wunknown-pragmas"... yes Step #4: checking whether clang supports "-Wno-unused-parameter"... yes Step #4: checking whether clang supports "-Wunused-const-variable"... yes Step #4: checking whether clang supports "-Wno-format-nonliteral"... yes Step #4: checking whether clang supports "-Wno-format-truncation"... no Step #4: checking whether clang supports "-Wno-sign-compare"... yes Step #4: checking whether clang supports "-Wmissing-format-attribute"... yes Step #4: checking whether clang supports "-Wsuggest-attribute=format"... no Step #4: configure: Enabling inter-library dependencies: Step #4: checking for GNU date... yes Step #4: checking for BSD date... no Step #4: checking for date type... gnu Step #4: checking whether GNU date supports --date... yes Step #4: checking whether GNU date supports --utc... yes Step #4: configure: trying to determine source epoch Step #4: checking for source epoch in $SOURCE_EPOCH... no Step #4: checking for source epoch in source_epoch file... no Step #4: checking for source epoch baked in by gitattributes export-subst... no Step #4: checking for source epoch in $SOURCE_DATE_EPOCH... no Step #4: checking whether git log can provide a source epoch... yes Step #4: configure: using source epoch 2024-08-28 14:34:04 UTC Step #4: checking that generated files are newer than configure... done Step #4: configure: creating ./config.status Step #4: config.status: creating Makefile Step #4: config.status: creating include/Makefile Step #4: config.status: creating include/qb/Makefile Step #4: config.status: creating lib/Makefile Step #4: config.status: creating lib/libqb.pc Step #4: config.status: creating tools/Makefile Step #4: config.status: creating tests/Makefile Step #4: config.status: creating tests/test.conf Step #4: config.status: creating examples/Makefile Step #4: config.status: creating doxygen2man/Makefile Step #4: config.status: creating docs/Makefile Step #4: config.status: creating docs/man.dox Step #4: config.status: creating lib/qblog_script.la Step #4: config.status: creating include/config.h Step #4: config.status: creating include/qb/qbconfig.h Step #4: config.status: executing depfiles commands Step #4: config.status: executing libtool commands Step #4: Step #4: libqb configuration: Step #4: Version = 2.0.8.6-4e7e Step #4: Prefix = /usr Step #4: Executables = ${exec_prefix}/sbin Step #4: Man pages = ${datarootdir}/man Step #4: Doc dir = ${datarootdir}/doc/${PACKAGE_TARNAME} Step #4: Libraries = /usr/lib64 Step #4: Header files = ${prefix}/include Step #4: Arch-independent files = ${datarootdir} Step #4: State information = /var Step #4: System configuration = /etc Step #4: SOCKETDIR = /var/run Step #4: Features = epoll gcc__sync Step #4: Use systemd journal = no Step #4: Step #4: libqb build info: Step #4: Optimization = Step #4: Debug options = Step #4: Extra compiler warnings = Step #4: Env. defined CFLAG = -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #4: Env. defined CPPFLAGS = Step #4: Env. defined LDFLAGS = Step #4: ANSI defined CPPFLAGS = Step #4: Coverage CFLAGS = Step #4: Coverage LDFLAGS = Step #4: Fatal War. CFLAGS = Step #4: Final CFLAGS = -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -Wextra -Wunused -Wshadow -Wmissing-prototypes -Wmissing-declarations -Wproperty-attribute-mismatch -Wpointer-arith -Wwrite-strings -Wcast-align -Wbad-function-cast -Wmissing-format-attribute -Wfloat-equal -Wformat=2 -Wshift-overflow -Woverlength-strings -Winit-self -Wuninitialized -Wunknown-pragmas -Wno-unused-parameter -Wunused-const-variable -Wno-format-nonliteral -Wno-sign-compare Step #4: Final CPPFLAGS = Step #4: Final LDFLAGS = Step #4: echo 2.0.8.6-4e7e > .version-t && mv .version-t .version Step #4: make all-recursive Step #4: make[1]: Entering directory '/src/libqb' Step #4: Making all in include Step #4: make[2]: Entering directory '/src/libqb/include' Step #4: make all-recursive Step #4: make[3]: Entering directory '/src/libqb/include' Step #4: Making all in qb Step #4: make[4]: Entering directory '/src/libqb/include/qb' Step #4: make all-am Step #4: make[5]: Entering directory '/src/libqb/include/qb' Step #4: make[5]: Leaving directory '/src/libqb/include/qb' Step #4: make[4]: Leaving directory '/src/libqb/include/qb' Step #4: make[4]: Entering directory '/src/libqb/include' Step #4: make[4]: Leaving directory '/src/libqb/include' Step #4: make[3]: Leaving directory '/src/libqb/include' Step #4: make[2]: Leaving directory '/src/libqb/include' Step #4: Making all in lib Step #4: make[2]: Entering directory '/src/libqb/lib' Step #4: CC libqb_la-util.lo Step #4: CC libqb_la-hdb.lo Step #4: CC libqb_la-ringbuffer.lo Step #4: CC libqb_la-ringbuffer_helper.lo Step #4: CC libqb_la-array.lo Step #4: CC libqb_la-loop.lo Step #4: loop.c:40:9: warning: cast from 'char *' to 'struct qb_loop_item *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 40 | job = qb_list_first_entry(&level->job_head, struct qb_loop_item, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #4: 207 | qb_list_entry((ptr)->next, type, member) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 1 warning generated. Step #4:  CC libqb_la-loop_poll.lo Step #4: loop_poll.c:564:10: warning: cast from 'char *' to 'struct qb_loop_item *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 564 | item = qb_list_entry(list, struct qb_loop_item, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:593:10: warning: cast from 'char *' to 'struct qb_loop_item *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 593 | item = qb_list_entry(list, struct qb_loop_item, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:632:3: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 632 | qb_list_for_each_entry(item, &s->sig_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:632:3: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 632 | qb_list_for_each_entry(item, &s->sig_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 244 |  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:747:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 747 | qb_list_for_each_entry(item, &l->level[sig->p].wait_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:747:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 747 | qb_list_for_each_entry(item, &l->level[sig->p].wait_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  244 |  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:760:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 760 | qb_list_for_each_entry(item, &l->level[sig->p].job_head, list) { Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_poll.c:760:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 760 | qb_list_for_each_entry(item, &l->level[sig->p].job_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 8 warnings generated. Step #4:  CC libqb_la-loop_job.lo Step #4: loop_job.c:37:28: warning: cast from 'char *' to 'struct qb_loop_job *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 37 | struct qb_loop_job *job = qb_list_entry(item, struct qb_loop_job, item); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_job.c:142:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 142 | qb_list_for_each_entry(item, &l->level[p].wait_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_job.c:142:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 142 | qb_list_for_each_entry(item, &l->level[p].wait_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_job.c:153:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 153 | qb_list_for_each_entry(item, &l->level[p].job_head, list) { Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: loop_job.c:153:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 153 | qb_list_for_each_entry(item, &l->level[p].job_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 5 warnings generated. Step #4:  CC libqb_la-loop_timerlist.lo Step #4: CC libqb_la-ipcc.lo Step #4: CC libqb_la-ipcs.lo Step #4: ipcs.c:196:7: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 196 | c = qb_list_entry(pos, struct qb_ipcs_connection, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ipcs.c:243:7: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 243 | c = qb_list_entry(pos, struct qb_ipcs_connection, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ipcs.c:484:6: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 484 | c = qb_list_first_entry(&s->connections, struct qb_ipcs_connection, Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 485 | list); Step #4: | ~~~~~ Step #4: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #4: 207 | qb_list_entry((ptr)->next, type, member) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ipcs.c:502:6: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 502 | c = qb_list_first_entry(¤t->list, struct qb_ipcs_connection, Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 503 | list); Step #4: | ~~~~~ Step #4: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #4: 207 | qb_list_entry((ptr)->next, type, member) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 4 warnings generated. Step #4:  CC libqb_la-ipc_shm.lo Step #4: CC libqb_la-ipc_setup.lo Step #4: CC libqb_la-ipc_socket.lo Step #4: CC libqb_la-log.lo Step #4: log.c:354:11: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 354 | flt = qb_list_entry(f_item, struct qb_log_filter, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:362:11: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 362 | flt = qb_list_entry(f_item, struct qb_log_filter, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:481:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 481 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:481:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 481 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  244 |   pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:508:3: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 508 | qb_list_for_each_entry(flt, &t->filter_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:508:3: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 508 | qb_list_for_each_entry(flt, &t->filter_head, list) { Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:514:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 514 | qb_list_for_each_entry(flt, &tags_head, list) { Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:514:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 514 | qb_list_for_each_entry(flt, &tags_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:542:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 542 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 |  ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:542:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 542 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 244 |  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:558:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 558 | qb_list_for_each_entry(flt, list_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:558:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 558 | qb_list_for_each_entry(flt, list_head, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:645:10: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 645 | flt = qb_list_entry(iter, struct qb_log_filter, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:659:10: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 659 | flt = qb_list_entry(iter, struct qb_log_filter, list); Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:770:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 770 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:770:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 770 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 244 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:791:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 791 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #4: 242 | for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:791:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 791 | qb_list_for_each_entry(sect, &callsite_sections, list) { Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #4:  244 |   pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:886:10: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 886 | flt = qb_list_entry(iter2, struct qb_log_filter, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:894:7: warning: cast from 'char *' to 'struct callsite_section *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 894 | s = qb_list_entry(iter, struct callsite_section, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log.c:899:9: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 899 | flt = qb_list_entry(iter, struct qb_log_filter, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 21 warnings generated. Step #4:  CC libqb_la-log_thread.lo Step #4: log_thread.c:89:7: warning: cast from 'char *' to 'struct qb_log_record *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 89 | qb_list_first_entry(&logt_print_finished_records, Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 90 | struct qb_log_record, list); Step #4: | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #4: 207 | qb_list_entry((ptr)->next, type, member) Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: log_thread.c:285:10: warning: cast from 'char *' to 'struct qb_log_record *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 285 | rec = qb_list_first_entry(&logt_print_finished_records, Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 286 | struct qb_log_record, list); Step #4: | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #4: 207 | qb_list_entry((ptr)->next, type, member) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 |  ((type *)((char*)ptr - offsetof(type, member))); }) Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 2 warnings generated. Step #4:  CC libqb_la-log_blackbox.lo Step #4: CC libqb_la-log_file.lo Step #4: CC libqb_la-log_syslog.lo Step #4: CC libqb_la-log_dcs.lo Step #4: CC libqb_la-log_format.lo Step #4: CC libqb_la-map.lo Step #4: CC libqb_la-skiplist.lo Step #4: skiplist.c:206:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 206 | tn = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: skiplist.c:216:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 216 | tn = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: skiplist.c:244:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 244 | tn = qb_list_entry(pos, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: skiplist.c:285:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 285 | f = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: skiplist.c:342:7: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 342 | f = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 5 warnings generated. Step #4:  CC libqb_la-hashtable.lo Step #4: hashtable.c:100:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 100 | hash_node = qb_list_entry(list, struct hash_node, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:132:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 132 | tn = qb_list_entry(pos, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:164:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 164 | hash_node = qb_list_entry(list, struct hash_node, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:198:14: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 198 | node_try = qb_list_entry(list, struct hash_node, list); Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:246:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 246 | tn = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:254:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 254 | tn = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 |  ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:296:7: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 296 | f = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:353:7: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 353 | f = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:415:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 415 | hash_node = qb_list_first_entry(ln, struct hash_node, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #4: 207 | qb_list_entry((ptr)->next, type, member) Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:416:3: warning: cast from 'char *' to 'typeof (*hash_node) *' (aka 'struct hash_node *') increases required alignment from 1 to 8 [-Wcast-align] Step #4: 416 | qb_list_for_each_entry_from(hash_node, Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 417 |     &hash_table->hash_buckets[b].list_head, list) { Step #4: | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:291:13: note: expanded from macro 'qb_list_for_each_entry_from' Step #4:  291 | pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:458:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 458 | tn = qb_list_entry(pos, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: hashtable.c:476:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 476 | hash_node = qb_list_entry(pos, struct hash_node, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 12 warnings generated. Step #4:  CC libqb_la-trie.lo Step #4: trie.c:600:9: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 600 | tn = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: trie.c:642:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 642 | f = qb_list_entry(list, struct qb_map_notifier, list); Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: trie.c:704:31: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 704 | struct qb_map_notifier *f = qb_list_entry(list, struct qb_map_notifier, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 3 warnings generated. Step #4:  CC libqb_la-unix.lo Step #4: CC libqb_la-loop_poll_epoll.lo Step #4: CC strlcpy.lo Step #4: CC strlcat.lo Step #4: GEN qblog_script.ld Step #4: CCLD libqb.la Step #4: make[2]: Leaving directory '/src/libqb/lib' Step #4: Making all in doxygen2man Step #4: make[2]: Entering directory '/src/libqb/doxygen2man' Step #4: CC doxygen2man-doxygen2man.o Step #4: doxygen2man.c:160:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 160 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:640:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 640 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:661:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 661 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:815:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 815 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:856:9: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 856 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:871:9: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 871 | pi = qb_list_entry(iter, struct param_info, list); Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:924:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 924 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:968:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 968 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4:  198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4: |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: doxygen2man.c:974:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 974 | pi = qb_list_entry(iter, struct param_info, list); Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #4: 198 | ((type *)((char*)ptr - offsetof(type, member))); }) Step #4:  | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 9 warnings generated. Step #4:  CC doxygen2man-cstring.o Step #4: cstring.c:31:30: warning: cast from 'char *' to 'struct cstring_header *' increases required alignment from 1 to 8 [-Wcast-align] Step #4: 31 | struct cstring_header *h = (struct cstring_header *)cstring; Step #4: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #4: 1 warning generated. Step #4:  CCLD doxygen2man Step #4: make[2]: Leaving directory '/src/libqb/doxygen2man' Step #4: Making all in docs Step #4: make[2]: Entering directory '/src/libqb/docs' Step #4: make[2]: Nothing to be done for 'all'. Step #4: make[2]: Leaving directory '/src/libqb/docs' Step #4: Making all in tools Step #4: make[2]: Entering directory '/src/libqb/tools' Step #4: CC qb_blackbox-qb_blackbox.o Step #4: CCLD qb-blackbox Step #4: make[2]: Leaving directory '/src/libqb/tools' Step #4: Making all in examples Step #4: make[2]: Entering directory '/src/libqb/examples' Step #4: CC mapnotify-mapnotify.o Step #4: CCLD mapnotify Step #4: CC simplelog-simplelog.o Step #4: CCLD simplelog Step #4: CC tcpclient-tcpclient.o Step #4: CCLD tcpclient Step #4: CC tcpserver-tcpserver.o Step #4: CCLD tcpserver Step #4: CC ipcclient-ipcclient.o Step #4: CCLD ipcclient Step #4: CC ipcserver-ipcserver.o Step #4: CCLD ipcserver Step #4: make[2]: Leaving directory '/src/libqb/examples' Step #4: Making all in tests Step #4: make[2]: Entering directory '/src/libqb/tests' Step #4: CC bmc.o Step #4: CCLD bmc Step #4: CC bmcpt-bmcpt.o Step #4: CCLD bmcpt Step #4: CC bms-bms.o Step #4: CCLD bms Step #4: CC rbreader.o Step #4: CCLD rbreader Step #4: CC rbwriter.o Step #4: CCLD rbwriter Step #4: CC bench-log.o Step #4: CCLD bench-log Step #4: CC format_compare_speed.o Step #4: CCLD format_compare_speed Step #4: CC loop.o Step #4: CCLD loop Step #4: CC print_ver.o Step #4: print_ver.c:42:1: warning: "2.0.8.6-4e7e" parsed as: "2" "." "0" "." "8" ".6-4e7e" [-W#pragma-messages] Step #4: 42 | _Pragma(MSG); Step #4: | ^ Step #4: :151:2: note: expanded from here Step #4: 151 | message ("\"2.0.8.6-4e7e\" parsed as: \"2\" \".\" \"0\" \".\" \"8\" \".6-4e7e\"") Step #4: | ^ Step #4: 1 warning generated. Step #4:  CCLD print_ver Step #4: make[2]: Leaving directory '/src/libqb/tests' Step #4: make[2]: Entering directory '/src/libqb' Step #4: make[2]: Nothing to be done for 'all-am'. Step #4: make[2]: Leaving directory '/src/libqb' Step #4: make[1]: Leaving directory '/src/libqb' Step #4: make install-recursive Step #4: make[1]: Entering directory '/src/libqb' Step #4: Making install in include Step #4: make[2]: Entering directory '/src/libqb/include' Step #4: Making install in qb Step #4: make[3]: Entering directory '/src/libqb/include/qb' Step #4: make[4]: Entering directory '/src/libqb/include/qb' Step #4: make[4]: Nothing to be done for 'install-exec-am'. Step #4: /usr/bin/mkdir -p '/usr/include/qb/' Step #4: /usr/bin/install -c -m 644 qbhdb.h qblist.h qbdefs.h qbatomic.h qbloop.h qbrb.h qbutil.h qbarray.h qbipcc.h qbipcs.h qbipc_common.h qblog.h qbconfig.h qbmap.h '/usr/include/qb/' Step #4: make[4]: Leaving directory '/src/libqb/include/qb' Step #4: make[3]: Leaving directory '/src/libqb/include/qb' Step #4: make[3]: Entering directory '/src/libqb/include' Step #4: make[4]: Entering directory '/src/libqb/include' Step #4: make[4]: Nothing to be done for 'install-exec-am'. Step #4: make[4]: Nothing to be done for 'install-data-am'. Step #4: make[4]: Leaving directory '/src/libqb/include' Step #4: make[3]: Leaving directory '/src/libqb/include' Step #4: make[2]: Leaving directory '/src/libqb/include' Step #4: Making install in lib Step #4: make[2]: Entering directory '/src/libqb/lib' Step #4: make[3]: Entering directory '/src/libqb/lib' Step #4: /usr/bin/mkdir -p '/usr/lib64' Step #4: /bin/bash ../libtool --mode=install /usr/bin/install -c libqb.la '/usr/lib64' Step #4: libtool: install: /usr/bin/install -c .libs/libqb.so.100.3.2 /usr/lib64/libqb.so.100.3.2 Step #4: libtool: install: (cd /usr/lib64 && { ln -s -f libqb.so.100.3.2 libqb.so.100 || { rm -f libqb.so.100 && ln -s libqb.so.100.3.2 libqb.so.100; }; }) Step #4: libtool: install: (cd /usr/lib64 && { ln -s -f libqb.so.100.3.2 libqb.so || { rm -f libqb.so && ln -s libqb.so.100.3.2 libqb.so; }; }) Step #4: libtool: install: /usr/bin/install -c .libs/libqb.lai /usr/lib64/libqb.la Step #4: libtool: install: /usr/bin/install -c .libs/libqb.a /usr/lib64/libqb.a Step #4: libtool: install: chmod 644 /usr/lib64/libqb.a Step #4: libtool: install: ranlib /usr/lib64/libqb.a Step #4: libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /usr/lib64 Step #4: ---------------------------------------------------------------------- Step #4: Libraries have been installed in: Step #4: /usr/lib64 Step #4: Step #4: If you ever happen to want to link against installed libraries Step #4: in a given directory, LIBDIR, you must either use libtool, and Step #4: specify the full pathname of the library, or use the '-LLIBDIR' Step #4: flag during linking and do at least one of the following: Step #4: - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #4: during execution Step #4: - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #4: during linking Step #4: - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #4: - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #4: Step #4: See any operating system documentation about shared libraries for Step #4: more information, such as the ld(1) and ld.so(8) manual pages. Step #4: ---------------------------------------------------------------------- Step #4: /usr/bin/mkdir -p '/usr/lib64/pkgconfig' Step #4: /usr/bin/install -c -m 644 libqb.pc '/usr/lib64/pkgconfig' Step #4: make[3]: Nothing to be done for 'install-data-am'. Step #4: make[3]: Leaving directory '/src/libqb/lib' Step #4: make[2]: Leaving directory '/src/libqb/lib' Step #4: Making install in doxygen2man Step #4: make[2]: Entering directory '/src/libqb/doxygen2man' Step #4: make[3]: Entering directory '/src/libqb/doxygen2man' Step #4: /usr/bin/mkdir -p '/usr/bin' Step #4: /bin/bash ../libtool --mode=install /usr/bin/install -c doxygen2man '/usr/bin' Step #4: libtool: install: /usr/bin/install -c .libs/doxygen2man /usr/bin/doxygen2man Step #4: /usr/bin/mkdir -p '/usr/share/man/man1' Step #4: /usr/bin/install -c -m 644 doxygen2man.1 '/usr/share/man/man1' Step #4: make[3]: Leaving directory '/src/libqb/doxygen2man' Step #4: make[2]: Leaving directory '/src/libqb/doxygen2man' Step #4: Making install in docs Step #4: make[2]: Entering directory '/src/libqb/docs' Step #4: make[3]: Entering directory '/src/libqb/docs' Step #4: make[3]: Nothing to be done for 'install-exec-am'. Step #4: /usr/bin/mkdir -p '/usr/share/man/man3' Step #4: /usr/bin/mkdir -p '/usr/share/man/man8' Step #4: /usr/bin/install -c -m 644 man8/qb-blackbox.8 '/usr/share/man/man8' Step #4: make[3]: Leaving directory '/src/libqb/docs' Step #4: make[2]: Leaving directory '/src/libqb/docs' Step #4: Making install in tools Step #4: make[2]: Entering directory '/src/libqb/tools' Step #4: make[3]: Entering directory '/src/libqb/tools' Step #4: /usr/bin/mkdir -p '/usr/sbin' Step #4: /bin/bash ../libtool --mode=install /usr/bin/install -c qb-blackbox '/usr/sbin' Step #4: libtool: install: /usr/bin/install -c .libs/qb-blackbox /usr/sbin/qb-blackbox Step #4: make[3]: Nothing to be done for 'install-data-am'. Step #4: make[3]: Leaving directory '/src/libqb/tools' Step #4: make[2]: Leaving directory '/src/libqb/tools' Step #4: Making install in examples Step #4: make[2]: Entering directory '/src/libqb/examples' Step #4: make[3]: Entering directory '/src/libqb/examples' Step #4: make[3]: Nothing to be done for 'install-exec-am'. Step #4: make[3]: Nothing to be done for 'install-data-am'. Step #4: make[3]: Leaving directory '/src/libqb/examples' Step #4: make[2]: Leaving directory '/src/libqb/examples' Step #4: Making install in tests Step #4: make[2]: Entering directory '/src/libqb/tests' Step #4: make[3]: Entering directory '/src/libqb/tests' Step #4: make[3]: Nothing to be done for 'install-exec-am'. Step #4: make[3]: Leaving directory '/src/libqb/tests' Step #4: make[2]: Leaving directory '/src/libqb/tests' Step #4: make[2]: Entering directory '/src/libqb' Step #4: make[3]: Entering directory '/src/libqb' Step #4: make[3]: Nothing to be done for 'install-exec-am'. Step #4: /usr/bin/mkdir -p '/usr/share/doc/libqb' Step #4: /usr/bin/install -c -m 644 COPYING INSTALL README.markdown '/usr/share/doc/libqb' Step #4: make[3]: Leaving directory '/src/libqb' Step #4: make[2]: Leaving directory '/src/libqb' Step #4: make[1]: Leaving directory '/src/libqb' Step #4: Removing intermediate container a0afff2e6c7f Step #4: ---> b0d22d11e67b Step #4: Step 4/6 : RUN git clone --recurse-submodules --depth 1 https://github.com/USBGuard/usbguard usbguard Step #4: ---> Running in 4ebf8cb08463 Step #4: Cloning into 'usbguard'... Step #4: Submodule 'src/ThirdParty/Catch' (https://github.com/philsquared/Catch) registered for path 'src/ThirdParty/Catch' Step #4: Submodule 'src/ThirdParty/PEGTL' (https://github.com/ColinH/PEGTL) registered for path 'src/ThirdParty/PEGTL' Step #4: Cloning into '/src/usbguard/src/ThirdParty/Catch'... Step #4: Cloning into '/src/usbguard/src/ThirdParty/PEGTL'... Step #4: Submodule path 'src/ThirdParty/Catch': checked out '216713a4066b79d9803d374f261ccb30c0fb451f' Step #4: Submodule path 'src/ThirdParty/PEGTL': checked out 'eeba7fa1180655bd683be620cc31be35607442ca' Step #4: Removing intermediate container 4ebf8cb08463 Step #4: ---> f0851d17ed2d Step #4: Step 5/6 : WORKDIR usbguard Step #4: ---> Running in 8ec09525a93e Step #4: Removing intermediate container 8ec09525a93e Step #4: ---> 384d2e30dc94 Step #4: Step 6/6 : COPY build.sh $SRC Step #4: ---> bf4aec6c8c58 Step #4: Successfully built bf4aec6c8c58 Step #4: Successfully tagged gcr.io/oss-fuzz/usbguard:latest Finished Step #4 Starting Step #5 - "srcmap" Step #5 - "srcmap": Already have image: gcr.io/oss-fuzz/usbguard Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + SRCMAP=/tmp/fileeBXlDO Step #5 - "srcmap": + echo '{}' Step #5 - "srcmap": + PATHS_TO_SCAN=/src Step #5 - "srcmap": + [[ c++ == \g\o ]] Step #5 - "srcmap": ++ find /src -name .git -type d Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/usbguard/.git Step #5 - "srcmap": + GIT_DIR=/src/usbguard Step #5 - "srcmap": + cd /src/usbguard Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/USBGuard/usbguard Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=d8f6595b0dbdecb64b63d9f3277fc59d48433c1d Step #5 - "srcmap": + jq_inplace /tmp/fileeBXlDO '."/src/usbguard" = { type: "git", url: "https://github.com/USBGuard/usbguard", rev: "d8f6595b0dbdecb64b63d9f3277fc59d48433c1d" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/fileoFX5la Step #5 - "srcmap": + cat /tmp/fileeBXlDO Step #5 - "srcmap": + jq '."/src/usbguard" = { type: "git", url: "https://github.com/USBGuard/usbguard", rev: "d8f6595b0dbdecb64b63d9f3277fc59d48433c1d" }' Step #5 - "srcmap": + mv /tmp/fileoFX5la /tmp/fileeBXlDO Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/libqb/.git Step #5 - "srcmap": + GIT_DIR=/src/libqb Step #5 - "srcmap": + cd /src/libqb Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/ClusterLabs/libqb Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=4e7ebfac9a92a05236459fddb3a8e24ab0688317 Step #5 - "srcmap": + jq_inplace /tmp/fileeBXlDO '."/src/libqb" = { type: "git", url: "https://github.com/ClusterLabs/libqb", rev: "4e7ebfac9a92a05236459fddb3a8e24ab0688317" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/fileb4nrrH Step #5 - "srcmap": + cat /tmp/fileeBXlDO Step #5 - "srcmap": + jq '."/src/libqb" = { type: "git", url: "https://github.com/ClusterLabs/libqb", rev: "4e7ebfac9a92a05236459fddb3a8e24ab0688317" }' Step #5 - "srcmap": + mv /tmp/fileb4nrrH /tmp/fileeBXlDO Step #5 - "srcmap": ++ find /src -name .svn -type d Step #5 - "srcmap": ++ find /src -name .hg -type d Step #5 - "srcmap": + '[' '' '!=' '' ']' Step #5 - "srcmap": + cat /tmp/fileeBXlDO Step #5 - "srcmap": + rm /tmp/fileeBXlDO Step #5 - "srcmap": { Step #5 - "srcmap": "/src/usbguard": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/USBGuard/usbguard", Step #5 - "srcmap": "rev": "d8f6595b0dbdecb64b63d9f3277fc59d48433c1d" Step #5 - "srcmap": }, Step #5 - "srcmap": "/src/libqb": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/ClusterLabs/libqb", Step #5 - "srcmap": "rev": "4e7ebfac9a92a05236459fddb3a8e24ab0688317" Step #5 - "srcmap": } Step #5 - "srcmap": } Finished Step #5 - "srcmap" Starting Step #6 - "compile-libfuzzer-introspector-x86_64" Step #6 - "compile-libfuzzer-introspector-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": vm.mmap_rnd_bits = 28 Step #6 - "compile-libfuzzer-introspector-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": CC=clang Step #6 - "compile-libfuzzer-introspector-x86_64": CXX=clang++ Step #6 - "compile-libfuzzer-introspector-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument -fsanitize=fuzzer-no-link -g Step #6 - "compile-libfuzzer-introspector-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument -fsanitize=fuzzer-no-link -stdlib=libc++ -g Step #6 - "compile-libfuzzer-introspector-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=introspector -Cdebuginfo=1 -Cforce-frame-pointers Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": + export PKG_CONFIG_PATH=/usr/lib64/pkgconfig/ Step #6 - "compile-libfuzzer-introspector-x86_64": + PKG_CONFIG_PATH=/usr/lib64/pkgconfig/ Step #6 - "compile-libfuzzer-introspector-x86_64": + autoreconf -fi Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'config'. Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: copying file 'config/ltmain.sh' Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #6 - "compile-libfuzzer-introspector-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #6 - "compile-libfuzzer-introspector-x86_64": configure.ac:51: installing 'config/compile' Step #6 - "compile-libfuzzer-introspector-x86_64": configure.ac:139: installing 'config/config.guess' Step #6 - "compile-libfuzzer-introspector-x86_64": configure.ac:139: installing 'config/config.sub' Step #6 - "compile-libfuzzer-introspector-x86_64": configure.ac:10: installing 'config/install-sh' Step #6 - "compile-libfuzzer-introspector-x86_64": configure.ac:10: installing 'config/missing' Step #6 - "compile-libfuzzer-introspector-x86_64": Makefile.am: installing 'config/depcomp' Step #6 - "compile-libfuzzer-introspector-x86_64": parallel-tests: installing 'config/test-driver' Step #6 - "compile-libfuzzer-introspector-x86_64": ++ find /usr/lib64/ -name libqb.a -print -quit Step #6 - "compile-libfuzzer-introspector-x86_64": + libqb=/usr/lib64/libqb.a Step #6 - "compile-libfuzzer-introspector-x86_64": ++ find /usr/lib/ -name libprotobuf.a -print -quit Step #6 - "compile-libfuzzer-introspector-x86_64": + protobuf=/usr/lib/x86_64-linux-gnu/libprotobuf.a Step #6 - "compile-libfuzzer-introspector-x86_64": + qb_LIBS=/usr/lib64/libqb.a Step #6 - "compile-libfuzzer-introspector-x86_64": + protobuf_LIBS='-pthread /usr/lib/x86_64-linux-gnu/libprotobuf.a -pthread -lpthread' Step #6 - "compile-libfuzzer-introspector-x86_64": + ./configure --with-bundled-catch --with-bundled-pegtl --with-crypto-library=gcrypt --disable-shared Step #6 - "compile-libfuzzer-introspector-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether build environment is sane... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #6 - "compile-libfuzzer-introspector-x86_64": checking for gawk... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for mawk... mawk Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether make sets $(MAKE)... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether make supports nested variables... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to create a pax tar archive... gnutar Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether make supports nested variables... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether make supports the include directive... yes (GNU style) Step #6 - "compile-libfuzzer-introspector-x86_64": checking for gcc... clang Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether the C compiler works... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for C compiler default output file name... a.out Step #6 - "compile-libfuzzer-introspector-x86_64": checking for suffix of executables... Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether we are cross compiling... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for suffix of object files... o Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether we are using the GNU C compiler... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether clang accepts -g... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for clang option to accept ISO C89... none needed Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether clang understands -c and -o together... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking dependency style of clang... gcc3 Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether C compiler accepts -Wno-implicit-fallthrough... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether we are using the GNU C++ compiler... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether clang++ accepts -g... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking dependency style of clang++... gcc3 Step #6 - "compile-libfuzzer-introspector-x86_64": checking for clang option to accept ISO C99... none needed Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether make sets $(MAKE)... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking build system type... x86_64-pc-linux-gnu Step #6 - "compile-libfuzzer-introspector-x86_64": checking host system type... x86_64-pc-linux-gnu Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to print strings... printf Step #6 - "compile-libfuzzer-introspector-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #6 - "compile-libfuzzer-introspector-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #6 - "compile-libfuzzer-introspector-x86_64": checking for egrep... /usr/bin/grep -E Step #6 - "compile-libfuzzer-introspector-x86_64": checking for fgrep... /usr/bin/grep -F Step #6 - "compile-libfuzzer-introspector-x86_64": checking for ld used by clang... /usr/bin/ld Step #6 - "compile-libfuzzer-introspector-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for BSD- or MS-compatible name lister (nm)... llvm-nm Step #6 - "compile-libfuzzer-introspector-x86_64": checking the name lister (llvm-nm) interface... BSD nm Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether ln -s works... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking the maximum length of command line arguments... 1572864 Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #6 - "compile-libfuzzer-introspector-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #6 - "compile-libfuzzer-introspector-x86_64": checking for objdump... objdump Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to recognize dependent libraries... pass_all Step #6 - "compile-libfuzzer-introspector-x86_64": checking for dlltool... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #6 - "compile-libfuzzer-introspector-x86_64": checking for archiver @FILE support... @ Step #6 - "compile-libfuzzer-introspector-x86_64": checking for strip... strip Step #6 - "compile-libfuzzer-introspector-x86_64": checking for ranlib... llvm-ranlib Step #6 - "compile-libfuzzer-introspector-x86_64": checking command to parse llvm-nm output from clang object... ok Step #6 - "compile-libfuzzer-introspector-x86_64": checking for sysroot... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for a working dd... /usr/bin/dd Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #6 - "compile-libfuzzer-introspector-x86_64": checking for mt... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking if : is a manifest tool... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to run the C preprocessor... clang -E Step #6 - "compile-libfuzzer-introspector-x86_64": checking for ANSI C header files... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for sys/types.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for sys/stat.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdlib.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for string.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for memory.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for strings.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for inttypes.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdint.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for unistd.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for dlfcn.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for objdir... .libs Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang static flag -static works... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang supports -c -o file.o... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether the clang linker (/usr/bin/ld) supports shared libraries... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to hardcode library paths into programs... immediate Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether stripping libraries is possible... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking if libtool supports shared libraries... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether to build shared libraries... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether to build static libraries... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #6 - "compile-libfuzzer-introspector-x86_64": checking for ld used by clang++... /usr/bin/ld Step #6 - "compile-libfuzzer-introspector-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether the clang++ linker (/usr/bin/ld) supports shared libraries... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang++ static flag -static works... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang++ supports -c -o file.o... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether the clang++ linker (/usr/bin/ld) supports shared libraries... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #6 - "compile-libfuzzer-introspector-x86_64": checking how to hardcode library paths into programs... immediate Step #6 - "compile-libfuzzer-introspector-x86_64": checking for __atomic_add_fetch_8 in -latomic... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for basename function... GNU Step #6 - "compile-libfuzzer-introspector-x86_64": checking for strerror_r function... GNU Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether clang is Clang... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether Clang needs flag to prevent "argument unused" warning when linking with -pthread... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether more special flags are required for pthreads... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for PTHREAD_PRIO_INHERIT... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for NETLINK_KOBJECT_UEVENT definition... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #6 - "compile-libfuzzer-introspector-x86_64": checking pkg-config is at least version 0.9.0... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for qb... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for sodium... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for libcrypto... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for libgcrypt-config... /usr/bin/libgcrypt-config Step #6 - "compile-libfuzzer-introspector-x86_64": checking for LIBGCRYPT - version >= 1.5.0... yes (1.8.5) Step #6 - "compile-libfuzzer-introspector-x86_64": checking for audit... no Step #6 - "compile-libfuzzer-introspector-x86_64": configure: libaudit development files not found! Linux Audit support wille be turned OFF Step #6 - "compile-libfuzzer-introspector-x86_64": checking for seccomp... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for libcapng... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for umockdev... no Step #6 - "compile-libfuzzer-introspector-x86_64": configure: umockdev development files not found! umockdev device manager won't be available Step #6 - "compile-libfuzzer-introspector-x86_64": checking for protobuf... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for protoc... protoc Step #6 - "compile-libfuzzer-introspector-x86_64": configure: Using bundled Catch library Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether we need to link to -lstdc++fs for PEGTL explicitly... no Step #6 - "compile-libfuzzer-introspector-x86_64": configure: Using bundled PEGTL library Step #6 - "compile-libfuzzer-introspector-x86_64": checking tao/pegtl.hpp usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking tao/pegtl.hpp presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for tao/pegtl.hpp... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for dbus... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for xmllint... xmllint Step #6 - "compile-libfuzzer-introspector-x86_64": checking for xsltproc... xsltproc Step #6 - "compile-libfuzzer-introspector-x86_64": checking for gdbus-codegen... gdbus-codegen Step #6 - "compile-libfuzzer-introspector-x86_64": checking for polkit... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for a2x... no Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: Unable to find documentation generator (asciidoc / a2x). Documentation will not be generated. Step #6 - "compile-libfuzzer-introspector-x86_64": checking for aspell... no Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: Unable to find the Aspell spell checker. The test suite will skip spell checking of documentation related files. Step #6 - "compile-libfuzzer-introspector-x86_64": checking for size_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for working alloca.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for alloca... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking arpa/inet.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking arpa/inet.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for arpa/inet.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking fcntl.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking fcntl.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for fcntl.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for inttypes.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking limits.hi usability... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking limits.hi presence... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for limits.hi... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking locale.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking locale.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for locale.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking netdb.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking netdb.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for netdb.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdint.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdlib.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for string.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking sys/time.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking sys/time.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for sys/time.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking syslog.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking syslog.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for syslog.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for unistd.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking wchar.h usability... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking wchar.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for wchar.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking ext/stdio_filebuf.h usability... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking ext/stdio_filebuf.h presence... yes Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ext/stdio_filebuf.h: present but cannot be compiled Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ext/stdio_filebuf.h: check for missing prerequisite headers? Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ext/stdio_filebuf.h: see the Autoconf documentation Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ext/stdio_filebuf.h: section "Present But Cannot Be Compiled" Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ext/stdio_filebuf.h: proceeding with the compiler's result Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ## ------------------------------------ ## Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ## Report this to usbguard@usbguard.org ## Step #6 - "compile-libfuzzer-introspector-x86_64": configure: WARNING: ## ------------------------------------ ## Step #6 - "compile-libfuzzer-introspector-x86_64": checking for ext/stdio_filebuf.h... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdbool.h that conforms to C99... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for _Bool... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for inline... inline Step #6 - "compile-libfuzzer-introspector-x86_64": checking for int16_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for int32_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for int64_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for int8_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for pid_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for size_t... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for ssize_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for uid_t in sys/types.h... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for uint16_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for uint32_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for uint64_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for uint8_t... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking vfork.h usability... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking vfork.h presence... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for vfork.h... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking for fork... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for vfork... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for working fork... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for working vfork... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking whether lstat correctly handles trailing slash... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdlib.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for GNU libc compatible malloc... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for stdlib.h... (cached) yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for GNU libc compatible realloc... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for dup2... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for gettimeofday... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for localtime_r... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for memset... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for mkdir... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for regcomp... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for setlocale... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for strerror... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for strstr... yes Step #6 - "compile-libfuzzer-introspector-x86_64": checking for BASH_COMPLETION... no Step #6 - "compile-libfuzzer-introspector-x86_64": checking that generated files are newer than configure... done Step #6 - "compile-libfuzzer-introspector-x86_64": configure: creating ./config.status Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: creating Makefile Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: creating libusbguard.pc Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: creating src/Tests/Fuzzers/Makefile Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: creating src/Tests/Makefile Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: creating src/build-config.h.in Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: executing depfiles commands Step #6 - "compile-libfuzzer-introspector-x86_64": config.status: executing libtool commands Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": Build Configuration Summary Step #6 - "compile-libfuzzer-introspector-x86_64": =================================== Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": Run full test suite: no Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": ## Libraries Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": libqb: system-wide; -pthread /usr/lib64/libqb.a Step #6 - "compile-libfuzzer-introspector-x86_64": crypto: system-wide; -L/usr/lib/x86_64-linux-gnu -lgcrypt Step #6 - "compile-libfuzzer-introspector-x86_64": libaudit: not found Step #6 - "compile-libfuzzer-introspector-x86_64": libldap: None; building without LDAP support Step #6 - "compile-libfuzzer-introspector-x86_64": libseccomp: system-wide; -lseccomp Step #6 - "compile-libfuzzer-introspector-x86_64": libcap-ng: system-wide; -lcap-ng Step #6 - "compile-libfuzzer-introspector-x86_64": protobuf: system-wide; -pthread -pthread /usr/lib/x86_64-linux-gnu/libprotobuf.a -pthread -lpthread Step #6 - "compile-libfuzzer-introspector-x86_64": Catch: bundled; -I$(top_srcdir)/src/ThirdParty/Catch/single_include/catch2 Step #6 - "compile-libfuzzer-introspector-x86_64": PEGTL: bundled; -I$(top_srcdir)/src/ThirdParty/PEGTL/include Step #6 - "compile-libfuzzer-introspector-x86_64": GDBus: system-wide; -pthread -I/usr/include/dbus-1.0 -I/usr/lib/x86_64-linux-gnu/dbus-1.0/include -I/usr/include/polkit-1 -I/usr/include/libmount -I/usr/include/blkid -I/usr/include/glib-2.0 -I/usr/lib/x86_64-linux-gnu/glib-2.0/include -ldbus-1 -lpolkit-gobject-1 -lgio-2.0 -lgobject-2.0 -lglib-2.0 Step #6 - "compile-libfuzzer-introspector-x86_64": umockdev: not found Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": ## Directories Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": D-Bus System Services: ${datadir}/dbus-1/system-services Step #6 - "compile-libfuzzer-introspector-x86_64": D-Bus Busconfig: ${datadir}/dbus-1/system.d Step #6 - "compile-libfuzzer-introspector-x86_64": PolicyKit Policies: ${prefix}/share/polkit-1/actions/ Step #6 - "compile-libfuzzer-introspector-x86_64": systemd unit dir: - Step #6 - "compile-libfuzzer-introspector-x86_64": Bash completion dir: ${datarootdir}/bash-completion/completions Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": ## Compilation Flags Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": Debug Build: no Step #6 - "compile-libfuzzer-introspector-x86_64": DEFS: -DHAVE_CONFIG_H Step #6 - "compile-libfuzzer-introspector-x86_64": CXXFLAGS: -std=c++17 -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument -fsanitize=fuzzer-no-link -stdlib=libc++ -g -fvisibility=hidden -pedantic -Wno-unknown-pragmas -Wall -Wextra -Wformat=2 -Wredundant-decls -Wcast-align -Wmissing-declarations -Wmissing-include-dirs -Wmissing-format-attribute -Wswitch-enum -Wswitch-default -Winvalid-pch -Wformat-nonliteral -Wno-deprecated-register -Wno-missing-field-initializers -Wno-implicit-fallthrough Step #6 - "compile-libfuzzer-introspector-x86_64": CFLAGS: -std=c99 -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument -fsanitize=fuzzer-no-link -g -fvisibility=hidden -pedantic -Wno-unknown-pragmas -Wall -Wextra -Wformat=2 -Wredundant-decls -Wcast-align -Wmissing-declarations -Wmissing-include-dirs -Wmissing-format-attribute -Wswitch-enum -Wswitch-default -Winvalid-pch -Wformat-nonliteral -Wno-deprecated-register -Wno-missing-field-initializers -Wno-implicit-fallthrough Step #6 - "compile-libfuzzer-introspector-x86_64": CPPFLAGS: -DHAVE_BUILD_CONFIG_H Step #6 - "compile-libfuzzer-introspector-x86_64": LDFLAGS: Step #6 - "compile-libfuzzer-introspector-x86_64": ASAN_FLAGS: Step #6 - "compile-libfuzzer-introspector-x86_64": TSAN_FLAGS: Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": ++ cd src/Tests/Fuzzers Step #6 - "compile-libfuzzer-introspector-x86_64": ++ find -name 'fuzzer-*.cpp' Step #6 - "compile-libfuzzer-introspector-x86_64": ++ sed 's/^\.\/\(fuzzer-.*\)\.cpp$/\1/g' Step #6 - "compile-libfuzzer-introspector-x86_64": + fuzzers='fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": fuzzer-usb-descriptor' Step #6 - "compile-libfuzzer-introspector-x86_64": ++ nproc Step #6 - "compile-libfuzzer-introspector-x86_64": + make -j32 src/build-config.h libusbguard.la Step #6 - "compile-libfuzzer-introspector-x86_64": Makefile:3529: warning: overriding recipe for target 'check' Step #6 - "compile-libfuzzer-introspector-x86_64": Makefile:3033: warning: ignoring old recipe for target 'check' Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #6 - "compile-libfuzzer-introspector-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Message.proto" Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/bin/sed \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{localstatedir}|/usr/local/var|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{exec_prefix}|/usr/local|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{datarootdir}|/usr/local/share|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{datadir}|/usr/local/share/usbguard|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{sysconfdir}|/usr/local/etc|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{prefix}|/usr/local|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": -e "s|[$]{PACKAGE_TARNAME}|usbguard|g" \ Step #6 - "compile-libfuzzer-introspector-x86_64": src/build-config.h.in > src/build-config.h || rm -f src/build-config.h Step #6 - "compile-libfuzzer-introspector-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Devices.proto" Step #6 - "compile-libfuzzer-introspector-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Rule.proto" Step #6 - "compile-libfuzzer-introspector-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Exception.proto" Step #6 - "compile-libfuzzer-introspector-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Policy.proto" Step #6 - "compile-libfuzzer-introspector-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Parameter.proto" Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Common/libusbguard_la-Utility.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Common/libusbguard_la-LDAPUtil.lo Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-AllowedMatchesCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-Base64.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-ConfigFilePrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Devices.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Rule.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Exception.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Rule.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Message.pb.cc" Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-DeviceBase.lo Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Policy.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-DeviceManagerBase.lo Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Rule.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-DeviceManagerPrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-DevicePrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Parameter.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-FixedStateCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Rule.pb.cc" Step #6 - "compile-libfuzzer-introspector-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #6 - "compile-libfuzzer-introspector-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Exception.pb.cc" Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-Hash.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-IPCClientPrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-IPCPrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-IPCServerPrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-Init.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-KeyValueParserPrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Parameter.pb.cc" Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-LocaltimeCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-RandomStateCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-RuleAppliedCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Devices.pb.cc" Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-RuleEvaluatedCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-RulePrivate.lo Step #6 - "compile-libfuzzer-introspector-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Policy.pb.cc" Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-SysFSDevice.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-UEvent.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-UEventDeviceManager.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-UEventParser.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-UMockdevDeviceManager.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-UMockdevDeviceDefinition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/libusbguard_la-Utility.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Audit.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-ConfigFile.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Device.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-DeviceManager.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-DeviceManagerHooks.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-IPCClient.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-IPCServer.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-KeyValueParser.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Logger.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-MemoryRuleSet.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Policy.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Rule.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-RuleCondition.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-RuleParser.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-RuleSet.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Typedefs.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-USB.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/public/usbguard/libusbguard_la-USBGuard.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/IPC/libusbguard_la-Message.pb.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/IPC/libusbguard_la-Rule.pb.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/IPC/libusbguard_la-Devices.pb.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/IPC/libusbguard_la-Exception.pb.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/IPC/libusbguard_la-Policy.pb.lo Step #6 - "compile-libfuzzer-introspector-x86_64": CXX src/Library/IPC/libusbguard_la-Parameter.pb.lo Step #6 - "compile-libfuzzer-introspector-x86_64": src/Library/public/usbguard/IPCServer.cpp:191:12: warning: variable 'line_number' set but not used [-Wunused-but-set-variable] Step #6 - "compile-libfuzzer-introspector-x86_64": 191 | size_t line_number = 0; Step #6 - "compile-libfuzzer-introspector-x86_64": |  ^ Step #6 - "compile-libfuzzer-introspector-x86_64": 1 warning generated. Step #6 - "compile-libfuzzer-introspector-x86_64": CXXLD libusbguard.la Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": *** Warning: Linking the shared library libusbguard.la against the Step #6 - "compile-libfuzzer-introspector-x86_64": *** static library /usr/lib64/libqb.a is not portable! Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": *** Warning: Linking the shared library libusbguard.la against the Step #6 - "compile-libfuzzer-introspector-x86_64": *** static library /usr/lib/x86_64-linux-gnu/libprotobuf.a is not portable! Step #6 - "compile-libfuzzer-introspector-x86_64": copying selected object files to avoid basename conflicts... Step #6 - "compile-libfuzzer-introspector-x86_64": ++ nproc Step #6 - "compile-libfuzzer-introspector-x86_64": + make -j32 -C src/Tests/Fuzzers fuzzer-uevent fuzzer-rules fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": make: Entering directory '/src/usbguard/src/Tests/Fuzzers' Step #6 - "compile-libfuzzer-introspector-x86_64": CXX fuzzer-uevent.o Step #6 - "compile-libfuzzer-introspector-x86_64": CXX fuzzer-rules.o Step #6 - "compile-libfuzzer-introspector-x86_64": CXX fuzzer-usb-descriptor.o Step #6 - "compile-libfuzzer-introspector-x86_64": CXXLD fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": CXXLD fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": CXXLD fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Fuzz introspector is running Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 2] : 10:10:40 : Using default configuration Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Running introspector on ld-temp.o Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : This is a fuzzer, performing analysis Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Logging next yaml tile to /src/fuzzerLogFile-0-80V8lUK4gZ.data.yaml Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Wrapping all functions Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Ended wrapping all functions Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Finished introspector module Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Fuzz introspector is running Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 2] : 10:10:40 : Using default configuration Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Running introspector on ld-temp.o Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : This is a fuzzer, performing analysis Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Logging next yaml tile to /src/fuzzerLogFile-0-FO1UWGD7Yg.data.yaml Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Wrapping all functions Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Ended wrapping all functions Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:40 : Finished introspector module Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:42 : Fuzz introspector is running Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 2] : 10:10:42 : Using default configuration Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:42 : Running introspector on ld-temp.o Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:42 : This is a fuzzer, performing analysis Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:42 : Logging next yaml tile to /src/fuzzerLogFile-0-WKvel5KDDJ.data.yaml Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:42 : Wrapping all functions Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:44 : Ended wrapping all functions Step #6 - "compile-libfuzzer-introspector-x86_64": [Log level 1] : 10:10:44 : Finished introspector module Step #6 - "compile-libfuzzer-introspector-x86_64": make: Leaving directory '/src/usbguard/src/Tests/Fuzzers' Step #6 - "compile-libfuzzer-introspector-x86_64": + cd src/Tests/Fuzzers Step #6 - "compile-libfuzzer-introspector-x86_64": + mv fuzzer-uevent fuzzer-rules fuzzer-usb-descriptor /workspace/out/libfuzzer-introspector-x86_64 Step #6 - "compile-libfuzzer-introspector-x86_64": + cd /src/usbguard/src/Tests/Fuzzers Step #6 - "compile-libfuzzer-introspector-x86_64": + for fuzzer_name in ${fuzzers} Step #6 - "compile-libfuzzer-introspector-x86_64": + corpus_dir=fuzzer-uevent_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": + [[ ! -d fuzzer-uevent_corpus ]] Step #6 - "compile-libfuzzer-introspector-x86_64": + zip_name=/workspace/out/libfuzzer-introspector-x86_64/fuzzer-uevent_seed_corpus.zip Step #6 - "compile-libfuzzer-introspector-x86_64": + rm -f /workspace/out/libfuzzer-introspector-x86_64/fuzzer-uevent_seed_corpus.zip Step #6 - "compile-libfuzzer-introspector-x86_64": + zip -r /workspace/out/libfuzzer-introspector-x86_64/fuzzer-uevent_seed_corpus.zip fuzzer-uevent_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": adding: fuzzer-uevent_corpus/ (stored 0%) Step #6 - "compile-libfuzzer-introspector-x86_64": adding: fuzzer-uevent_corpus/0001.bin (deflated 32%) Step #6 - "compile-libfuzzer-introspector-x86_64": + for fuzzer_name in ${fuzzers} Step #6 - "compile-libfuzzer-introspector-x86_64": + corpus_dir=fuzzer-rules_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": + [[ ! -d fuzzer-rules_corpus ]] Step #6 - "compile-libfuzzer-introspector-x86_64": + continue Step #6 - "compile-libfuzzer-introspector-x86_64": + for fuzzer_name in ${fuzzers} Step #6 - "compile-libfuzzer-introspector-x86_64": + corpus_dir=fuzzer-usb-descriptor_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": + [[ ! -d fuzzer-usb-descriptor_corpus ]] Step #6 - "compile-libfuzzer-introspector-x86_64": + continue Step #6 - "compile-libfuzzer-introspector-x86_64": + cd /work Step #6 - "compile-libfuzzer-introspector-x86_64": + fuzzer_name=fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": + corpus_dir=fuzzer-rules_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": + zip_name=/workspace/out/libfuzzer-introspector-x86_64/fuzzer-rules_seed_corpus.zip Step #6 - "compile-libfuzzer-introspector-x86_64": + [[ ! -d /src/usbguard/src/Tests/Fuzzers/fuzzer-rules_corpus ]] Step #6 - "compile-libfuzzer-introspector-x86_64": + rm -f /workspace/out/libfuzzer-introspector-x86_64/fuzzer-rules_seed_corpus.zip Step #6 - "compile-libfuzzer-introspector-x86_64": + rm -rf fuzzer-rules_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": + mkdir -p fuzzer-rules_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": + pushd fuzzer-rules_corpus Step #6 - "compile-libfuzzer-introspector-x86_64": /work/fuzzer-rules_corpus /work Step #6 - "compile-libfuzzer-introspector-x86_64": + i=1000000 Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": ++ cat /src/usbguard/src/Tests/Rules/test-rules.good /src/usbguard/src/Tests/Rules/test-rules.bad Step #6 - "compile-libfuzzer-introspector-x86_64": + echo allow Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "0,;UW~fn" id { 7Dbb:* } serial "R0Ci+jH'\''" parent-hash { "f+n`s" via-port "/^WlPN7G" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "7/G>!^p" "qV*i-WBa" "n0|g}USf" "dcQck[gN" "PQ<$8>`<" "9p#l$|Zz" } id none-of { F53A:* EE2D:f1aD 37AC:* 3F4E:64Cc Bdae:C0Fa } if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "`dcN*WO{" name "77QNHYnV" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "]:.drVPa" serial "v]s`5riB" via-port "%C`qdl9b" id all-of { fA6E:* b8aE:* } parent-hash "!dcVB5iT" if allowed-matches(name "mIba4_Mk")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "ED2+}Aq;" via-port { "40&EC96o" "R}h>w8bo" } parent-hash none-of { "O-r:.&r@" "!8q1mk`]" "~RaG}];g" } name "xk52974}"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "}ENfT*po" serial "+!5>^#.e57" "Bh:H^^]p" "iKyrj'\''pU" "@9#Y[L`b" "h<}5Bx8Q" ".`B2yV%]" "sk.KTkP?" "c0JwUOVF" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash equals { "^~{X`8%G" "l2ZG4|0;" "7KfL'\''b}G" "lt]n3L6?" "FG5k+TZ=" "Vz G3qgF" } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "G4Rs_h^K" if equals { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash ";[+iMTt8" parent-hash "<|t33w6A" serial "[IM:Uk_x" via-port { "-+

C%r2" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash ".J5^}hQb" with-interface 5F:2e:7E name { "h&" "?K[l4Aqj" "DT4mJ'\''l:" } parent-hash "+%B|QI?J" serial one-of { ";1r?7CK{" "B[{$Z9Zs" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "nK1,uv0#" if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash none-of { "_aIEAY0#" "%T&N>rOM" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash none-of { ".g$YW/wh" } id { 68bd:* } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash none-of { "l1p^N/f|" "WT9J&<'\''o" "%9B:~Gsj" "TL,%eV^;" } id one-of { 5abc:9CF8 251b:* 3cE8:* fEA4:E9c2 eC4b:cBb2 } parent-hash equals { "X7N]j&@&" " ZC73tCY" "Mh~*pfG5" "A!IMm wH" "=mAH/N3x" "1fcf>wS4" } name "{Fm1CveV" with-interface equals-ordered { 7b:*:* CE:*:* 9d:*:* c9:86:56 } serial "v5 r!_%z" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash none-of { "ZHf7%6|N" "FA'\''+RV+9" "?>T.<>!W" "yG%'\''yESl" "z`auPzt]" "rZ /Xcz'\''" "uhW8Gx{," "mee*EO7c" } parent-hash equals-ordered { "1+oKbeQS" "$[!I+$9y" "Lfs-6a.}" "}&+<&ImA" } with-interface equals { 6F:*:* d7:3c:* f7:3D:* } serial one-of { "Mapp{$~A" "|D05t[i3" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash one-of { "Dkd!Q#=+" "CfE5nF8k" "'\''s#S9?|." } id all-of { 1F7E:* c071:6f21 802e:* 597f:D40D D7DC:* 5Fb5:E9A7 } serial { ":0d&r~!K" "XM~fa90H" "D 6TPPY%" } name "J>'\''#e%a9" with-interface CC:*:* parent-hash equals-ordered { "l9~!%M" "s=j,ae%{" "&%6;CGO!" } with-interface 6B:CC:aE' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash { "PPF@}b$w" "kWEdlQP]" "xf1.6KU." "[W}|d8@w" "iiegC8j'\''" "b:,Oz7b`" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "$`.V[[pp" serial all-of { "~&4>K V/" } parent-hash one-of { "lhY4P~HZ" "e=Ffoxc$" } via-port all-of { "1ojWQ6aI" "7XX!-Wl7" } with-interface { 59:*:* bD:*:* 6e:e6:1d 48:B0:* } name "/p`.VJo3" id { C08f:B236 a3C6:* c172:* 172e:* b4EC:5Abe 3fFc:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash { "XGhA|X2O" "$m1pNS?Z" "dJ^14C5G" "m_6$Ih?>" "Y8T~fQEw" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash { "Yh-b02~R" } via-port "1:,-fGHp" parent-hash "4 /Y,%7#" id 9E22:* serial equals-ordered { "Q5Pf{3,o" "Mz'\''ins,j" "8St ![=~" ",.aGjpEF" "[~2hoeW+" "Okz:luY$" } with-interface f1:B7:* if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "Ze$Y]H-}" serial { "Vf0rpbah" "OABxYWKs" "gr%EW`a8" } name { "W[X7V?5H" "4lRj=/z:" "i,xidFv?" "GFk%I*Kw" "hYw;84}>" "| Pcppq]" "{Dq:R2I[" } parent-hash "V=Tm&QNu" via-port "5pkH%vF1" with-interface one-of { 9b:DC:* bE:*:* e1:FE:8E }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow hash "}z;-h7lN" serial { "r9}TsY|a" "8 %Fm9qt" "8GN+~AhO" "4#F5/umx" "]j+B8_X " "re0J-H&g" "BTB@VR!~" } with-interface 7c:ef:9d id none-of { bDaC:93a9 c89B:E54E Aa0d:6b1F add8:* 88c4:F43c 1951:* 6bAF:* 525a:aEd5 } parent-hash none-of { "SeiB;IA2" "#5NgvMKr" "`uGLEvkc" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id { 05fe:2F6d dc7E:2D96 58b1:C3Fc Bdba:1FF9 } if equals { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id 0da4:bCa4 with-interface { 8B:A1:33 Fd:F0:* CE:88:Aa bC:b0:B6 7F:dc:* dc:a0:* 49:5C:* F5:91:c9 } parent-hash all-of { "Qzr|1q[_" "KJ[jX{xE" "Q.!1S]6L" "4$--bt$0" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id 20F6:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id 48c9:B016 name "KOGY9jPX" with-interface fe:0b:* hash "oyH8A,$!"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id { 5D3C:* 1b7A:b4Fd 8e78:* BD37:* } name { "ylD+:/QD" "Y@euy;FU" "F`^H5kN/" "XO}Lx,a|" "H6!" "DgB[7?5T" "uj.[jx!u" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id 72Af:bfba' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id 7DfA:* with-interface DD:e5:Be parent-hash "YTv7H7H%" via-port "0uqZ07UE"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id 8eC5:2C0c' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id { A3Ad:* e055:* b604:* E5Ad:F2fe } hash "ET_HeN*q" if one-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id aB52:77bF parent-hash equals-ordered { "A3v9`>/+" "p~rv^nX " "rz8?C3:Y" "3SZ`SCw{" } via-port { "VIt>_={s" "cT]4COiw" } name none-of { "aG;R`0ds" "NgG{A:@h" "eN,+x=$r" "C0;EZ+g8" "<4n=yjC4" } serial { "+$7LGe.y" "F6s-r`%@" "WO_J|n,>" } with-interface { F2:*:* } hash "P&qIs}z." if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id all-of { 451C:B71F 43bb:* DEBF:EAFA 1Dea:70a7 bd2e:D081 bf2D:0520 965b:D9b5 9Ac6:FfFb } hash "PyG; {74" via-port "dUWuEnRL" name "}gYy!+%@" parent-hash "V_/o" } serial "X|B74.!P"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id all-of { f30E:* 5958:D3b6 f011:0F3e B8ca:* 490b:* 62f5:* 83C3:03CF 4feb:8670 } name "2Qe];N4v" parent-hash "+QWdQN5a" if none-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id { B946:* 80D2:* FEac:BfD0 3c95:1Bc7 5D17:5FB5 } via-port { "~QpGvq4J" "`@*JB^v" "Q&A7Gl%r" "3ft_s>k{" } parent-hash equals-ordered { "dA&3ON]`" "O2OS|dD#" "TDYRcq1a" "a'\''kBKxjc" "]FTZ>Z=N" "]:;YJpx3" "K6W }mA~" } if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id c260:db5a name "p;_SQ#>L" hash { "Oes4J15<" "x&XKMkp&" "2V+woIfH" } serial ":/2T.nBf" with-interface { 35:18:0f e8:F9:* 17:d3:2F Ff:*:* 71:CB:A2 03:dE:C6 Ff:*:* } via-port one-of { "W9nu]BwQ" "N}_J'\''*IG" "PFrDg`6Y" "%dRgg= $" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id c76C:C376 parent-hash "1UWK2fl0" name ">]yZsrHU" with-interface Cd:D9:d7 hash "sJL'\'''\''W3r"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id c7ed:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id C8bB:dcCC name none-of { ". m'\''^RD*" "'\''zj,of#m" "-2RwM-rh" "hOH8S;`_" "Xm{CNeaN" "Ce-G@=A5" "-/y:O4Qs" } hash one-of { "/jBC#9kV" "[Dp,S=D{" "$dL:dX@a" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id Cb83:a9Be with-interface { 8d:DF:* 35:1F:09 F6:0d:* 3B:f4:* c7:DB:d0 } hash "zHD=j|a+" via-port "$H*'\''?,iB" parent-hash one-of { "N,h-'\''/f4" "$OOiB7K[" "86*X;B]1" "4C7PDxoQ" "WA?`>:]~" "6te1E5%j" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id D408:10FE' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id { E55A:ECce Dc25:AC43 E2e0:1Eeb f2bb:* EDcE:Ca4B FC5a:8E2c 05D4:* } serial all-of { "]7@n[1ne" "+'\''YRO_ `" "PX3B?e{h" "DT@~'\''zRU" } with-interface A0:Df:aE via-port { "1`&!3HwN" "@%l4H Xc" "E^rGr" } parent-hash "o'\''hfJcWM" with-interface d3:6E:5E via-port "<$'\''q;*z;" if equals-ordered { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals { eAf0:* 8c1F:BdbA A4c2:* } with-interface Fa:Ed:B5 serial { "Z$VaGc @" "dpk[]q.E" ".=]vVV7h" "u[8zh9VJ" "brrZLkLC" "PGyQyu3{" ">9ji5:GV" "s97swV4U" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals { fAfB:* } with-interface { 2A:32:* Ac:eB:* c9:c8:* B7:fA:7A 63:eb:1f } hash "&.o~[n@+" parent-hash "oZ?:o'\''W[" name "y]jIUd2~" if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals-ordered { 2Ddf:22ef } parent-hash "A!egv?S<" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals-ordered { 6c7F:* 6D6b:DdDe } via-port none-of { " h~c1*" ":M%Ui>8<" "FY1bT9D3" } name "j]t7<2v7" if one-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals-ordered { D495:* 056f:* 7FB3:* d1fF:eE79 } parent-hash { "$8LO231_" "5SP0qyB9" "~[5+nh2X" "VjuuAOQ9" "3wuU8Xz5" "ARF@0Y2>" "GnM>tIAN" "3%?K+uuA" } via-port "qEMw&;Oy"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals-ordered { ec40:* 33ae:* 0132:DEAa 3e9D:* Cae1:c797 04aF:6Da1 } hash equals { "L[!1|}Ac" "u?,^/[-|" "zph#X|D%" } with-interface Fd:*:* name all-of { ".PIxe29n" "zL9vQizi" "Vne?{?'\''Y" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id equals-ordered { EcE1:* 0240:B0AF EB5D:* 65A6:bc64 B994:E8F6 EFD6:* } with-interface equals { 8b:3C:cb dB:Bf:9d d0:*:* C6:aF:fE 62:8f:cC } parent-hash "07[`C+9u" via-port all-of { "lw&'\''GZ>p" "oKlvq+{g" "}i]Xb'\''pO" } name "9u>+Np/." hash all-of { "Hve1[Jx-" "-[7ltq:#" "DPru/Dtu" "D,7bJQ~o" "-@0F&<=&" "M'\''Bjgq?v" "5Q~Xx.{X" } serial "J,n~b9X%q" via-port { "fTptq#Q9" "~['\''/1 2L" "8c@pX7hX" "Fou=^`~S" } with-interface 5d:65:C3' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id none-of { 4B70:* } serial one-of { "6JqhX7a|" "}dV^t{gv" "!y>~auXi" "3X4,.Tls" "54n_J;Q?" } via-port "kgA81,-r" with-interface CB:*:* parent-hash { "s, X" "_PwWqo=1" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow id one-of { 874a:A0B8 } parent-hash all-of { "GMb!D3I_" "bxF4[l5N" "*tM{'\''!'\''+" ",Tco:?hg" "D?U`;=0-" "P_GfeNV%" } hash { "rOHjh;8%" "E'\''[[Fq3=" "U{3aVyHL" "[c rnTm$" "z3'\''rghe[" "8]TGNLO%" "66E[G40h" } with-interface 07:Ea:* if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow if all-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow if allowed-matches(name ":[-iqZSZ")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow if allowed-matches(name "" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name { "37p3KD0x" "5z~bz" "h ?2LMf&" "oCV{w=8h" "8qHrb,d[" "s[9kX,yz" ":!^uH[Vy" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "3D~eQFQn"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "3Z|DTZq=" with-interface 85:Ef:Cf serial "d`~6Cu=>"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "6'\''G^QN?x" id { d762:65D3 EFbd:* ed10:F7CF c396:EE28 } hash "}${i|4!o" via-port one-of { "EQb9Mzv*" "R}|/Ai_{" "VpoE,d7@" "'\''QJ`NUgS" "3T/50kAt" ",uW%p<&o" "-xZcF~$t" "#]TZfEFQ" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "9@7!n{A%" id { aEa1:* 6bfC:* 1aa8:1685 } serial "9fh47>H%" parent-hash { "zxcUD&.2" "Aw=j+-'\''i" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "cD&=*qkq" hash none-of { "/WSKm8b?" "mb++4:3I" "3UY#SZXf" "hDjN;{a_" "@U vf|4L" } parent-hash { "K_i=]Hx>" "#UZeheA@" "Na9D>'\''!v" "j/,b[ nL" "fAYN!*;N" "}M<$,h7K" } serial "KgEYoZxx"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "'\'']D0sP&M"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "/DCOH}@<"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name { "du9L16I " "RiKHm8Tn" "gE/kbws}" } parent-hash "1N^nE0-6" id 4C7F:* hash "#}u?P~Tq" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name equals { " :6#e*Q;" "6>ja^0mE" "cde=`$kf" "!Q>F2][." ":4uLy@?N" "e7qJkQ=d" "s4w#JWZn" } hash "BZ:Rs,AF" via-port { ":{bSGo0^" } serial { "#|0#fK/M" "<#Y_oIT_" } parent-hash { "q{UtS-B0" "3Af*y&SP" "6OFD!,'\'']" "ryf1'\''F,'\''" "xx!Et !_" "HQiPr:Db" ",Y =LT4u" "[T8dN:C6" } with-interface one-of { d5:F8:* 63:*:* Cc:1D:* c8:c2:09 } id one-of { aA08:* aB8B:C85a cdA4:53bE 9dAe:* B4ef:7C82 }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name equals-ordered { "&],UqnDi" } hash "Db{f$[Lv" parent-hash "HHC@t4%w" serial "]*M}[r=5" via-port { "e6rPZ]t." ";=DY-Wqz" "J@q!t'\''@v" "H;-~rFd:" } with-interface bE:12:* if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name equals-ordered { "#+YB h:2" "mE=:SKc," "q{@4fsSv" } id 0f2B:* with-interface { 8E:0B:39 fA:*:* 21:58:* 9e:A6:0a } via-port "Vp#rh#m,"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "GqUY{0Ut" parent-hash "?;iHlp Z" serial "f6?,LBv}" with-interface { 83:E4:eF c2:11:* a3:4f:* a9:94:* F1:*:* Cc:*:* bA:ed:Ab fe:38:f2 } hash all-of { "%`$ec*.Y" "f4,G}6lB" "&w`Ucdcq" "MUVz'\''UI}" "D6.PaC1g" ".UA5xz3N" } id 7fAe:* via-port equals { "A<0dr.AA" "7N0iB;X}" "W!e^1G&&" "a4BHz:XOx" "W!mhO{L}" "DOdT/ 5A" } parent-hash "2$^xC7-`" serial all-of { ",I2r9;3}" "1CI_]QEu" "DTg78`Zp" "e,5`PfuZ" "|q^LpDd1" "-m3DH3'\''v" } id equals-ordered { 8dda:8BBf } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "`k?PG#J4" parent-hash one-of { "{i3{jwf`" "0!6efXQ!" "7?Uog-X;" ",roZSqx0" "o?L7H+g?" "NDYoy5s^" } serial "Wha!%Rq9" via-port equals { "Mw3s1*#g" "-Ro@q0M~" } hash "20OO7g>z"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "l+I-j+&q" hash "81_}}RUb" id { ebe7:* aDCf:* D329:e8e0 9fab:A659 f4e6:* 7Bc4:78Bd FcAb:ABe9 } via-port none-of { "ZZr$x->i" "uTW7l^JO" } parent-hash equals-ordered { "bg?j!M3O" "~iWT#~uZ" " OsS6L7m" } serial "%GVv.0P3" "8Bd%DyNg" "ORRNa!_~" "ARr!_a?h" "[e:Z-4WK" } via-port { "*|W~G;%E" "k@nh6" "Vn^WcD6" } serial "M+z$_lfi" with-interface { 6C:*:* cf:*:* 92:07:* } hash "Zb#]:;`e" via-port equals-ordered { ";q0M6N2B" } if one-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name none-of { "S3Q2/$4a" "q=~JA!0:" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name one-of { "q=-gjqt$" ">kt31^bN" "`7xQAsIr" " 2hwgFS-" ">?O+c.b]" } with-interface 63:*:* via-port "GAN{&i_Y" id { a389:CA3D 91dB:* ac8A:* DA4D:2F10 6707:5F13 5D0c:* 6FEF:* } serial equals { "tk5'\''E`5Q" "co|R-ibm" "+?awhGRs" "@iH1%wZ-" "wqu^QUv%" "jBAD]_pt" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name one-of { "}Q&-.Ak:t" id 9Fef:9460 parent-hash { "u8'\''C+%lK" " 8cH|KUz" "=[=}Lc*r" "5o+Vn[+V" } via-port ",95vqo!sC1" "lr&+jB&T" ">4f$1ayK" "5F_1d7G*" } parent-hash { "<2+,T,52" ",XYEO?P*" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "R=sdxV,Y" via-port "=d[t5h4," parent-hash all-of { "YmqYD78V" "+T5$rA>M" "_%@X>Xb]" "7~8=&uj~" "%+:ch]kG" } id all-of { 41CF:* 8CB5:B2E8 A6c8:d4FD d3Ab:6BF1 eceD:93c0 6bcB:4caB } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name ">SqzPBsW" serial "e8-9+zcm" via-port { "oD*t>I2G" "]P@Q}FE%" "zN^EB[3A" "T=gq07]%" "h +1A/#p" "E Oex~!J" } id B98f:a9eC' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "$*tE^1xL" hash "zvcmQ0rP" id { ADcf:Dad1 eCa7:* 49c7:* 8495:4fDC CfA8:* cacc:* } serial "E$,i-GG#" via-port "}XJ<" "^Oy5cxN " "j?+ul]g[" "PxfVC4?n" } if allowed-matches(name "&hGim?6C")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name { "XM<9p =]" "q:3N!abA" "@rt00mps" "2qBA[-M9" "vql-d~Ni" } parent-hash "Fc7d?/.o"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name { "~Y-7/9*'\''" "c4UzgH}Q" "TYXi#LvP" "g}ZK~$rs" } with-interface 64:d9:29 id { a1a6:08d7 A7Fa:* } hash { "$M[mDQhq" "KWFpzE4Q" "+7-{36$M" "ic8+wB[g" "tp#Q@r2}" "MS/YNz:1" "gtN$b1*." } serial { "3LZ@=P.h" "e1G]_~QV" } parent-hash { "YOJ^DlF6" "p#v>3u!6" "zJkH/<>`" "*hBtqYA}" "f'\''4E,#;o" "2}-A Ez}" "=RGciD#F" "DXxtELsu" } via-port equals { "Qn=" "j}j3uC;~" "8&b=Y_SX" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name " ,YBx6N_" with-interface none-of { 0E:*:* B5:*:* 10:*:* F5:5e:* 0d:BA:88 C6:b5:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow name "z|IB SEY" parent-hash { "+n_fFr`q" "F#$yVikY" "R%5gTF^a" } via-port "&D.%`l{N" serial "{*DrR]zU" hash { "%{7uRMfn" "bU'\'';0e$w" "arg-[ys" "M2/@&O!'\''" "_#~N!c>0" } id 6E30:* with-interface e9:*:* serial { "B:Jka`S_" "#l }5^lr" "Oxy%w|FX" "Rjsn;x#K" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "3[&-m_~;" id E28a:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash { "3&zqdh8[" "Mjv0D_MN" "jhVFba3?" } via-port { "E,67tOTO" "?@Un*TsF" ",+0C@3f7" "4^KE1n]d" ".mP1wP._" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "'\''5pDBaw<" hash "Ya|;FG'\''+" name "Og^#MkS0" with-interface F0:12:86 if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "A4=eRNin" with-interface C6:25:* serial "* 6Z~LPp" id none-of { CBBA:C1c9 D7dA:* B6E3:Dc48 8293:* 9185:* 8f4C:F9a2 } via-port equals-ordered { "n]t/5m-g" } name "+#&[9Bev" hash { "%fTl{ u*" "n4-`0DIY" "=tALKv=b" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash all-of { "D=AaAX]7" "=`S 4xFt" "ZA]c15 9" "K[z]i 1B" "|S'\''nQ,E3" "zfwpF<`T" "G@>3P'\''~N" "n5alcGz]" } serial one-of { "]njX,04R" "I7?`E=n`" "{sK]nGUP" "q3k%kk2x" "=tcG}rXP" "34c.oB$;" "?[sBK!7?" "A`X+oJ D" } hash ">jM6~J]m" name { "]?]xb=hi" } via-port { "{dZAF&>-" "%JU0{xTM" "BfYzE>+6" "h:<1[TbO" "4M+fce[?" "wOe&Y3lp" } with-interface { 3f:*:* A2:*:* b2:26:* CE:DC:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash { ".b]|+$8e" "q*]AB8ly" } hash "8%" "q*$~CQ{r" "2xq M}.r" "jZ&o8.hK" "b^lx*@oZ" "]}B[V~f4" "A4Ws$}u'\''" } with-interface 8A:44:0b hash "}Q{Z1G+I"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "dycoj6=Y" name ";^$HUw78"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash equals { "6>5oT*QC" "nC/Y{x:-" } hash "XS|2m_>%"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash equals { "6vK,de0o" "<6zj49sE" "Qsdp*CXN" "9k'\''!4k8y" "A`dDkxXc" } via-port "}Zh2*^>3" id DB7C:5cc4 name "h$eT+AGD" serial { "61wIC.n}" "}S=t/JA<" "6+zCIpB@" } hash { "`G4Q_D:," "6ns^MSHQ" "!,`?=25@-Tjue" } serial equals-ordered { "'\''WO8VRS}" "X_aq-O M" } with-interface dB:*:* id 169A:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash equals-ordered { "Dr#u7kLk" "S:Q3|PED" "g|YuJBTf" "DuKE=VIR" "'\'';gAGW#v" "zYTf:[u1" "E$H*#Tc" } hash none-of { "LdT=}aPm" "Y-X}4;N8" ">]K];" "}R#YcGAW" "xYDD-qJ_" "]d[05hdg" "jV?`Lf'\''Y" "uwwgTx>G" "*hJ6xz20" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "eqW u;t$"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "f1F`]460" via-port none-of { "1*B=r%ZC" } id one-of { E8ea:* CD3f:9022 } hash none-of { "3dC;=a7^" "HAs4PM.%" "jWC8BP^Y" "ubSo=drk" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "g1E d'\''mB" via-port "AM&o;>ja" serial { "Wjjgt<;l" "hV@a.sKQ" "$}$W7nl!" ">2'\''Rfeas" } id dd0A:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "hI<5-~BV"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "j?keU3u0" hash { "^RxX'\''9No" "0NFX870}" "VGj0ey_2" } id none-of { 0Dda:FAbc } name none-of { "LUcTt<83" } serial "P};lVbS`" with-interface { F2:*:* 10:b4:1b 81:*:* 2d:4e:6c f3:69:67 b2:*:* 0e:02:8A 29:*:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "?k05p`{P" name { "NaW&vobv" "HJ;9IJU" } via-port all-of { "f-#G^eiT" ",U8CGp6%" "U%>I4h#A" "L|gwgzt_" "_8JzwYW2" } serial { "&KO" "G`g`6Zx9" "=L@q[t/M" "Cw3fTNsU" "oT%/m{|l" "cwTq2~e:" "o:v8;mK7" "ibX2M,jX" } serial "xQY?[l}S" hash none-of { ";vD*dCVS" "Umg|w}n1" "-zR8eb$=" "&uF1!1Of" "1deUS+,V" "Pgc}}#T6" "VV*9?NYc" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash none-of { "wWAlt+a2" "$|p_HABv" "7@dF#y#Q" "i0;+qg^j" "grc wTv2" "e9/F{PmO" } with-interface cd:*:* serial "{^THpO#8" via-port one-of { "!Lw2?sbP" "C%#tO``]" "X;M=p>rz" "y=VKS?kP" "p8^`4s$<" } hash equals { "dscOOhUE" "UF4Z@LE;" "wY.*RV^2" "b'\''xY7yIs" "MGf;wg7X" } name { "-Gi3xX_b" "RdEq$oE0" "%:[X&IO!" "IVt|{0ov" "sM%P|hIf" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash one-of { "1!c sXx." "0?OSRz]'\''" "pHd2:j2C" ";+n:wE5r" } with-interface all-of { d1:*:* 96:E9:F3 Ee:ee:* 03:*:* } id 72EA:2feE serial "xWht+3z2" name "IjD9>JQL"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash { "-P5iX2'\''i" " vEpe_rn/:?3n" } hash equals { "'\''m89QdGH" "cl.oFO9<" "PIjylETk" "Co7Zw!;k" "wySgI&Km" "WvAz|4+s" "`28gOaOc" } with-interface equals { 52:ba:* BD:Ef:* c2:*:* } serial none-of { "Ns'\''PECqA" "[qSQdvr1" "MoT[zjp7" } id 2F08:a478 name all-of { "v3:g5kYZ" "noV[8ufu" " '\''|h=he7" "v nDRB@m" "'\''v20C{`*" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "zs87c%:_" name "vF#*!p=|" with-interface { BF:eb:* 6E:c5:AE } hash one-of { "w 1<;MF1" "z9Q$[,52" "UlD]a#C^" ":C~R.f~q" "xa1hxvMS" "E }TNsit" "s&rBcjA#" "@K,Ao5/c" } id 3465:* if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow parent-hash "z.,+?>;|" via-port { ":@V1!w8|" "_OiWE[N;" "!NGSs#:Y" "DC@1uv!:" "qnf$d[nl" } serial { "'\''{e*.PKQ" } hash "sk*>:>0g" id Fbc5:BCEF' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "13gwVVH5" parent-hash "^$#pYu'\''q" via-port " ;Oqn1Y-" id 34B6:05b0 hash "Gme/.b;n" name "uB69{#>*" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "#-|2VG'\''4" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { "4ZAH# [a" "_K.HiYlO" "RuH9uNPX" "JSB}mk`L" } id 38D7:C5a3 name "otYR$=X2" with-interface { Fb:bc:b8 Be:*:* DD:*:* Ac:*:* 11:49:* 00:*:* 9d:*:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "5%[xymld"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "7>lGW!SQ" id AfA2:9aAA parent-hash "Jc{r^WNm" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { "9!MA;6gh" "*E8l%9;>" "o6u'\''hRRI" "p `m@N-S" "rnmK[1M%" "//+a79&t" } via-port equals-ordered { "]/EQL?a2" "Imk7@r=E" ":,a-OO{l" "JW/|jwu3" "WDNq;;7?" "WJ;x@6@6" } parent-hash "i&mhTu/!" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial ";}!>]9]o" via-port { "nHGDZ6.Q" "U_[C!lOE" "A3hL1:Vw" "1nHsoOWB" "f/Kl}-E*" "6v %^hZ" } with-interface 3F:30:* hash { ">_,N9e>w" "[H*I6oM^" "&c4$C3]~" "'\''VH5*=1&N%" } name "j+lljhgn" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial all-of { "Q]a4D;'\''-" "w^QOYRtT" } with-interface 9E:*:* name one-of { ".cqJn~i=" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial all-of { "YZ^O^HfL" "Xc9/|?T$" "F>ab@Yq^" } name { ",ysz`6* " "xV1|i:~&" "u37WO][m" "JJnBEv89" "BM1..j!-" "2RFBXTBU" "+5&nHUe$" } with-interface 1e:*:* id { E2e3:* aE3c:Fa1d 37E3:* } hash "QH.BnmL." parent-hash "?&0>iFQw"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "ba/53DHw" hash "NB8T<0+]" name { "UFVo Ze1" } parent-hash "SXz6H$e]" with-interface { 4f:9F:Ad A1:a8:A8 } id { baA9:36BE e5a8:875f fE1d:* EFFd:* bF1f:b5C3 03bB:* d2Ce:b1Db 570A:* } via-port all-of { "aVE]qHo" "p@hwy-nI@ks" "5I8}nUXl" "8;@,13g]" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "%dyTA'\''MH" via-port { " fa:z['\''B" ".*;Kc%AT" "te~8wquE" "%/#VKyfS" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial equals-ordered { "J#Ak$o3t" "jh[n.8cd" "baM`%%3e" "&bHo-b=a" "Y'\''I5ZW4@" "|K64FHR`" "l9sPVPr4" "3i'\''`_Z.Q" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial equals-ordered { "jEKy4X&4" "IJD.><+l" } hash none-of { "A%Z$&Y;5" "q+Q7w-#7" "DOl$aKm^" "c4eKs$;2" "A5O%3?Oa" ",I#V{![0" "tU3f{ao&" } name { "S34X`%W$" "T;ePLNJG" "7x~qOD,." "Q?6d_Yd" "1rv`lev{" "`M@QqQ>." ":MN7Jh;=" "uRQ|tG[G" } with-interface 96:20:* via-port { "jvE;f2v]" "t1sH?c45" "}q{$6X.Y" "$&EDA_ez" "G@l]P#hc" } parent-hash "JRa3 TBB"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "; =[@`" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { "j[C^[]83" "g;ZB88;o" "_u5RxUr<" "bos/#6v:" "-e-'\''xp!S" } via-port { "~_nV#:Zp" "lv+8UnAo" "g/'\''*O@V]" "^uC$>d[}" "oA B;-}V" } id b569:* name "~XKeZMrl" parent-hash ">J:{MFJ$" hash "a5JEFomo" with-interface { 1E:f6:48 8B:d6:4f 0E:FC:* d0:5d:* 4a:*:* 1B:*:* } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial " Kc01#Po" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial ",MN%?.Y>" via-port ":^~;QaQq" name none-of { "3#G_;-a$" ".|mn0#_y" "tIq5=5nZ" "kBHA2_`y" "F4wUJ!-A" "=[0NEa.>" "latZgmqU" } id { 99fA:* 8fB8:* bD00:F90B eBCa:b0CC 49A3:* 495F:7F6A } parent-hash one-of { "sE0ORb:C" "ViwOg75q" ":x~,ntB%" "yKvoEhW@" "iy/,{&cf" "R~WcTWC3" "7u^SodZ1" } hash none-of { "m'\''%!b@Wy" "^v%pr|v " } with-interface { B5:*:* 3F:Cb:E3 F1:*:* FD:*:* Bc:*:* b6:F0:7e 17:c9:* } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial none-of { "3H5B@Hdm" "uA_q2`~U" "!syR`O,s" "DaX=w5%!" "}C=-=#%J" "3lp4BeIA" "@V|L#{Q*" "hf:?q'\''!Y" } via-port ".sZAu,K#" parent-hash "lR-:Z~S*"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial none-of { "7ZS>.Z_L" "^JC~{@J;" "LHIAhTY*" "t0XzZ,Aa" } with-interface aC:f9:78 if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { "nR*zOrIM" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "?Of=@o&9" id equals-ordered { b2f9:D590 9aA2:fF4a BF83:b6eC Ff1F:* 2fFF:* } parent-hash " ;ndZ.|N"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial one-of { "8JZG.Sv," } id { f38C:3FeC 3e37:* aAaB:* 9B0e:3eD3 Ec82:4a10 dAeA:916f c099:* } name "R5kbH4hm" parent-hash { "-0wkb,S5" "}:?%{mEK" "3t;L%x;:" "n_n>XID5" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial one-of { "y]ZovAW[" "LO|~3Z^c" "0S|IIQ;%" "ev,O$V1" } parent-hash "6e1>8lB#" id equals-ordered { 2ecd:62C0 } hash { "jfX=U2-l" "6D~'\''X`zd" "9Mwid$/b" "o;p@JxY>" "2{Du3+iT" "}C0aw,>D" "?EEjh8/-" "Q+ve-G!{" } name ":/Y|DfTc"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "R3!drwed" hash "La`$Iv[~" via-port none-of { "nD*y`It:" "_KI 27ER" "i3A`9]" "GC[:}B%T" "3wUV< &4" } with-interface { f2:eb:ee AC:*:* 16:36:63 85:74:* } parent-hash "6LD`eCtV" id all-of { 687C:* } if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "+{sxQai6" with-interface 9B:*:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "TB$*R1FV" name "FJsN 5G]" via-port "L&2wy`d%"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "wzv*1-?;" id 530E:* parent-hash "z~1]XEki"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "[x{r=@3?" via-port "XAqCV`lo" name " oND]_[e" id 9dB5:6eCe hash one-of { "]'\''0ySg`@" } with-interface all-of { 3d:*:* } parent-hash none-of { "L}aJXUI7" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial "Ysvz,r^=" parent-hash "pABE8HA:" via-port ".WT$UVKO" id Fc9E:7Ae4 name "$m_fy '\''." hash "'\''*'\''$p]V=" with-interface { Fa:*:* Dd:cF:* ac:5F:ce 49:EF:* 84:Ea:Ed } if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { "_Zf`R.Ow" "ZsrHlOHR" } parent-hash all-of { "*ev,d+a0" "]bk9[l/s" "6 7f66c6" "dwq|U+-{" "dV3ufcs<" "Ao$m@tW9" } with-interface none-of { 27:*:* 5d:da:* 1A:EF:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { ",zqU4:Et" "@wn77Y]6" "% =wSK'\''p" "7?xc-:P~" "@N`5h13]" "hpTi^C~q" ",I3xAfmW" "@BcWV1{~" } hash "ko%GG-j." id { 5A8c:* Fbe7:6425 C2Cc:* 7BDf:1e6d f9C1:* 4B92:79A7 } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow serial { "}Zy8#M%K" "Kk}@K-Ad" "rs=9 |@/" "z0x[[%om" "HVsG5*vk" "Yzb.i<7%" "kq0pM%4|" "%K/cN{Pe" } id one-of { 1cab:fF2A c963:* baCa:* 212D:* } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port { "0$kiH'\''b2" ":*x`tsTZ" "EDujY+cd" "s&Y@bFS~" "q QEPzk[" "zEZ+{$?j" "%ieRj@~h" "pvor/A<`" } hash one-of { "w$a#5o'\''1" "Xj{E1|HE" } serial one-of { "Md'\''Ms-W|" "1NJuuJjP" "wV6Wkc^D" "rr3go=Fa" } parent-hash "Xza{L#/X"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port { "18wAQlLj" "*{R|trH4" "&Q:M6cMj" "DJDO=$bA" } name "wqx/*A'\''C" id { 6d37:* 906F:6a5E AEDe:* Ff20:* e20d:73Dc CFcd:F3eC ea94:* bFd2:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port { "4ic+&t{-" "j;yK~HH" "m;dO6a4+" "S t|lsQ " "k5Ye/qgb" "L3H4$bok" } serial "l#[1-pdf" id 1eDf:aC95' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port all-of { "8hKR|Fu," } hash "/3ow6o*c" parent-hash "=gkx9? ?"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port all-of { "xOqZKm8O" "MWR#= Kt" "X7:T,]/O" "Zyqi><=/" } parent-hash equals-ordered { "Zt9k8aYP" "pKJK}@dx" "SE9]?aJ1" "A5^,0+ne" "1*iKy%c~" } with-interface 4D:ee:8D hash "s}QJp=EU" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "A~m~~kR@" name "3RvDO:J" "Q%$[nB`<" "?5W/1L" "W78" "7>BYqJFW" "a ,9qYS#" } with-interface 1e:CC:* parent-hash { "R]z/CO>]" "!lPQ_T/g" "F>-j2#!M" ":amy4QD^" } if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "b/&kaa& " if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "E58yEB,A" id { B2f9:beb2 } with-interface 6b:6B:DF' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port equals { "M=alL4,~" "xbe`6m-<" "}i1WqZE|" "s9R2acSQ" } id all-of { FE9D:* 8ecD:* 3836:4F1f bA4E:EFdb 16a1:* E6B4:66CA } serial { "9$77IY}." "dbKA654h" "eiZkAE=/GT[{o" "6I6@`#BR" "yitwi F%" "9yu_In4c" "vMa'\''C8>`" } name "q5'\''*2eOv" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port equals-ordered { "K^p-OhWU" "4Z3H!}U8" "cfn9R$'\''E" "lYccdk*j" "@mL<&f,<" "1d9,9.Zj" "L_%J]tR%" } if allowed-matches(name "Go|<6C~'\''")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "}Fk=2,1E" serial "`=+!$1A|" hash all-of { "B9,>T+qK" ">dOVxI`@" } name { "g_d~maU!" "`g8bJ6?." "X%&|'\''ZVQ" "O_A+/oUH" ".!wOMBvS" "[dzi@mC/" ";nCL,7TQ" "A!9*m[7U" } id equals { D5ad:51f4 33Ba:9D4b 4c1d:de75 03bF:E9D3 49eb:* B93D:7F3B 2320:9cCd cBa6:* } with-interface 7B:0a:BE parent-hash equals-ordered { ",ZTVihf," "R`n'\''%W?!" "?D~.![q&" "5H=;[FM{" "J;d,?-q]" "m*:y9DD%" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "HnEl>4*5" parent-hash none-of { "taS6,Ly&" "0bju}_,A" "GtlS[Vrf" "kZ$x#x|l" "w,iZw`<%" "c=s3!Wed" "Fu1Ep`:Z" } hash { "p%C1e &k" "XYJ#~iig" } with-interface { cB:D4:09 7F:Ad:* Fd:AB:E6 4B:DC:c8 ec:af:c6 9b:C0:* 4F:3E:00 } name "ylhT1~6m" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "'\''I3[&dV^" serial { "zKl>>$UF" "Gna5cvVv" "17=s3D-9" "[05-~_n2" "+*xe!oY|" "FV^?Qv.O" "ELmS;E[Y" "o{bMdi2P" } name { "H2Mva{T9" "Z?<$?Yu>" "s~b%?*9X" "VP5K5@}f" } hash "qyzNDvL|" id dcd7:2f35 with-interface one-of { 9D:*:* f0:EA:* D8:*:* } parent-hash equals { "|!-Qg--v" "^evR]Vg2" "8Eg*Z!IL" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "I'\''}e!NBd" name { "clgkJ/.1" "_~gKmJ6c" "uJ!{b{kf6" "X:r'\''|Ql-" "|g:vSQPo" "&J6*wr'\''u" "bcN{k4'\''7" "%%k.R;`V" "3Pf;hL[," } with-interface { df:fD:* 0A:4F:* } name equals { "6CRf.#D^" "4$;M@PtL" "zODT&~k@" "vP iDjHgdl%D" with-interface equals-ordered { 4d:*:* 14:fc:* } serial "u1@4;qy@" hash "C+?T.}L+" id all-of { A2ec:* } parent-hash "9wkrTo}/"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "jKG$9?]y" name "^#*REo%gV|*%7gd" ";==4qGOg" "$~vN-g&C" } with-interface c6:CF:* parent-hash equals { "LyAJ`.0R" "s^{1LRq~" ">EMk=l9^" "FP=|?&[d" "v.V[` T!" "JwL#x35f" } hash "@4?1nf8d"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "l,C[xF9q" with-interface { 9F:Dc:* c4:*:* a3:F8:EC cb:*:* 7C:b2:2D 76:6D:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port " N'\''Drw /" name { "yM}En>b." "}&zN1e|6" } id all-of { 7cFb:* 4E08:AAda ccfC:9000 7DBA:838D 51eb:* 1AEb:* } hash "dk^GY`u?" with-interface none-of { c2:DB:* 17:f0:bF 4D:c2:* 2D:*:* } serial "q/[" } parent-hash equals { "h0n0UAV:" "=D]l*N}m" "fi4hn}of" "~kO9Jbv'\''" "UQu*t#C1" "B fA?>Oa" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "pb5CfNij" id all-of { Caa3:DeC6 0B2B:* } parent-hash { "FoYn&pG%" "BlS1aCnl" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "pqwFCcs&"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "=qD&%u6x" hash "Xt3Nj#0!" id 0Ffb:66af with-interface 72:*:* name { "HTaWQswf" "S&|otHSN" "uhi6etZ{" } parent-hash "Vt*!ktW-"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "[Qk2vU8k" with-interface C3:b1:B2 id equals { aFe4:* deBB:6f6D F439:E77e 1e2a:* C7B5:dEDf }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "rf+1o/d]" parent-hash { "eA*,txrY" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port { "^rTs?/lg" "ZE2L?#?c" "n-k~&6c>" } parent-hash { "Oa[S*Ln/" "RsG#@J&W" "b[]4m7W<" "&rM`le#t" } with-interface db:58:* serial "WM}iEQT]" name one-of { "OK:rpzt$" "I2yzR0|@" "FL>tTY{K" "7[/K2Nvx" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "tTNJq{Bb"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port "-=UR'\'']>v" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port { "VU[i`N0W" "fB<%eCU9" "@SQ&do ~" "Qe?0Wkgn" } hash all-of { "N?e5Ax8p" "{Sn|T?w'\''" "j'\''~s8Q{q" "oM?S6?r8" } parent-hash "$sS4Fl9o" with-interface none-of { 96:*:* E2:*:* Fa:2e:0c f4:*:* e3:12:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow via-port { "VX'\''5,yGt" } serial none-of { "YdyFnK4r" } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 0C:08:97 Aa:e0:* } via-port { "MU;,4G[h" "]v$$XKFh" ";,MZT'\''Dh" "g00{lD%j" "wRUZ*``0" "8#!J{gQ@" "`Z?3p92&" } hash "KYHTnNgP" id one-of { C60C:* d2EE:aDe8 ead7:214B 75Bc:59a6 3129:* AE7E:d25d ee2e:* A21D:* } name "n0CKUNor"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 14:E1:ee a9:ef:1e } name "$T[3!PZT'\''" } name "5K;E#z &" via-port { "Td'\''H/ VL" ":JR8Pf-y" "bcPr&3-N" "m,mo$xhm" "z+y&F4DE" "2J*&~~Q5" "%:{xUtY*" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface 28:fC:* id { ea02:8AA5 a850:18D3 db89:7D4e A936:* f9Fa:4ac5 5459:A4Ff } hash none-of { "w$4hD/zo" ">_kkI0SC" } via-port { "K 2yQU+K" "fFeBLR]-" "$4nL V]/" "McY*:%l*" "XHw.PIY~" "2f^.Riim" "!g;w8d3f" } name { "a@'\''MGh%H" "^c ?*4m;" "8+zFVU$^" "Fd]OSOtL" "7[:I!zm/" "16ef=Dwr" "g'\''!iYZf#" "5E [lcvs" } serial { "Y&Dek#;E" "n,SM_P.`" "uam6mmBw" } if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 3D:*:* dd:8f:* 52:*:* 1B:*:* dD:5f:* C0:60:* } hash "VO>%S5V7"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 43:b0:46 1d:*:* } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 4f:*:* 2E:F2:* df:*:* bD:ab:* } id all-of { 00F4:A611 14Ca:e9fD bbBc:* 6ac0:* 6bBb:* 2CbD:* A451:* } name all-of { "s8MybXM1" "%of*apu1" ";XgD.EWB" "$ry_*ET9" "dy3c34$q" "7B:IGp'\''W" } hash "8ubY&%6F" serial ":d.ZIO8O" parent-hash { "J'\''lqfII1" } via-port "IQ11oX7G" if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface 67:*:* id { C2cE:* 443F:* a9Aa:* 55cE:* 7c56:CcC4 b3e3:5ED9 } serial { "6Tkd8" "Yc&T]av-" "/a'\''c2kC0" "_PsP6?rO" } parent-hash "noA73;e " hash { "xy:]/`lW" "R9EGbN1s" "D'\''2[:{`M" "c[R|zY.I" "S}S/Q6@8" ";n|+@}IC" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface 70:8D:12 hash { "dOA|E$KY" } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface 7b:1D:* hash none-of { "+?E1L~L^" "=bx #1t$" "C99wrqMY" "ipuISR23" } via-port "xHe$bQv=" serial { "e5Z7M,dp" "Yn?y@k{>" "cs#_v=C}|T9" "c8N/kzhI" "'\''_10jW!s" "#[ijCZT?" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 7B:FF:15 cE:8b:* 53:07:* 11:*:* 6b:ef:44 72:C5:E0 e5:4d:14 eA:a5:f7 } name equals-ordered { "#aJ3LxP:" "N-KYq1[!" } if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 87:aA:Fd F0:eC:* 52:59:76 0a:5e:* 08:*:* cD:*:* Ad:Ac:* } id { 28EB:* B4aA:ea2d eb0E:* } serial one-of { "0'\''n*r_cs" "iw8WWWLl" "Lsg}?$:1" "|RHjrA_/" "vJEBSSwb" } via-port "plL|:RZH" parent-hash equals-ordered { "}14Ly8L." } name "'\''1&7cKcR" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { 9E:50:ce 8E:*:* 00:*:* 72:*:* 95:58:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface a0:c0:* hash "7&;B'\''tjr" id 077c:* parent-hash one-of { "S09lIr][" "U=<4iNZO" "ZiC5C%zw" "S?{>D_v%" "-l--E/ 5" } via-port "t8[0kfcv" serial equals-ordered { "7&ui :_p" "xlXLn{[0" "[Eohy@T1" "/8z3ntu:" "Vlia.R}h" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface { AB:E9:* c4:EE:a9 44:95:* Db:*:* FB:41:* a9:44:* e5:*:* fe:*:* } via-port all-of { "S[XnKOGQ" "no;OuBFCY7" ";9_u6Z`," "Ib-xY8QF" } hash "+NWLov?c" serial none-of { "2Gi$mO%3" } parent-hash "Cj>HG@S-"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface bA:24:aa hash "!e!GLMrL" serial "6zRoS=#<" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface c7:F7:1A via-port { "|G6xBNe}" "_Vq7=tvM" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface d3:03:2D parent-hash "}c4h_7%u" serial { "fWj!mqv^" ":}u~?I-l" "+ur+ WP9" "WT*6Wh|d" "O{@J,-+V" ";6IV^ec9" "EFjCq35E" "@6XSX3Kg" } via-port { "=mNB3G6z" "cy~o3RC%" "tZNj_T~y" "LPmId,3{" "i$M=pT#2" } id 9Ce0:* name { "0SH8.KEt" "galw}Sp3" "q3BQaY4y" "mP'\''DrTlq" "frxCfAif" "dix=6YG_x" "LQy7f=" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface one-of { A1:*:* DF:3E:e9 AA:*:* D3:d0:B2 7D:*:* Af:*:* } serial one-of { "6n%M`N$E" "9/,dG;Ur" "bI-NjCOw" "7XxBE}pR" "s=x~XEj5" "i}0R#%;V" } parent-hash equals-ordered { ">QOe0;Y]" "o`=]c:|$" "MSMcbHJA" "^`.4!7w7" } id eEb2:* hash "5-0v1wDe" via-port "Pao*1:w/"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface one-of { Aa:A5:fF a2:b0:4c Bc:cD:Ab Ea:B2:B8 Bf:*:* d5:B8:dB } hash equals { "'\''=GN}0o=" "E]cGge^s" } name "!qCiGB,J" parent-hash "yneIkx'\''u"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-interface one-of { c3:5A:cD A8:af:* } id a1fe:* via-port "Qh5Fl.$9" parent-hash "GYqxZ?a["' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type "hotplug" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type { "hardwired" "unknown" } id 38D7:C5a3 name "otYR$=X2" with-interface { Fb:bc:b8 Be:*:* DD:*:* Ac:*:* 11:49:* 00:*:* 9d:*:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type "hardwired"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type "hotplug" id AfA2:9aAA parent-hash "Jc{r^WNm" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type { "hardwired" "hotplug" "unknown" } via-port equals-ordered { "]/EQL?a2" "Imk7@r=E" ":,a-OO{l" "JW/|jwu3" "WDNq;;7?" "WJ;x@6@6" } parent-hash "i&mhTu/!" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type "hardwired" with-interface { 0C:08:97 Aa:e0:* } via-port { "MU;,4G[h" "]v$$XKFh" ";,MZT'\''Dh" "g00{lD%j" "wRUZ*``0" "8#!J{gQ@" "`Z?3p92&" } hash "KYHTnNgP" id one-of { C60C:* d2EE:aDe8 ead7:214B 75Bc:59a6 3129:* AE7E:d25d ee2e:* A21D:* } name "n0CKUNor"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'allow with-connect-type { "hardwired" } with-interface { 14:E1:ee a9:ef:1e } name "$T[" via-port equals { "uAn$>}g'\''" " Idtdm=Z" "L5+~$p9G" ".<2^/*_#" } name all-of { "CH'\''-JLED" "A!a^flj}" "VZB4bM29" "zQibW[lk" "~.O];jOw" } id b96e:* with-interface none-of { b8:*:* 1a:fA:* 7e:B6:97 57:*:* 8D:d8:* } serial "&02OlmQ." parent-hash "Y{cAzv[U"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "8$^jgkWg"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "aeTX#Tfw" via-port "V!N3Ipm@" parent-hash { ";l}?;R.9" } id 0Cc2:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash all-of { "I8{]4TvS" ";>w8mQ3E" "iU_;>55>" "de.:[T/{" "8@Y~;~Ud" } id equals { 8B12:ABF2 dcEf:* ddfE:24A6 FEa2:a862 e0ac:61dF 2612:709b 3Ff0:* 90Be:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash all-of { "wfr9j]&," "aM}B47'\''0" "u]Nso^u`" "Rs U3PGv" "Bd0PDz{&" " .T@Ue6:" "-Ca=Qf34" } parent-hash "?,dfADqq" with-interface one-of { 0d:*:* bE:7B:9a } if allowed-matches(name "E:!wSp0/")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "CN/]>ajf" "z0K/.E/~" } id fa24:a8B3 name "Pkw.EF=y"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash equals-ordered { "!,@nBB+`" "xH@nx/vL" "~@}AC*Ly" "0mH@|z$f" } with-interface equals { E7:3A:* Ea:*:* 15:3f:* BE:*:* de:Bd:a3 Df:bF:* a0:c2:* } parent-hash "zy5`RAoP" via-port "hF/%W||k"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash equals { "S MTzat_" "}y?9*DWF" "'\''1CZDI`s" "-J/qh^QB" "&[*Wb_/7" "@e^dU:tQ" "+t5v%1$8" if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "F>ws8LBg" "4oHO_`ho" "p82KS+hW" "&$PM2XAg" "#r>H#ci*" ",S:LX&96" "%5f`N/uF" "^}v{9$U9" } parent-hash "%YGaV~vW" id { 96df:52c7 aDbD:fFb7 94Bc:* ccdD:c235 ebB9:48EA 9969:a8A9 } via-port "K|@HOjK9" serial none-of { "3-lGLJWE" } name { "?fYq.09H" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "KsHd#KO7" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "LoI;c;|;" id { 3AE3:1AC7 ba1f:* f4cf:5ca4 33F3:EDDf C42C:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash none-of { "vwFpit9'\''" "-JOnStM>" "G1N~ qo=" } id cD21:* serial none-of { "ymL7n{J#" "VFxa[d?`" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash one-of { "^!H2I&&>" "zEe#+kmV" } serial "6qCWFY8N" id one-of { dFaC:3fE8 Bea9:b380 } parent-hash { "DwO;./Z~" "L[A%lFK@" "0=p;s|wy" "R#`w4kI<" "tsA0y" "tMDz<3%Q" "-+.e|mmH" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "oumf218x" serial "~7ptfL|S" via-port equals-ordered { ".w.ANTfz" } parent-hash { "mZ]JlT9:" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { ".P%.>a{w" "wC[{`i8^" "8W`:aPG." "{eB8'\''|J>" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "Pl;NW^Kb"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "$q4Dl?8>" "#b3;ft]c" "vH4O#2Vo" "@3-o4p>." "|r =Obpa" } name { "7|+eABNJ" } via-port "E!4R'\''w^F" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "&Qf696`H" serial "/yO&59%H" with-interface Fa:54:* name "E,=~G<.x" via-port all-of { "lDrl.tlM" ";n}9z?W+" "U6`<[?}|" "Be/u '\''JI" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "QW`eGv7n" via-port "{c*W-Ba'\''" serial "2=Ii_1z3" name { "@qlK{p}X" } with-interface { 14:21:DB 1e:fF:* e2:*:* } id { 5A3e:* 2D3D:a95F Aaf9:* } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "R2]4[$HM" "L?^FEDKK" "Y,A|pSj," "]l8AIp;x" "z]59obZ<" } serial "+|zv[%X" "'\''/`v17ou" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "V_1:S1^|" "= ig5cd|" "B@Wc+90b" "hYoiJ8j8" } parent-hash "tc=!Fe@a"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "vu9;@,zf" name { "AI5GR%}}" "4*Y6#;A&" "w[7270C4" "8%x#+WSy" "fstZ6{MN" } via-port { "Vf4KG%]a" "56:/Yh`3" "6g12o*Y8" "e6]u7?C<" } id 45Bc:7eDD with-interface Ef:*:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "XKY9u-i`" name { "Di^w/[6j" "qDuN82P<" "pSEsRC+m" "h6xx'\''H4n" "}kO%Yf.8" "Wjg T@g<" } parent-hash equals-ordered { "Z`iH X1@" "3f% -uN." "ab3&IXW}" "I&[ee27]" "1&}~P88|" "@u0rQJtY" "?[21I&C#" } id one-of { 04Ad:* f5EC:* 8b6D:* DaAD:* BAF2:5ADb 6cFF:0ffb }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "Y@2^&:1J" } name { "z65Hr9[n" "OBR`.4Ac" "gp:rgD5-" } via-port { "aX$s/Is&" "M[_C.dXB" } id B06E:* parent-hash "4nG|WX{E" serial "Q5LK-k0m" if allowed-matches(name "TP5S>yMp")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "yG<]?d;&" "1b|1g!1x" "iHmS?^ys" } serial { "Jx9eD!L," "/l t^MGd" ".QM[QCnd" "O956P'\''v;" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "'\''yq[dzkm" } serial "I5OdR;B " with-interface AE:*:* parent-hash ";B>c2noM" name { "<05hjw]z" "d5{Z#Krs" "~aS{~?|m" "AY`XF-.&" "sm-FCmrr" "VE^8J,mG" "$yx&AkNS" "TBvj}%u%" } via-port ">'\''S`PR{^" id cd3f:c410' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "]Yq/zy7."' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "^YTGF'\''cy" via-port " x*^{P23" name "Uy~j6mo%" id 167E:3E86 serial "pTI-k^x3" with-interface 30:*:* parent-hash "4KwDj+Mb" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash "z/,=KJA^" id { 5A34:* DA7d:* } parent-hash "#7Vbsiwb" with-interface { F3:Ab:ab } name "!Wk!y48D"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block hash { "zkz'\''l%|e" "mn:-" "Tnf;c[,9" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id 1d94:* via-port ";6m3hr,#" name equals { "u5BL~+Iw" "8V>4|N,g" "GG-SP%F " } parent-hash "D~yq2!`U" with-interface { d8:0A:* 9e:*:* f0:bE:* } hash "+9,I5<'\''U" if none-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { 2B53:ebe5 a450:263f 8CD6:65Bb F938:* } parent-hash equals-ordered { "1bXFHB=V" } name "$Ta3nV?n" via-port equals { "e4{l-'\''.{" "HPbds!s-" ",p~tl}H;" "Q$pM:Dyx" } hash "9V:G&u0R" with-interface { 7e:*:* 01:80:* 10:*:* DA:ad:* 72:*:* aF:F3:5d }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { 3BCb:E9Ac } with-interface equals { 5E:27:* d0:*:* b4:*:* } name equals { "K1?S?{QO" "Go|IG[D=" ",QhlJ/K=" "2XPr{.Qm" "LHBidWpJ" "e`N}8U.." "e%]y`i@w" } parent-hash equals { "Zs. GigL" "dM+n,UiW" "UjjY}+9?" "@Y nskCK" } via-port { "XL^>,O.4" "q&rZ'\''1q{" "sy#%6k4q" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id 44b4:5df8 serial { "uMRoMBw+" } name { "xb0$* rD" "*8;NyRL0" ">SHv+p#d" ",UAi0[Z," "- SrX62C" ";}XcO;?y" "{.27Uh<*" "@:DqXN8q" } parent-hash "h[n+P@kT" hash one-of { "/^sy_5=n" "bf^`gu?m" "~eW<.0OA" "xB$~&z&*" "O.JtGL63" "j^xE=&X[" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id 4AAd:4b12 serial { "Mn01^T*6" "U<-b4YcS" "&KXb>a9~" ".HGwBgPs" } via-port one-of { "'\''1SpdnS3" "95O/~:Kf" "7LOYj*uP" "8dgeM}6T" "K_v&tJli" } with-interface CF:EA:fe hash "ajwu53_r"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { 582F:dF7C 3cFB:* 9FdF:* } parent-hash ".f,8PG5;" via-port none-of { "-wmvAWJ6" "U{_*+s9K" "36#:;hDp" "ayEl.@J." ".Wg;O[x1" "M7H?n[|," "!n5'\''neLK" "UR/;l*id" } name { "U@9@6_wp" "r#=+WCY>" "4Q!%>u> " "rUPDX=N!" "a>{3OEH1" "<095NUYL" } hash "PsffPxFy" with-interface 13:*:* serial "KlA{huO%" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id 58F7:Eb14 via-port ">s_V[KA~" serial { ">L^$v|u+" "%e PCE+u" ">#[0jB4P" } parent-hash "^9AeMvRH" name "SDw{l&Ao" hash "cI8_@gq8" with-interface { 97:*:* dc:E5:* ce:57:64 5B:6B:* e5:*:* BF:cf:b7 c2:e9:9c }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { 95d1:8F77 0eCa:* ea6e:Ed87 2c38:* } hash "6k9t'\''FmU" name "i`Wc6n^m" serial { "X7HHs[t." "'\''O5_vE1X" "lxf3v&z2" ".z:: yj," } with-interface 8C:*:* serial "m!s3.;fB"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { ac1D:17F3 1E69:3C4c 96C8:* f5cE:* 79f6:* 1C3E:CA80 4F62:fE6F 5cAB:* } parent-hash "t?_DE75_" hash "QC7cocdT" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { B5A7:* 32A7:* 68d1:84F3 509a:* } via-port "w%RRQZ-`" parent-hash "pq_r!4}*" with-interface one-of { c5:e9:* fd:D4:D1 B0:04:15 } serial "<}~5zxX" "*$V+ vU{" "M4Tm+T[," "]_j^xQ;:" "l'\''Ek6f1'\''" } if all-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id Bb10:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { bCdc:fbd7 FaF3:* 3fCe:* f48a:* 3eD3:24Da 65E3:06EB BeFd:2b29 0fDD:* } name "lg;`0??e" parent-hash "FL;%ohya"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id bEf8:DFc1 serial { "=$*M5&,]" "> G6>u A" "gXpU|UjS" } via-port equals-ordered { "X SfAtNy" "g-0Pxz'\''a" "|&kP#Zo0" "s_4qo@2U" "a={k/y%]" "$J|5$HpJ" "MWpbA_v~" "vf&+vM0S" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id C349:* with-interface { 4e:*:* } hash { "iz6%]gx&" "'\''8saqxFU" "q_oUgsnH" "EmP}l^HZ" "LCLZElyo" " ;aRXKVu" } parent-hash "pf4^r3O@" via-port { "Wo*4CG-|" "XIfhL!E<" "1R1x-T$j" } hash "'\''_G ygl;" with-interface 1d:ed:5B serial none-of { "CcRRT|4A" "$esS|nRf];G>" } via-port "UPbzX}8w" parent-hash "TS.u5Zkn"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { C9dC:* c7ff:F1aa bB5e:* D1A1:* befC:* 4Cf9:8DcF e804:EaFf D181:EfdA } with-interface { B0:*:* 15:*:* 9A:*:* F2:c7:A2 }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { cA9C:a91A eF08:* 1e19:c9dF E02A:* D0Ca:6717 fAf9:d9cf cfaD:* } parent-hash "^%vz#? ]" hash equals-ordered { "f$wv-oK[" "C[YfK4Rp" "rA,Y/YrS" "syCs^^q+" "ept^7P,B" "!G56=1[o" "P@=RPXR4" } with-interface all-of { De:*:* 72:2E:71 } via-port { " jJ-Tk#6" "Du6- &-_" "b0BOwEx1" "Gf3bpJ86" } name { "*6,0XVx#" "SoXPDrC4" "*[-wmbki" "6^DHj4of" "I]HM*47l" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { CDDb:* F2Fb:* 3B71:* } with-interface none-of { E3:Cb:* 8E:*:* 56:9b:* Ab:Ef:* } parent-hash equals { "!+}7|z[&" "7SoEJ,ha" "Yt}z85lb" "dzNn.mPQ" } via-port { "iMJ30j_v" "oI|W5'\'':r" "bRk&$*%9" "arT]]~T~" } serial all-of { "Fji<[ku+" ":=5MTQt0" "UDBA8cc2" "4IuitCCq" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id { d669:* 25F2:32fc c5Cb:cED7 f9dC:9AaA 43A3:* b3A0:BaF7 } serial { "cwXg3|J8" "bMi&3 mt" "7=Vz,po?" "jNEk=Yns" "?Nx}#XZ+" "Y+eP8V{g" "t8H{kV}@" } via-port { "`d&dZ<1p" } name { "o-d/}:O1" } with-interface none-of { 3f:*:* 70:*:* A2:*:* 81:*:* c0:10:37 1F:91:7C C4:*:* Ee:91:5F } hash "+Fmdx!Nq" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id deEf:* hash "Cb'\''`nt" "|M%.S;+," "wYa[{$c>" } with-interface D6:Ac:d1 name "|~dFo*-9" via-port "[h[a?X"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id equals-ordered { A5FF:* d9C4:* d93e:262D 017d:* Fa3D:* C245:F2D6 7c22:c885 } with-interface { E4:*:* eC:90:9a 79:57:Cf Ad:*:* fE:2e:3A } if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block id FC2A:fc1a name "t7;XHw+[" serial { ":yZ_=iA`" "G&t]D*Qj" "A[pb4&v|" "=*tl2#]6" "E[qo89KQ" "}J]_EsQk" } parent-hash "$oIha'\''+}" via-port { "[E3-p,Iz" "y%jM!IaQ" "5/4." "*j$OZyJo" } with-interface none-of { 4f:a1:7d de:*:* 2a:50:7A 06:BF:* D6:*:* 76:CB:e3 bB:*:* } hash { "Z*q4it!8" "8ZLct+~*" "P[^>T8V?" "xv`h?|{w" "%p=7/].P" "mDqnI1-k" "sRtPt:b" "}!s7ukY0" "q7yW-mP;" "yy_q6f>$" "W=Yu]8O7" } hash equals { "hi|{6=1'\''" "dLQ;-r=o" } parent-hash { "6hEH/~k3" "8A*CMnow" "9AMY,0BW" "Nmh-r #R" "Hr3 7-%X" "Xg-br3sO" "`pg@plOh" "1g2`GP*Q" } via-port "Si'\''[X:80" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name { "6irqmUO|" "wc2zD9zE" "YA6e,TvV" "P#GyJ{z;" "vEWJpA4D" "EPR[XX&w" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name { "6N@c|yfs" "85;l0EN'\''" "zf2a6D4D" } id F666:7BB3 with-interface equals { 8e:*:* 42:*:* } parent-hash "la5Y~kCa" via-port equals { "ZYUd[o&<" "4mxQB ~q" } hash all-of { "`aTH'\''6,U" ".zi!rs@4" "+W+'\''pp+%" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "8sP5!q'\''n" id { c146:8950 88E7:* ac5f:* } hash equals-ordered { "fKjG%nI7" "R;h_K_JO" "_pTjwmyU" "Z]'\''z}q&v" "g6KP4I./" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "99" id { f7ad:* fDaF:* a5ae:b0EC af7A:d1F7 } if equals { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "CpAt5Ay2" serial equals-ordered { "F`9{B=;p" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name equals-ordered { "J~eG={i=" "bj/6G~S6" "+]3qNl&G" "A*]:O|Qx" ">pKayUO," "/[e*uMsP" "IsdXZR_i" "c.*~mB%s" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name equals-ordered { "N+#*FMv>" "XM@jR13G" "Q2gggu4D" "73[,G4pr" "htmp0n;y" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name equals-ordered { ":rW~XH,e" "?qD M^By" "VV0JtdV4" "6n4Mu][+" "02%d8|]}" "/*sEX2g+" ".z1Eq'\''g6" } serial one-of { "^q~TNw9g" "viT|A&+:" "#_FK,oD}" "&~q?kBJe" } with-interface { db:3B:40 6F:2a:7a Cf:cD:bb 0B:9e:2a 98:Aa:* fB:*:* 1A:*:* f8:B9:* } via-port "5R;@ZFk#" hash "n75?R^Pj" if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name equals { "_qV8 T/;" "I{3^%: t" "!hmlB?~R" "M'\''JZ1/5w" "!'\''LF[=;7" } serial "3SF!lO:$" parent-hash "l#d+Rh-i" id 85cC:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "FVDdAU{7" with-interface 33:7a:* hash { "yLj2N2|!" "Pp/ [&j?" "O[@}^Gd" with-interface AE:c1:* if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "Mg=WgqmF" id { 9FED:* 3383:* 5bFc:* 83b3:79a7 45Cd:* } hash { "-*~qnBh<" "9k:>Jrv7" "@sLqxO6`" "vzL?1t|p" "M|n1{Jna" } via-port "bcd08y#^" with-interface 02:*:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name none-of { ">M?`+X$C" ">i^b,U~%" "sY>xvTT0" "H^TOz]W;" "&>$YbViY" "gkK1S5rp" } id 22da:* parent-hash equals-ordered { "C|@zP8Z_" "#z]cv4xk" "%n|W`J?]" } with-interface 5B:Bd:* serial "C+`?Fz]k" via-port { "/fS9*4_j" "ev%;X+2B" "9GUN~7'\''<" "qsS+/q0J" "K/_>vPoF" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name none-of { "NU{W;w`u" "$b[r3m8~" "f5t@ms#h" "/>AA~2=V" } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name one-of { "AA-/&9$~" "bOp/li_$" "CfW:vfv4" "yS9:!IMO" "7IxD/:vz" } id { eb7B:* 3dd6:* A5E5:* Aacf:2d28 7d6A:c6a3 } hash { "C/inU2S}" "p^u6Z@P3" "f!G9*IfP" "zR|'\''8`;w" "+PAxJimJ" "5{XNx2oA" "xGCt;e5h" "=@LgMsm#" } parent-hash all-of { "fwFQ1DT5" "L%;jVz:{" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name one-of { "^u[!p>QI" } parent-hash "f9b;ZhA9" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name { "/oP`X?*z" "_!X,AqnB" "T=16?BEd" } id none-of { 1dbd:* 1eCE:* fF9b:* 4C95:* faEE:Ddf2 b0dC:* e6Ec:E1c4 } via-port equals { " py~xw9g" "[j34#b.r" } parent-hash none-of { "H2SgFn F" "[%%nLycE" "#?1C[?Xs" "Veft}bxH" "!P<@,#pK" "|fa1}4#t" "N |^5wbY" "kM@>]21B" } with-interface C1:Ae:* hash "Q3^HT${I"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "QAqob,a!" serial "rEw%U^w/" parent-hash "bDPkocYi" id equals-ordered { 0AD0:* 4C9A:* FafC:* } via-port { "q[B88NOc" "T=xNUK=g" "_o|al.T2" "l&_4,aPi" "Kw]7Qb.x" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name "r,,u!0{i" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block name { "%:.rVab}" "]xBCyk}D" } with-interface 66:94:* hash all-of { "^$Bf&qU7" "o7Y^3$/R" "l`>[Pj3i" "ynJ9FJY&" "$d6G|Q'\''D" "@p%N " "TOMlmlNI" "Fb8m6I+Q" "H~:QL.UD" "Dpf#Pu!G" "/Lwj=Z#N" } id 4E5D:* with-interface 3A:C8:0f serial "FN*fZ;-#" via-port { "E,87V'\''+I" "sUy~uY:1" "]UlXaH7*" "t.HDA6Jf3X" } serial "VyFloU7r" id equals { b3b5:BcE6 15dC:600b B472:* b6Bc:* 2590:e9b6 9DEa:* } with-interface one-of { 7A:7F:3f a1:Ce:7b 36:99:fE fd:*:* 09:AB:* 34:35:14 0E:d9:8D E7:8d:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash all-of { "2^b>tMZ9" } hash { "B?hC,{Bj" "<.-E8DU-Y" "awZ`Ef}r" "J4Mu$G:s" "]O4a_6J>" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash all-of { "b,3j{ppL" " A8Uwj$ZJYqNB" "|mc #!Y'\''" "pMoA'\''8Rl" "KCl=_M99" "w|5xT9it" } id { 7f3C:* fdcF:67FC f9D8:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash all-of { "J]:[6Jqx" } serial { "2|2<4JP5" "rLIqprTN" "-2q*d-j&" "E=^sZK:v" "Z%PAsTS/>Rb" ",m|Ey].r" "m>3^d|4%J" "YPS=~{vK" } id 6FFc:b1aE hash equals { "wi}|9GhL" "B{zbT|B}" "?>]]H6ap" " N:v*10/" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash equals { "uJ^#2y6i" "Ff!laFJ0" "}f}h.g4X" "1MbV8da0" "C+8%?Q6U" "s1[lmY%#" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash equals { "V vAP>Nk" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "ezm[2y!>" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "fX@NNuz<" if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "hFVb=a]v" via-port "_>yes/3e" name "Fs:h_Dgi" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "H/jAM?aA" id 2E41:7bb8 serial "@kx!V/0=" if all-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "kA_-2C{P" id none-of { 7ed2:* D0a6:* 1CE2:6A3C } with-interface fc:9c:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "KB`ggh%$" name one-of { "0VHg Mj7" "CXJpN}&_" "78ZY[J,9" "S/fMOsBS" "i" "@~#eew$W" "9{I{]&AL" } via-port ">kGIuTly" with-interface none-of { fa:Ca:fb 5D:71:* cc:4F:* 9f:D3:* 0e:*:* 97:02:* F5:*:* d4:eD:6c } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "nNNAz.^`"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash none-of { "=p2'\''G%/R" "`rSM/{V41V" "'\''e=o-JZ6" "1N+cIu57" } via-port "SvFZ[vIF" id EAbA:b670 if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash none-of { "RjZ?hi>z" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash none-of { "zYLz C[<" "F'\''#=,hSP" "I~m]3CL&" "{VYPWoaV" "0h7pXVvW" } hash all-of { "U>oPSzpi" ">Bw-q,r." " ~N4-u]'\''" "6f}{r9ac" "#>`{ou?2" "NmUv" "G[?4[80D" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash one-of { "T}_IDn.B" "]u^-]`@2" ":VdFg}@k" "chNfa#4y" } via-port "f[e5Tgy "' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "?`^OyjQz" name none-of { "Grq=9g?N" "?`{W;u$1" "!:qHkOnE" "PoS;!L%4" "uknBuD.c" "$q,O|>nb" "7JiWxXz2" } via-port { "_:>SwR9G" "+4*n?JQu" } id b01c:* if allowed-matches(name "+c?MisE]")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "|#q$o`;;"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash ";q#>P&gx" serial "PxV.Uk`&" hash "/hm>#_di" if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "qV9zTUu'\''" via-port "#X1xQi w" id { CCE0:* bD2f:1c3C 5171:* 8c7f:FdC1 a6eB:* Ee29:* } serial "vP{R-v8n" with-interface equals { 9d:40:fc Fc:*:* cc:*:* BF:EC:1e a1:8E:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "t5i40Mi5" via-port "v.|gmD$u" with-interface { A9:A9:F1 dd:*:* 71:6a:* } hash one-of { ",.`s6&B3" "g|1._Ad~" "r~&lp@I|" "czL_mWbB" "3m5HC^6F" "?{+PsB8#" "" " _?Fi$MY" "J5JaU|&" id EcEd:525f with-interface 3b:53:a6' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "*[+*v?Qa" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "XBI[m=}6" id A6Ce:Bb2C' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "@yxQxKg+" serial "0ArW{g%m" id EccD:* name none-of { ">H7VTb~G" "a^j3,$g9" } via-port ".74DS:u>" hash "{Y`7LS@F"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block parent-hash "'\''>&Z7>LM" via-port "]=B#ZaTF" name equals-ordered { "M[~MU2xp" "~!F5:^my" "hAM!{1m4" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "5k!NtdOw" parent-hash { "knBr`sDw" "M#p@X{n7" "-1!FSbvy" } with-interface F5:A7:81 hash none-of { "WgXXjR%0" ":yp4~W1i" "IN|/{}iZ" "@LF'\''@,f}" "|%fU_L:[" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "7:cGHL-q" hash "36H6N7qN" via-port equals { "w|6+~n$~" "4HBa~Jc^" "3J#4Hr{A" "4uV?>m'\''R" "-vhhXm_4" "OF=srz=k" "t@Glk!9]" } id a3a8:61Cc if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "[A[%d}}I" "AsEQI#|A" "sO ,kKyx" ",pgym~+]" "c7~YSz8@" "w@%`=__`" "H`94zga~" } parent-hash { "}XqLyP56" "D;n@Ck5y" " fiyNEYZ" ",2E>IUxz" "wqK.BwsP" ">DX=NBX2" "+-Rl'\''G8u" "i2h&iQTC" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial all-of { "#c8.X:-Y" } id { 41Ed:d98B bdEc:3816 a310:* } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial all-of { "!r]r9n%j" " q_j`lom" "0SWfwBi^" } with-interface { 0c:9d:d2 c4:8f:38 }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { " AU~L GJ" "w'\''HG$9lw" "!<@~jUnM" "e8{o-Gx5" "ZoCZc,*-" "_uk>L?J7" "xZS:xwZ_" } id 35aE:* via-port "HBAs5HUE" if equals-ordered { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "BifnQB;f" "1EzqbCm-" "sr%T8ku1" "M1I{Kbbi" "`=vu'\'' ]" } hash { "~ipRFqXt" "a7koW-?I" "bnc=Hq>[" "7hry-AQw" "Ja=L,,vN" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "Cpbo$~Wm" name none-of { "KY`5FjbW" } parent-hash "+#pSB|sv" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "Dkms" "Ui'\''U-%F@" "2n$q;q$N" "g^:_0JFU" "{@$|DC:{" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "`;!;DLHl" with-interface equals { D6:*:* 42:bD:* F3:Cf:0a DF:c1:9D e3:86:* 2E:CD:EC 9B:65:1c } hash { "_Hbk{9Gr" "cW;&v2*1" } id 347c:* name "uLRP|dS{" via-port "Md}pzTT?" parent-hash all-of { "Ckp2HGG^" "<1dTG{R4" "L+JGxo#g" "'\''GZ5;72<'\''" "SZ'\''9L|0+" "nb4f8RQz" "%+nj5uJs" "lH7mX[{B" } parent-hash none-of { "VR.!VZX:" "&7Tajs#j" } via-port "4+Ob__&2" hash equals-ordered { "f;W/ v{Q" "F>Q:t#.2" ",@%aQY_E" } id 8dfb:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial equals { "xWWz!iq-" } parent-hash { "Ub$=]95S" "mt&G6+Eu" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "EtM=.0H=" "7wvO_c>h" "RqHmhcsb" "" "MOp%AD]8" "y~*@-5&@" "j>?8YCa4" "[-X'\''%8?^" } id 8eBd:* with-interface F1:5c:* if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "G7Hl0@@U" with-interface none-of { 3b:f5:* b7:*:* } hash "Vc0:K}4s" via-port equals-ordered { "5hp=l9_8" "% QvSSSf" ":,B~_>W/" "1n3XbOh3" "~Y'\''.ex'\''N" "vMR$&2!X" "DcB*rc}!" } id { 1f2A:* 00B2:* e0a5:4bF2 } name { "Oe8#Cxz[" "K^v%Z H%" "n;%%>%;5" "k>2buv{d_8S" "|DA`7z,{" "Q0m}qYqH" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "KnLBtuVQ" hash "FiI:Bz}W" via-port one-of { "%S-b%9+;" "Dpg0#>Sa" "E$K*v%+E" "IJpS]k6q" } id all-of { aACF:* 90C5:* A7A8:ccC7 } name { "d!7:npy2" } with-interface { Dc:2C:8e 63:eE:* 9D:*:* 24:*:* } parent-hash "wW^-A|#2" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "l>00&hpe" name { "_XnAr}w=" " g!AX5y~" "4Z>eHm;^" } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "@mG|`A=;" with-interface { D6:*:* cA:BF:41 } hash equals { "Li_axYd9" } parent-hash "n4Sh7/rB" via-port "_TF++qc5"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "NM`pS}J," via-port "axRr3:6 " id eBC5:* with-interface { 8A:D9:ed D6:d1:58 } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial none-of { "h-Dd;##S" "QCrcpQjW" "$?+ue*4n" "'\''cL*DpQ-" ">=|fzWe/" } with-interface 45:a4:* id equals-ordered { b4Fd:BE2f bADF:* dfB1:5Ca9 } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial none-of { "ss*lxBk8" "=!c'\''A[A " "'\'' IYFYQ?" "`u+X*Qlq" "bf7iVpu]" "#}$%!hJM" "[OCDq**f" "[zrj/>9+" } parent-hash "e Dv9jX9" name { "#`^4g4K_" "0{15Sc;7" "7=w?`OZg" "k{pxJQE|" } id 1CA3:* via-port "@?r/_-H7"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "nTNZzl6n" "71B>?fM-" } parent-hash "8*9yJk{3" via-port "c0tbr0|&"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "$-=Nza+3" name none-of { "30d9s1Dg" "N'\'':gAJOd" "pf&ZKJ$a" } with-interface 8E:*:* hash { "Kjx&s,h4" "-pwN/r``" } via-port equals { "P>weG^H`" " J/$!?|2" "kBpu;493" "I:`pMk%x" "x+:H5M^m" "8k}A9.s." "L:[C$cTH" "Ss|=h1gp" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "O2J*vt@U" "Xxg6?Ht'\''" "<^JN5g?m" "KPb}83d>" "9Yzu^@QF" "QPFRo/e0" } parent-hash all-of { "2u!WdQ9d" "av2]'\'',Yy" "*N;8S!f_" "N9yO&7F_" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "`q!QOU<," "T= L1xgN" } hash "QV4Uuq'\''L" name "BtA,$^P_" parent-hash { "%t{F, !g" "TZ!a&sG-" "~UfoGl#r" "Vr8/2" "c;bGTwYg" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "s2Z~_#iZ" hash "3Bedsrzv" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "snK~dU2{" id { 0f5e:Eca7 90cF:* aAff:cDEb 1BEA:* 34ab:3BA2 e4C5:bF82 8B55:* E1Ea:2B40 } parent-hash "://Xl0 F" via-port "k%*vc#+d" hash none-of { "Nf3@+-.B" } name all-of { "vi3?1<5C" "[Zs%3'\''{l" "kRsA^@e$" "jreX %09" } with-interface E3:*:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "s`Q4u%&?" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "SY}dZ1}R"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "u_&3&b2:" name equals { "/o5R>cVR" "cvf@{5=_" "FRz{FM2m" "oD<[]IWK" "BLPBm$KH" "wH##;BPs" "`np5?fe " "$Wgsg7m." } hash { "B~ib$R#P" "Q:PuxpS " "bmD{ Bnc" "%0PiV/~n" "8#%37{5Y" "K${[-h}Q" } parent-hash "2Oi{W{D+" id one-of { ce4E:* D90e:* cb7A:* D304:* DBc0:E21C 5635:dD4A } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "u%:ve#!R" name { "UkA,q gP" "@0OnrN3c" "X&p;CS|y" "~,giQ?QB" "~`BVQ^O$" } hash equals { "D?;Tl]_J" "/Jl,y@G " "s,}Y__1Y" "!FlBcp{i" "@4f;T#a'\''" } parent-hash "wT-L-=NE"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial { "wc_5YL@~" } name equals { "WCpMtmIV" "|sS}Qkxw" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial ",@WJ;`;Q" with-interface equals { 5f:FC:* B9:aF:* 14:d5:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block serial "z]2+_&LL"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "5 !K1-==" "*jn`b+LB" "$`Ues@P*" } hash { "T4/UgQMZ" "iW05a@lm" "6&|@Fm1E" "TkS~;Pg[" "!:5dX-Pm" "^CzASK^o" "%z`4" "lU?A9f<}" "1J`|uGKU" "KH3*zjhu" "eV@ 2K*k" "HOXUA%6<" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "78fe][qA" hash "e{A-Z^T|" name { "?2czF>QW" ",.4Bfl*m" "$tdEa~ev" } serial "?D51Ae'\''@" id fCdF:* parent-hash "$LD+}w`l" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "7'\'' ._x2S" "-s+cEk?X" "u_nn 7Qn" } with-interface { 2f:71:Aa 7a:eB:* 52:1d:* 1d:AB:* 1F:*:* 16:5C:48 } name "4}TCw0:^" if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port all-of { "IIJ_W:%" "^cw<3`ov" "xlBNXbrF" } parent-hash { "2Y3Ym>|I" ";L$-&U3^" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port all-of { "YlI:D}r6" "qlv,DT?^" "aUt'\''`4oo" "I-Z{F%y/" } parent-hash equals-ordered { "*tmW,F=," "SIf]?V5k" "[@dCg f&" "'\''{'\''74Xd<" "p/VxfJ>j" "uiSH@o3^" "NORxWxcC" "T/z0rpS`" } with-interface Cf:7a:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "BE?i[yLS"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "!BWzM} Z" "$Rqc0on/" "ax%P!bsy" } parent-hash "l~%9d6~=" id equals { Ec8c:* E8B1:4F11 cEdE:* eD6D:* Bbb1:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "c%v x{w2" "I]Bqt^Qp" "c$y F_:R" "A4" "cXjmDFId" "0$<9Q3;!" "huaXz&Rj" } id all-of { 0CCa:25d2 c6E2:5B9c 699B:* ABC7:* } hash none-of { "qCDG|.!c" "*F/='\''Y}7" "[u1=P9iY" "KHg&fL'\''n" "RyOZxhti" "e0R V/c'\''" ">O 8+O*M" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "cX`c|1-J" name "{`8.Jg=y" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "DLIukMxR" parent-hash equals { ":a+CUZHG" ",eGZK{5s" "f`>?TzN," "$GqQ6t{}" "]I_dTJ/o" "G8Z'\''}@=X" } name { ";i5hOE14" "7OX#}Ewl" "a$~BJ@GO" "A9ZZ=&=p" "Z'\''F0JZg/" "~nc>Y5[ " } serial "'\''$TaI/F "' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "-D^Y&axw" hash { "!-0_ZcyV" "xDdWv6Yk" "[*vXaN7*" "b:j[[`c1" "njTVUT&{" "_1OX ; U" } serial all-of { "G`}$C'\''6V" ".bl,>ZI*" "!+:xPC=P" "]v}j>KxA" "/wKPw?u}" "jV?yr0q!" "nNxp#Z,~" } id one-of { 2212:* BF1d:* cfC5:E9Ba FBCc:* b964:* 1B1b:ffCA } with-interface BE:7E:* if equals-ordered { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "!:,DZGae" "B=PI9ou;" "B_GCHKA@" "v_gKi+1>" "/-;54U:B" "+D_rvG>2" } id aa2c:955e name none-of { "0N@FwwnE" "u1g$Nwsi" "4@=@Ucbm" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "E8.Tq;%<" id { CDfD:ad9d B3a8:* 5E9b:A7e7 1cCb:* } hash "GKzYp{e{" parent-hash equals { "la8'\''so#b" } serial "w4[W|3q=" with-interface { 7B:*:* BD:*:* EF:*:* 62:*:* 75:B8:3B } name { "K$$r10V." "lEf^6<0N" "S]W-m-Ef" "O#E?L*.O" "D8!qvAY3" } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "eFNbse*f" ";YM:OHPa" } id 4ab6:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "g_54F !j" parent-hash "l H.2?NR"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "h'\'']48,_c" with-interface Db:*:* name "}`[=L6/Z"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "KbX_Hib3" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port ">KeBB?~9"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "@$l~5]&i" "okMY~gz|" "uJ=:`4#/" "Tbd4tk@*" "a%BaM?#[" "Q3'\''=tU{F" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "lYgo0V-i" with-interface a4:6C:f0 serial "j,Go$M}X" parent-hash "_5*11g7g" id 01D1:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "m`[7N-`>" "bWvd#kCF" "xLp qu&w" "Q_Cf4+MD" "n9X3dQxN" "=9NjE2nJ" "7mFzm6n_" "nD[fq@kZ" } name { "r5/FW`Bf" ".?l:5#s%" } serial "8u!SAX#[" parent-hash { "Ff%e^mN%" "gE'\''fl:,|" "IF%9Tb9O" ";m VCHt" " TuirsMZ" "g~?tLWKZ" } with-interface a3:8d:* id 2AA9:f295' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "NGSav7D0" id cB95:99Ce if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port none-of { "o!Xn/sA?" "U^}l_$`?" } parent-hash "zrKp|0?V" serial { "|[[:VRFb" "#IA=Myg&" "ha9FbW&?" "SeB3CYXm" } with-interface { 07:*:* 83:e1:BC dA:*:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port none-of { "pgDBVQrE" "Jmbl_]" } parent-hash equals-ordered { "q_Whut;E" "f`M'\'',oua" "qKo],I6Y" "fU!F'\''9u>" "{5 x]LDt" "{`;uC4~[" ",~zk|#zl" } serial "{]}WymuR"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port one-of { "*FWFX{J0" "Y>Ll09>Y" "9hnX8@6k" "yshm'\''r~N" } hash "#gYL&?I[" name one-of { "-i|.z`T" ",8W}YNwd" } with-interface FC:D0:0c parent-hash "W+{ef2tz" id { EdC9:* BB37:5D3e Ed2d:B077 9631:* EA0C:c146 e0b4:73E5 B22f:Efd9 77Ae:* } serial equals { "ZK@9x6N<" "}7ZbM!E#" "A,O.3%Gn" "%0Ti{l0L" ",T-AO?_?" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port one-of { "Sc,B.qfh" "%L R~8N6" "r$-rC;~v" "yp[U~ /Y" ", ERO/cJ" "pN{Se]+6" } id 1739:* name "~5B}c8EA" with-interface 1B:0d:F7 serial "KX.te?$/" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { ".^P:/EpE" "o;[LbPKD" "7H^Tn%84" "Zs VtIbi" "D6T%w}Q " "&g'\''L`Dpj" "ni}XBvS<" } parent-hash "o'\''>CI~Oa" serial "eqrAJ+E+" name one-of { "`zX02f&e" ">7^rmj:h" "LN+GDy>H" "2e74XFrX" ":jT3|Ni." "8T1y.V#a" "O&IUV,o:" "AaiziRVW" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "rpT[fRm<" "o8Five`v" } hash all-of { "<$t25oR|" "/+ >vwv=" } parent-hash ":ORfv_2J" id one-of { 0a72:2cCE bfE4:* eB54:37A8 } with-interface Ca:78:* serial "l sRp5*m" name "c!*vZnWr"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "R`Z`gX6i" parent-hash "= @pD7g*" with-interface 8c:80:52 id Bdd6:Ade3' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "U>=| @=6" serial { "C;szU@6P" "NA,32MR:" "8m5}c:~p" ".UgZK{^3" "?3*t!j[1" "EgY]OrbQ" "hKd70&?u" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "UAH43man" parent-hash all-of { "A+VqoH" ":m'\''ymU[f" } with-interface equals-ordered { e3:4b:* ce:Cf:* 4D:*:* } name "CBsuMcGQ" hash equals-ordered { "gtlY7]U:" "x}u 7*[>" "IpTb9YWc" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "vVuXkgvY" } hash equals { "+Xg7|nS?" "LBAh7[&Z" "0jBo=3Lf" "d,XM@ruj" } parent-hash none-of { "L;,RTXMG" "T%'\''R=E>V" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "w6a`xG_@" hash equals-ordered { "n*/}JO_W" "8Y2WK`kD" "?wpZ [mV" "y4:!MWqM" "ANbq$6v-" "LmXDIGJ9" "2mPA2Z|l" "6!M:LDz*" "hDM&i_h^" "LwU[z:Ol" } id { 0Ef7:* aFB2:* aaf5:aFd3 cE48:* 4419:CBce 92Ad:ec12 } hash one-of { "-A&SRAU " "p}Lv6~7!" "qE@ p7a$" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port { "ZB/]rEkt" "x-!F0S_$" } name "h4Ea!k`L" id { 00E5:* d33B:e9f7 568F:* } with-interface 6E:*:* parent-hash { "Rn.49Ml/" ".hM?Kl0!" ";>DagLEX" "qNireG/M" "wq'\'']dhK9" "59QKT?8w" "^a}~Y~^e" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block via-port "ZqDuUpoG" serial "&D==,?!e" hash all-of { "TN5aEI7[" "SF5&ERkU" } with-interface 5e:*:* id all-of { dCe7:* 78Eb:D3D1 bbad:4B57 BD4b:8dd9 DC8D:BC9F 0Ea6:* EAd7:Eb2D f95e:e70B } name "5m!o~Xfc" } serial equals { "p#f_vo+#" "5.a`[rDI" "/@$V`L,`" "ZA?@;!K`" "<{Ov{x8c" "'\''ML0kxaG" ",di|TmXj" } via-port { "r3WLsN@ " "$O:K<+Oq" ":xICCvk_" "uooBkLi`" } parent-hash { "&xj!Qfun" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface 24:*:* via-port equals { "$XN`8p$r" "TqS8;!L6" "sw&v0?We" "6CK@#?u/" } serial equals { "r{JT!cVJ" "fq9dCeG9" "?.jmW=p2" "_Vv?2A-:" "!%Ud;e1T" } hash equals { "En,#'\''S~f" "UAsT?dU+" "^0+t$:ms" "56%n>n%w" "rpPp?7Mn" "@]`SAq7f" } id b8c6:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface 25:*:* parent-hash equals-ordered { "ht_Hm5eP" "e%n?q'\''iF" "Tua5=t1/" "ktRw_P'\''U" "6vr>j;iV" } serial { "`YyM?>fF" "o'\''K1ve1n" "f/[D;X$H" "VY_yn0G]" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface 3b:A9:BF id { 59a5:Cad7 B9A4:B28A eEb6:* } hash all-of { "1?X2u9A7" "_`]`neGo" "Q M{30d6" ">-pqob~!" "VzM,Y<-^" } serial ">4J~>=e4" name { "+Z%U,Y00" "NM{+o^}%" "T.9qaZ^A" "HJ-Q{6z[" "8c+uJ<=." "3/J][.8." } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface { 3c:*:* 19:DD:* aA:3c:12 20:EE:* B0:A5:96 d2:Ec:* 90:*:* } id 5c1e:baBF parent-hash { "eP%]m#5H" "*]o,:N3@" "#&BkVZ4L" "wBnmz=[U" } name { "_" "r5EX5>kH" "b|lqUXYfvcq" ".F0A*k41" "'\''r2h-dh6" "7h`f1-f7" } name "8G7kkhQ7" serial "OsNC2zYh" if equals-ordered { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface 6d:*:* id 7FCb:* parent-hash { "BGqqqM56" "?dp[q72M" "SMeEnhAR" } hash equals-ordered { "LYHvjL^?" ",yi7>{K'\''" "m@>epG}]" "Z5VXM7q3" "8?V3/J@Sh" "d1!=aN:j" "u5oPoIU~" "PK~S_xcM" "tY-6>'\'':e" "k_et|o@w" "4xam[7[2" "f:s$YH;H" } serial "v1zlks:D" id Efcc:bFEc via-port equals-ordered { "I`??fBQ2" "~ g|pv`I" "bIO,gl^/RbH" id AcCd:7CB5 via-port none-of { "n|0aM2`!" " iD/>]cC" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface a4:*:* id all-of { 1cdb:5E8a Ff2f:75dA A6EE:D743 } parent-hash one-of { "Pc}|020l" "'\''G@Jrnb8" "~v8C-Yz4" "9^$W0A8A" "V/E+]D[x" "3?>{VB,w" } via-port { "yX~x;K=|" } hash { "vJuCVhx<" "fP{Dp0Xt" } name "pUZ*qJUW" serial { "?Tl/5dt-" "I^lZgZHl" "0s5_XF%-" "4v$Q@8^`" "-X_,HHAc" "]&vYO P<" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface aE:7b:* name "|8#QiJ33" hash "D~U9`z:k" parent-hash "X<@j9O;%" serial all-of { "*%,Ky/HE" } via-port { "rl58j%kf" "{~@CDQB*" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface { AE:cE:* d9:3a:* 8E:*:* cb:eC:aE 95:*:* CD:4E:bC AF:7a:04 } hash "_CKMJ0]N" name equals { "Gop@bU;Q" "1_s;X2=|" "z&63>bW{" "Z {~TV!?" "LO%KQla3" "H`F0+|k{" } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface all-of { 0e:1e:7c CA:Ad:* d3:75:BE Fc:*:* A7:C2:58 b4:23:df be:b3:* } id { fC57:* 58ae:9e5a 61d9:bfCC Eb22:* 7d29:89dA } serial "k]JqDsf>" via-port equals-ordered { "-.XB7dRR" "xG_Ccd/c" "LC!$Xgq*" "Y#,$uq;]" "MD@bdIg?" "%A^I5 s3" "Oq@7FSBo" "cFTQdt" serial "G!qbaP^{" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface b6:AD:1C id { B3Ce:9CBD } parent-hash none-of { "HquSqjm^" "%zUK}a[&" "$Zi,1`Xo" "YZ0`2j/G" } via-port { "A/+1F$no" "w 9{C`hn" "o67!`!bx" "QK6uQ!;]" "1r7v]E|i" "Z%S*:#~3" "eK[84Jxa" ",tMvkD.E" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface bd:cc:* if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface d7:F3:* hash "2D88zYyS" id { b5BD:* FAFa:8a31 bd0e:6EA4 8ffF:AbfF bFbe:* AAe5:A0fb 90A7:* } parent-hash equals { "d1MLIn+P" "t}pD*D'\''^" } via-port { "F.#ANH0I" "dI`AdJfx" "aWNs9!tI" "d`pqB@jU" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface e0:cc:66 hash "/olqC{fb" parent-hash { "dX%$0jUD" "[Bc6D>$_" "Y+;Ck0sY" ".MWzF/t." "$9h`HI7p" "D2Xqa.pQ" "D^4us:7&" "C4D5z}&*" } id 7C39:* if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface { E4:dE:* fE:EA:* } hash "Z$,WkT?t" name { "@zKN_{v~" "ww68=L]a" "/yR}Nx_Y" } id 995f:* if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface { e7:16:* 00:8c:* B7:*:* 96:85:B1 F3:DC:c7 8d:*:* 4D:FB:C1 f9:F6:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface equals { D6:6b:* 5C:7d:d6 1A:A9:fd } id E24e:* name "ATnytMKm" serial "thT 8a>6" hash none-of { "l?//cX4|" "kJ3PKdA3" "h-xcKG{c" "'\''GyRKy05" } parent-hash "nLQ&6Z'\''C"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface equals-ordered { 61:d4:0D f7:a4:* 5F:a8:* 10:BE:* 5F:6e:* B7:ea:* } id 7e3D:C64C hash one-of { "4S_>uLhN" "ymB40UjR" " [X^20f~" "DXY zCQ$" "ZkZIh0<7" "*R[^3%'\''=" "E#M&lB~a" } via-port { "C3{mIl4K" "]T%X~7Ny" } name { "MN4&f^:T" "nxc@Yu-+" "$.ucE&=x" "+Rd,6AJ%" "jpKp{93A" ">'\''|Ajd1x" "~/pN#L~a" } serial "2u{i/oM~" parent-hash "3E:mtsZ?" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface equals-ordered { 78:e6:0c 6C:3C:1D 3d:*:* 6A:25:* F9:04:Ad } if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-interface fA:3e:* hash "AmTqP5 p" serial "[|toucRl" id 1C5e:363f name "05Q9Xl3c" parent-hash none-of { "ATrZW!5r" "V^" via-port "t72rZLXt"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type "hotplug" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type { "hardwired" "unknown" } id 38D7:C5a3 name "otYR$=X2" with-interface { Fb:bc:b8 Be:*:* DD:*:* Ac:*:* 11:49:* 00:*:* 9d:*:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type "hardwired"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type "hotplug" id AfA2:9aAA parent-hash "Jc{r^WNm" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type { "hardwired" "hotplug" "unknown" } via-port equals-ordered { "]/EQL?a2" "Imk7@r=E" ":,a-OO{l" "JW/|jwu3" "WDNq;;7?" "WJ;x@6@6" } parent-hash "i&mhTu/!" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type "hardwired" with-interface { 0C:08:97 Aa:e0:* } via-port { "MU;,4G[h" "]v$$XKFh" ";,MZT'\''Dh" "g00{lD%j" "wRUZ*``0" "8#!J{gQ@" "`Z?3p92&" } hash "KYHTnNgP" id one-of { C60C:* d2EE:aDe8 ead7:214B 75Bc:59a6 3129:* AE7E:d25d ee2e:* A21D:* } name "n0CKUNor"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'block with-connect-type { "hardwired" } with-interface { 14:E1:ee a9:ef:1e } name "$T[" "X<3c%D*e" "UB%S[so7" "Z}.[Q6WF" "1>hZhf]5" "<34Evd'\''X" } if allowed-matches(name "*[*x9]~u")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "b0D'\''QA*e" id { 2aDc:A2Ba C8FB:fcEB EBBA:* 695C:f516 468b:* 5804:454D 1DC9:cbFF } serial { "3X: ,Cf!" "ugaG98K{" "Ezn~!j6`" "% Ues8z{" "[ZovP4^~" "lW$nec!U>" with-interface 0b:0A:* parent-hash "C?]%!-7<" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "Bo2h^]Oz" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash { "@C|3,Ouw" "PBPB=,5p" "3,M=HXmp" "^d/Oc`]{" "sXO6hG'\''x" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "[}~e0hn0"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash equals { "1kh30%d[" "p1=De" "EV8^{G}v" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "-~>gG%fTv{:T*" "Z=&nbK?+" } if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "Gm`6pj&%" via-port "@-]2I=^g" id equals { 7DFC:ae9E 2171:a7A8 } parent-hash { "GKN!A_k'\''" "apUd'\''LSC" "4ekw`kiU" "~!wwwVYI" "?]=;<|l#" "jI$!aT/b" "A?2SM7|:" "a;`8kMK}" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash { "I[PNT@Z~" "rsW97@.3" "?6=P@J'\''^" "j=;_bXLR" "->gZH*ra" "O]tZ5$$F" } id { 79E5:3eeC Fe67:fbB8 72C4:FD9A } parent-hash one-of { "T+2EUtG5" "ZK>VO'\''@Z" "ad7#,UQc" "N1}.@'\'',O" "3>34^D{|" "@$F2%=kf" "7B/OD4/K" } via-port "$DUYR{`T" "6TMrB1hg" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "lT#?*;OP" with-interface 41:06:60 serial { "MMlyhV=s" } via-port equals { ":VQzu!nI" "BZ%+~>By" "&5bF,jcd" } id 52b4:0b4C name "%=IHTdHV" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "?[mV2hbt" via-port { "NTL#35VS" "GNF;i$Gc" "[Pc*YAv#" } with-interface 8B:AB:* parent-hash one-of { "8ev{?iL{" "z/nzXAyC" "o*xz=03E" "Y]%[`A61" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "N:E8h;Kj" with-interface { CB:11:c8 83:21:E3 2a:*:* FD:1d:8F } serial { "FWnuG'\''ZV" "M2/T-:We" "2kVF7G{H" } parent-hash "*F39Z}Cl"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash none-of { "CJ1Nz9Z{" "WcuHsk6>" "NpjWM.]7" "NkY:--> " "V5jH}mW-" "t.m;e<#X" "pMHOwS[;" "1E~~5{tc" } with-interface 4a:A5:* via-port "Z^6=5TWc" serial ",W%frw%#" name { "S#+wxp:M" "VYeg}Ha " "z3PF,:q:" "N@b}A>am" "St!$s@vI" "!*-!t!Dd" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash none-of { "~m_rz19P" "J7K,'\''hSj" "n|#{gV7=" "`AB'\''I2Jc" } serial "R1GLA_n5" name { "p8rjMj/p" ";-Fu-,TR" "S;oHdGm:Eg" "3FikLCM=" "7=3FQZu?" "_a-Ztiry" "lQHw4oN6" "516SZiMV" } with-interface { 55:*:* bb:28:* } name none-of { "$}eZ+%-Q" "AlJ8CEZ!" "1M8nkB*|" } serial "@U_9bo:." if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "U38UP9GX" with-interface 75:Be:79 name "m21T_Y_j" parent-hash "j{AjXFP-" if equals-ordered { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "U lD+u:]" serial all-of { "Fb8b%OjY" } parent-hash "1b^k[@3v" name "1Wq*}{,J" via-port { "Nd[?'\''s8i" } with-interface c7:15:* id none-of { Ad7d:* } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "Up*][U%n" with-interface bA:e3:* via-port { "@ApJ.7#w" "+gA:sEtD" "Ir}3O901" } id { c4Bc:dcBa 6B95:9eAE c314:* } name "Z/]z+HW&" serial "L=D9AEA="' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "-XE`#cnz" parent-hash "chqw^{-s" serial "Z,JLN4a=" with-interface 58:3b:* id fb6d:* via-port "+EcI1:HO" name { "mVZvzunQ" "[Lbg9}A;" "Jzy5h}-]" "_K;gC -c" "fdP7{+IX" "O-$|L*o[" "_wv9$Eh3" } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "*^xG]YbX" id equals-ordered { 2EBA:A9DF Af4f:66cf d37C:* A1E3:a938 eAbC:* 42A7:Cf26 92cC:bf9c } parent-hash "?I/^7:LM" name ".yZMM>NV" serial "7=1~1MLH" via-port "sv+L,vRL" with-interface none-of { 75:93:7B 5D:0A:* d1:*:* bD:*:* C2:*:* d1:c6:* 01:37:* 44:A0:* } if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject hash "XYUYMU=z" if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id 0F1B:* name { "#,U,0 *^" ",$1P Vnl" "r%qhbEFO" "h5N8f Vw" "*d-Q_uyi" ">hTH I E1 {" } via-port none-of { "`di7N>ib" "vL:^QSP~" "_Zns|#e<" "S!Cp*0~n" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { 0fEE:* } serial "i516'\''{x;" via-port "nZCN'\''n_." name "lLSY}3#U" with-interface { 6B:D8:* } hash "]$t6GN5:"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id 2aad:* with-interface { D2:*:* 94:D3:9a F3:F2:1A 0d:cE:d8 dE:Aa:* 5c:B4:bA 62:ED:* } parent-hash all-of { "qq=]MS0s" "x|iO,5Hd" "GTb10H--" "8K+a seT" "8O^G=NEj" "E<8[gIRD" "Qf ],4 }nW;" "=#rDr^{L" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id 3B2B:* via-port { "+s2n~GJW" "G.R23S~y" "i55Jl'\''0_" "Wl4L~IAG" ":,!KzKtD" "v~]+0kAj" } serial { "23WapeE6" "@DVJk/td" "G~DpkBu&" "bM<{pcd{" "a :KAV&$" "Nw[?+~dj" "vupgW]+3" "EFHrH*r^~io" name "MR|#3K1e" parent-hash all-of { "i,nW517[" "S/#8 d.7" ",czl7.$+" "$Hf~Duzd" "]7v&Evwq" "=SA-{ R;" } with-interface e6:*:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { 3FfE:* E3E9:d174 dCa7:136F BC1a:* c21F:1c0c f060:* } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { 49AD:* ec5f:5EB1 1A44:e4c4 afA4:8a4d af89:755E 0b63:* 47c9:E34F } serial "&iwWT|6x" with-interface CC:60:* via-port "#hlL8Q12" name none-of { "s}$OqHc&AB" name equals-ordered { "kIXbZ&Iv" "b%GDhUO " "uyF*6|c&" "ImC&Pt.K" } parent-hash all-of { "x25nCP=&" "b16r` -:" "*p}+KS`=" "sW21L0_N" "dk=q|XmO" "iC~C`dY " ":-vuH@+k" "@ &6Nr`K" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { 92b0:* A9E4:43cF 09E8:* DFce:3a8A 4f5a:5EBb b5d6:* 8c9f:* } serial { "s~vn=?,Y" "fXV1gP'\''S" "dfjw;tkd" "}yiH]agp" "Yr=~E3a_" "L33Y3lBb" } name "Qr+W'\''o5@" with-interface equals-ordered { 38:*:* D0:A5:* A2:*:* 47:*:* } parent-hash { "1Tjf" } via-port { "iJ#[#f`T" "D1PIZjW6" "JX1ov!fr" "Qr.R`0Hc" "|oM@a,8U" "f-1~]lMw" "Hw2wlpKR" "e85}*T%." } parent-hash { "1Hw1mIX4" "5Ozd.v88" "0FkXsJ^B" "2c&>*dcz" ">9|dWE3%" } serial "2XEV7NhW" name { "ys;K%M!Y" "kv%{TNI1" "F@gO+~cM" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id all-of { 6f3e:4B62 7abc:7F67 6270:52B8 bEEB:14eb } if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id all-of { AdF0:* aF48:6BB4 6437:* 6C06:9cf8 9d72:94cc afaE:* 0D5f:6f89 } serial equals { "t?@u8guJ" "3tlipcoe" "&%AzJBDr" "`K;/4B1`" } with-interface 8A:*:* via-port "8jom+v6k" hash all-of { "Z*HiOkgt" "s$$_,o:m" "Fe${.H,v" "2jRbyQk=" "_UMahp." } name "NdIzfn7p" if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id B7a5:* via-port "8ij/qhi2" parent-hash "CPP6Sw3h" serial { "lx+VNll0" "%MKO_>R~" "~.yx/ri+" } with-interface equals { Ef:*:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id BF5C:8CBD' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { c291:* F3a3:* a6F7:a1cF ffF2:* } serial equals { "I?a3bI5l" } via-port one-of { "029&qKTb" "=EJ N$h;" "F2g6CjE&" "psu#e2-x" "i!NbSlDi" "eh9Z`x@I" "j_!jE+ku" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id c3cC:* hash all-of { "LE@#m=8^" "r. TLT~X" "lwHAY7FD" "x0A7@};4" "H:fBT5My" } name "~zx9Sr!2" with-interface equals-ordered { 6c:*:* f6:*:* e9:dE:ec 20:*:* } serial "[FG+Oqb9" parent-hash equals-ordered { "'\'';?3}Ehp" "ALVSz7pU" ",$N5l:9T" "2LFU50s*" "?6Ht-3jA" "Vo.1@{1 " "2%7$o6um" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id C658:DC06 parent-hash none-of { "jT9W65}`" "Vdq]R$w|" "r=9cOI[4" "-;Ucr/<7" "u!}jK%zO" "@i /{qhA" "+c.n8C,<" "KPP}fiSt" } serial "LIX CA#3" name "AXI*a'\''!|" via-port { "D54{9Lr1" "w8^^9*b&" "FQ]@PUrG" "n~!sV_D5" "3*q.T,>B" "YRfS%0ii" "bX{lH=FP" } with-interface fE:28:aD' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id cEbB:* name "dA$k/Gfl" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id D858:* hash all-of { "wYj *H.i" "Kzl[m3p[" "=8z5EbX=" } serial "g>_?@dsqc" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { E9D1:F5FD } serial "" "X^6mK4x`" "'\''%@dOV#_" } hash "x0CHSDxC" if allowed-matches(name "K Gfi!1p")' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id { Eacc:* a6bb:* 5B7F:* E5aB:* d064:fA1D Eb2F:* d623:* E50c:DF47 } serial none-of { "hVmcqCF," "!P_+f]1c" "fdfng[,E" "*JznKWT " "^1}M%{M " } name "xg[a7_Z<"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id fCf3:8e21 parent-hash { "7VK[#h5N" } with-interface 9f:*:* serial "jAdP:Z5g" hash "5&ptC#n;"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id FD06:* with-interface 20:*:* serial none-of { "6PX4K?U2" "+8I+GUde" } parent-hash { "3E$DcA5>" "t+Dj2Qx*" ",Kh39ykT" "%od12 .e" "N;JUVP2{" "vjXMynPJ" "BsXh@WiA" "$!qK`.D<" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id none-of { Ac4c:531b 322B:Ddaa dBa8:* adB9:b737 94ca:52ee } parent-hash { "ldHR'\''Z{9" "oUXbhJ:7" "ASlMOo-@" "|B?=jfBQ" "bBT$CfOm" "L0s[L~xX" "ggfSi_u~" } name "]JA3! ~{"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id none-of { CB8E:5F01 F0F8:7491 756E:* } name { "xH1K%16p" "f8IaYm:7" "qldMQwAy" "yURda{Yz" } serial all-of { "9`=C|qIb" "Z.P^*0fg" ":N=;w!CI" "N,9t//KC" "WEA%^|To" "28'\''p r'\''," } via-port { "$aLcV$yi" "};<{St]i" "9B+nCP-8" "nU|pJibH" "$+naTyL8" "g 3XTrU9" } hash "nfHI[N|D"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject id one-of { ad8f:2dEe 90D5:4110 3D25:b8DC f2ce:* 116A:* 2EAB:* D7AA:* } name "5=/x6jiG" with-interface 8C:4B:* via-port none-of { "l!y2V>o;" "L`Gm~U5s" "bPtmRur8" "Z W+_x^c" "6a+rBNV%" "AyDpi0g-" } hash "lHDzSn.c" serial { "BmG3_dJ-" "}^hWJ{?v" "w*$DF!FK" "kkQNPA`H" "SMt!`X#V" "9o7at*m=" } parent-hash "X`Xcsvb'\''" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name { "0.3>p?[#" } id { dA10:* 08c9:7cE2 DA31:* bDA8:* a6A8:* 5aCC:* D55D:91Ff } via-port "w,1NnKf7" with-interface equals { d7:DC:* 81:*:* f1:fE:4e 5E:Ba:* 2C:*:* fa:22:94 30:3a:* 59:B5:6b } serial "YWz@`LrK" hash "NYe2I9QE"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name " 5YsSERs" serial equals { "?knRo&X`" "7LCsKjVO" "rT9>5Afr" "?YNluTiT" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name { "@@6<:=:C" "}Xg~gi|L" "&KS`*XHb" "DFgIE-" via-port "vZPjD]1O" with-interface 92:cb:d5 serial equals { "wT$g3ei/" } parent-hash { "XfY8@wT0" "b4%O3xI$" "-ZUKNz" "_Fz4u7`L" "2/X@NSO0" "`]]k?|wv" "<%:W

Jye[U" "y5x#/sv4" " :/2Lz=P" "HzD8 ~:Y" "A[Tbwb,`" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name "/@jbkQD_" serial "w&'\'''\''4D1I" id 1d0a:9c3d with-interface one-of { cE:*:* 8a:02:41 A5:8c:cb 51:*:* Fc:*:* b6:0b:* } parent-hash all-of { "n[BckQO." "2w=0/ %E" "}&/+j_Qx" "C 5/4{}p" "7<8+Z.Nx" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name "+ k@2AK[" hash "p]XAeB4<" serial { "t`4i#?@j" } id { d1E2:3f0c f9bb:eeF1 } with-interface 4F:24:C9 parent-hash { "rmn2uS`B" "7!>X-#t " "Q/z0$}y!" "n5q-UQSV" } via-port "T]5}gqCr"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name { "K:bJ~pZN" "7/WAM$7U" "5Y@mWwK{" "?;~[$&2T" "_" "|2R`x9'\''L" "C}2lpXN*" "%t vMg^5" "-3,kbJn~" "YqeMJmK " "$utXt`4>" "`ItJ;%v-" } id { 7A72:A624 aebb:* B5E0:f82b af1B:* fbbC:* 6fdc:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name "'\''*'\''ODy,m" if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name one-of { "A_!ageD6" "#dnn!;1C" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name one-of { "*%jBcE^$" "UQ>z9d`d" "oDjo`d_8" "5.aan,I-" "P|2agjJ]" "qWsJ`{/c" ";=6H[J8&" } if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name one-of { "MjwwJ2[#" " U+&#=;C" } parent-hash { "y{RP$j$>" "!~rML4GS" "Ll@k**[G" "lCOO]z.'\''" } serial "h~=Iooa]" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name one-of { "$nm%oD&`" "NHYqfUSX" "5fak#K,#" "Axm5~6Yd" "/+#>QCn!" "w.Wdv]d}" } parent-hash { "dv=6cauW" "&*zIIRMW" "]Cjp0TM@" "ufp8mYf4" "+b1B`Z6;" } serial none-of { ",s`4!EqI" "UM>7kns9" "!8SWI.9^" "xV4z*>#5" } hash "<8K22oJJ" with-interface Fd:6c:FA via-port { "{Eya!^r}" ":+R{W:4%" "%*pPgWF" "OR48bQGf" "1<}L[-r*" "X8?ntxcn" "u@s}<65M" "jRRI*o&#" } id all-of { eCE0:7baC 1EEd:aEBC } serial "Y=NJg9wI" parent-hash "X:;ybhwQ" hash "|mal.Sx&" via-port equals { "$_si#$^F" "sUaA>WLa3[z" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name "rEsKUes`" if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name "u/VVdX-}"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name "$:VLVUt1" hash "F2=1BmK#" parent-hash equals-ordered { "`0tMM5yI" "M82GhsG8" } with-interface 9D:ae:8b id equals-ordered { EbAf:* 6438:* b7BF:* 817f:f85d } via-port none-of { "*/!PBa&a" "&|BQ?*5x" } if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name ", W+>V+[" serial ";TRd,dg5"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject name { "X5Rn6eh4" "GC8|#lQr" } with-interface { Ad:9a:* } hash "|G" "_PzgYs6*" "STeHy+rkdJ!" "3Q+qNz5w" "w`aG'\''GI " "_-mIGw&." "n0;W1OF;" "b^M,y&qH" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "0r_<@7i9" hash "1CV'\''OF~j" serial "d:ED>o!~"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "2wNrRzr6" serial "!>#bDOH}" id 1FEE:* via-port all-of { "ShfwRw0q" "3GG#ehwQ" "B- :G'\''E." "k_1]w1N^" } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "_7ZLxB6G" name "7WCR'\''X3y" hash equals { "@!=xWS7;" "`@{plKR|" "TVmxF59U" "*G359Ie*" "?s>qMjR{" "W|}.YuFC" "fVHHkcVn" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "8t_CM>e^" with-interface fd:a3:7a serial { "Y;g+x~Mv" "4ZR6l?%4" "Lm4HGQNF" "{K[@b]SI" "QZp[3dMc" "Vu:m32:," "%*z5}OX" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash all-of { "P7]c0nNX" "3_&^#yEJ" } id f95f:50B3 name { "!LhZc2*;" "}T6nb%,[" } hash one-of { "lT^&hCCJ" "xrQ|dVvY1deR" id EA9f:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash equals { "=9b|uzS&" } hash "; G~.kY>" id { 27EA:88a8 b64B:* 7cD2:* 1F8f:67a5 } via-port { "PLh*QJxq" "Ie Lx3Bl" "pE}F,+&:" "M=7Ybu[}" "o/2j4D[1" "]Nxs]%/=" "Y4wX:AJG" } name "Kvvv/@aZ" serial "OTo[nEQG" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash equals-ordered { "bOV/%R Y" "A4e6 Aw-" } id { e037:29cC fD17:9676 } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash equals { "oSq:n=w>" "f4r1=muK" "!K~XvSkO" "G^BHQRy " "Jg}IBh,g" "YLEJQAx5" } serial "3bLc{.ws" with-interface ba:8A:3d hash "+>YsE`n$" name "m>1hCH;*" via-port "Zu[~8Dp_" if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash { "GOz5^lET" "^ D;G9;o" "i^b_jYaK" } id 2d0B:* name { "AO#w:4+@" "XqQ-a>Tb" "16j||Q@f" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash { "H`HFW+Bq" "ld@SlY?7" } name equals { "&D9h-rx]" "I|w]WM!c" "D67/_fad" "ltD`@Z_EPLEx" id e776:b4de via-port "X=Z$q9QL" hash "d'\''K6!i9k" with-interface equals-ordered { B5:8a:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "~N%%gcbm" via-port "sO3#EYB-" serial all-of { "@B#>.>i_" "I+=9jDe2" } name "QV,I&YBX" id 8fD6:bB51 if random(0.4)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash none-of { "=Gi[ M/H" } name { "<=%@z<8V" "SQ|DTt3Q" } serial none-of { "L cRz#a;" "+m`@ 1mE" "J.x0CTY6" "|w+9T]cW" "0e%t27<~" "W1TH{=>d" "1AuYe@#T" } id equals-ordered { bfAb:* a4Fc:DEDD 26b0:9B0B } if none-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "N|ZSy3;C" with-interface { 2D:eB:aC 69:*:* Da:*:* e1:*:* 8A:6d:* 37:Ca:1f 58:D4:D1 a6:*:* } via-port "$;E_qiz~" name "CCAi7r,%"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash one-of { "J<$/a@lJ" "A2!r,IcW" "iyueSV0-" "P[MnB.!C" } hash "uUf0 z!k" serial all-of { "aA_A 7Y;" "1I*^KP'\''2" "1}yHe*@C" "v,Q|Du!v" "4|:$N$Pk" "Wj.W>4R," "}Jm5-dyo" } via-port none-of { "iZt@2Hu4" "XD4RoDKv" "VC&?CMr_" "e]deW#?c" "pyrMs&Tj" "+Gr{LmeV" "=VO,.SD1" } id all-of { CB9E:aa15 dAFd:* 3D0f:da06 8a84:a0AC 702E:0e84 }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash ",OW@B=j+" with-interface 6c:6C:e4 hash "GWjH-J~~" serial "6T;9}=:3" name { "bS8ZZF$c" } via-port "QD_,gF5K" id Ced9:80A9' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash { "P3c+rNLA" "%R176MB/" "M8b${|e~" "[[,mRM.s" "k|=QPF8'\''" "[[t?Vs}N" "}iEf8Y`A" "ezL~@?TT" } hash { "*b@P!A,8" "42?I^aRJ" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "Qt 6lmKA" hash "*<{Bo}+@" serial "O#BcnMLa" with-interface 04:c8:* if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "?@sIZG]s" serial "9j$ed:J^" if all-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash { "s&wl/vew" "ti:p;+U<" "]+<_5~O*" "GCsP9^-a" "iN@5d]S2" } hash one-of { "[,PrhA#Tfe>Kn"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash "tU/{gC,%" with-interface 50:*:* via-port "ZwF!e#Vv" hash all-of { "w1uq;#&e" "{Go-91~N" "XgqIqSt<" "Ob2Ja#Pw" "mpt8^~YW" "2|w}^!I," " WmzvZK3" "e'\'''\''=/>,e" } if equals { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash { "XPQ&H?/i" "4$0A}vu@" "-*'\''+,D`L" "UXt:R^PY" "nBZE_w!j" } name one-of { "J{TnYcN$" } serial none-of { "R'\''B]U?N_" } via-port all-of { "j!m}'\''mlg" "@Q[199]*" ".^&m|fFL" ";k`UMvqo" "5|m.2>S%" } with-interface bB:*:* if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject parent-hash { "xpt85li4" "5MbYU}#<" "fc'\''Lt|X:" "~#|7%brx" "9dubX5me" "7k|=2Udt" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "3*!TVEF." name { "=1tabA0C" "7]GQXA+G" "GOU$@B>?" "&&UpmWWP" "*mwY!8T2" "!xV1|PH=" "uma={s!9I2S_" id one-of { 4cBE:0AeA 8A63:4f7b 4204:1f52 CcB4:2bc0 56f3:* fa3b:65dA } via-port { "H,EGcl=1" ".}2_5+ru" "Mp7ZYx}'\''" "cD0{q*1O" "eaGU"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "&4WC`L,g" name { "/u*lF3x+" "F'\''*6ZwZ~" "v`CLYgAq" "69}NC][]" ">US,9#n_" } parent-hash { "aPaU$#JJ" } with-interface { 1d:*:* 5F:3c:5b B6:d0:27 FF:eC:* C4:01:* CA:03:* 9e:d5:* f9:b4:* } hash { "Dj!q$aWH" "_Z^*&PkM" "Q68'\''a-PF" "h2y&o5.R" "f%Q7uFmY" } via-port { ">eqF'\''4zV" } id none-of { 3C9f:* } if none-of { true false !true false }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial { "4wu05cpJ" "&_w*2 =" "XcoX}[6S" "?v$E?48'\''" "kt[C*+G?" "]*/IY62," }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial { "7xIHQ&6k" "dkp95tZ>" } name "vxgJF1`8" with-interface { Cd:*:* } parent-hash "+K'\''Pc;v0" via-port { "$0=*6 1B" "a5GZ[]m!" "g?+vIX1T" "a3EEY'\''RX" ",$Wd<{g'\''" "$fP.:VqR" "z/;VL0Oy" "S|5qpw|E" } if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "7*z'\''Z'\''&G" via-port { "ab_6Y['\''}" "`8DE#Sni" "{eGE-8,o" "]umndJTy" "T_m!{eu~" } hash "dv01sV`4" name equals-ordered { "D=Kb&V8E" "3qbhv7:D" "qsKb3Q=v" "v3I,4_Bb" } id all-of { 85C3:Af6c c0ac:B772 6CAB:* } with-interface all-of { 20:*:* Dd:02:fF A1:ec:Fc d3:43:2d }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "8NBn[Z5X" via-port "A[mPm{T?" with-interface { df:*:* 8E:46:* } hash "XaG2$9dw" name "O-~qONma" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "}9X:0,AO" hash equals { "?Rkyb7Gj" "`rdVxIPH" "!psLZYri" ",O'\''Dt]A2" "{x13ogap" } name none-of { "z.K9x_5t" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial all-of { "6wUEMpXb" "jg]qSe*C" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial equals { "8q*wl_7;" "#?Cz25l>" ",xX2#>^7|" name "C!&FSf[[" id one-of { 21E2:* 49fF:5365 ff8B:3B40 bF63:c127 F4b2:* } hash { "h.JdhBxY" "@Ao/K1WI" "0ZeybeL+" "`C6:E>k^" } parent-hash "~lhRb8yO"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial equals-ordered { "QyXLGQ[F" "G,5>pfG7" "-abZ?fQ&" "d5]{bX|!" } via-port one-of { ".SZx$,lo" "9ULx%gd/" } with-interface 39:*:* hash "e^1EyKo-" } hash none-of { "!>U%:4vW" "OrTvY# #" "-siS+*AY" "PHUKiMtB" "tQ~pe{8}" "W|*vBwhf" "TJP?D9LH" } name equals { "Q%xmbV44" "nD%v>O`&" "BM$RWJtk" "d?K~f'\''GX" "jiA6lJ&Y" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial equals { "YBM#3e+Y" "LW&++&`]" "6S0iF7d}" "Bn+QD_p>" "8GrJ'\''TDw" } id { dcb6:9e73 dEca:9a81 fbEe:* 3F7c:89fD eE3F:93b7 } parent-hash all-of { "qM^t^MMI" } if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial equals { "zYPQUS,t" ",8s@iV[+" "zv=|Ibee" "]wy @V@>" "ABe5y;Ne" } hash "&2S4+h7x" name "zg'\''o? l`" with-interface none-of { 11:*:* De:63:* bF:2C:88 bE:*:* e0:16:E6 67:F0:eC } parent-hash { "mLui`B66" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial { "gXw/X>[Y" "j9NZiw 8" "bUuO>jOj" "%iY-U`j." "9:MoaC@T" "yM;^e&8e" "cB31QIrY" "B8@K" } hash equals { "9KbK7 n9" "7^Y}y[zC" "$~b2VKV6" "p5?:2;6^" "-E%Y/xS<" "gn& OydI" } id 0218:5aD0 with-interface equals-ordered { A1:FC:A7 b2:*:* } parent-hash { "{0d /DeV" "^M0h8rW+" } via-port "4|l" id Cc6C:* name ";F" "u&YS8Kp{" "eiqI#P{}" "ckmD~,eL" "b@BoOd16" "w`xS]Shd" } name { "]$6n&V}'\''" "e0ZX%H%n" "?w.GsXnD" "+@'\''hG y]" } via-port { "ooyc-XxV" "Ijg& $qk" "4yy K%Dd" } id d6Ed:E850 if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "NU/;XmN<" hash "kcA,v-`r" name "L?Mjqz5*" if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial one-of { "q%A%e6}A" "8j1jmnsY" "h_'\'']MvKa" "Bj:D]^Z " } with-interface equals-ordered { b7:d2:dF } hash "Xte%iyb3" id one-of { bB8e:* d6cE:* a3B1:4aeB e3Dc:caBe A40D:* c828:* } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "qm4,tfTk" name equals { "{cidNdy#" "^{W:5f$j" "zDsd@" "s#qz,9" parent-hash "qix@~0oi"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "T7,F{/K/" name { "$V.[Az2C" ":2#a14H5" } hash { "f` >1Q/t" "+KS4`]@k" "[Q0VLrbo" "=GiN1}@N" "}-ZQIC8W" "q4xXjc$T" "}L_Lm_v6" "p=ETrlQ6" } via-port none-of { "&2k,G}2d" "I].&A+rN" } id 6AA2:* parent-hash { "OYDuGi8^" } with-interface 50:*:* if true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "'\''Te}9S.5" if localtime(1:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial { "ULk+s2#t" ">H*AHgXC" "J]?wS*F_" "D`vhu%Uh" } parent-hash { "9KJ8-A*r" "01,=@zx^" "R$_Y}'\''e3" "{*^-a7hv" "xV,g2RF2" "830f-Hdp" } hash "mJSqiT#;" if !localtime(2:00)' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject serial "UTk+Sla]" id DDF9:* via-port one-of { "M; ^=6Yc" " S|~g'\''1|" "0AKvgTcS" "fMzh8C#`" "uulT'\''}rx" "&Er" "n:w/i.N8" } name "|NzS@zhj" id aE53:91ca serial { "u4qBeA%N" "@}WuVN-E" "=8w.|e?g" "$];{w#1d" "&m:dk0OJ" "{[=b}%2h" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "&6;Lp3Jr" hash { "19ue7ppW" "jPm_E9u[" "XHXbAQfh" } id 74Af:* name "#w%^nM29" serial "GGc-*I#H" if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "?7c*ChM~" hash { "#mcn/L%|" "#+R}c0_2" "BDDM6n|;" "@^|+S T1" "wF4#0qg/" "3]m?w!@4" } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port all-of { "K0VqF+Gb" "3pC` uiR" "J9oQv@xj" "@a~]k`Bs" "L4p=hK,W" "v<^_@9pj" "0Qf!kw>O" "XL,e|w29" } serial "c@Mv@072" name equals { "QtCJ@G1X" "v%Zz];Nk" "OgDAzb;f" "QCD20FZf" "3Kc$hF`v" "V5eASmy`" "7[@?=n'\''1" "`8pM6g=2" } parent-hash "Y<./hNbL" hash { "0oAp/FC," "^B {c<9S" "QCZmbegC" "6V4Yqg;p" } id 29F2:* with-interface BC:*:* if random' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port all-of { "$xiRRuA0" "ucED~8D~" "5!3@6d/;" "A1G?#D%x" "_><84;Od" "L~|hS{ie" "Sbr{v=!h" } name { "PQ+BpVq3" "U+EGir[X" "tQqCvPJZ" "-@Wl6^2t" "e#EQ;%;V" "{6:06@~?" } serial "&IRo@|4y" id 73fA:* with-interface fC:02:Ba' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "bD8Rd4h3" id FbB6:CFC2 with-interface { Df:F2:* c1:ca:* C9:dd:* F0:*:* aE:D8:* 3f:F2:cc } name { "BD]@?>Pe" "y06|$chx" "j5bwMTxB" "QxyDi6}7" "XOhlCYXh" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "bGnHdw]w" hash "k$'\''d~z6n"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port equals-ordered { "&=xQv@>T" } name "G:OIHDL%"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port equals { "RcN0%qdv" "wL/s -2j" "m|pNyWw/" } serial " UhO;hcr" name "'\''a}h{Bq|" parent-hash one-of { "UMR~^Q%8" "{43&ERq@" "_v>]YJ>^" "RL$N9DPe" "ln;dlnX " "L~<]0Pt$" "5[d_kiJ0" "N8^t'\''%$J" } hash all-of { "y]8T!ZjI" "v/_QaO9g" "BmEU$o6g" "8luhi=k{" } if !true' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port { "%G]q99,m" "pS QkiA/" "Pw#,[*Jl" "t]/CPH.7" } hash { "K@Xx7_.6" } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "HXNGe!~r" } name { "X[O61%i*" "}m?t*CL," } serial "&pwE EB3" hash "&VndDS!C"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port { ":i0cIL'\''M" "*@I 6*m~" "yzmdhl,~" "~b!M|JFN" "l}k>O#<9" "Ir,692JX" } id all-of { 82C4:* } with-interface 12:2a:* parent-hash one-of { "rX_x8`=H" } name { "7WWdHd@." "*+BkA*_G" "[Qjw3%ke" "RBF;Ct9y" } hash "}Jss8/:[" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "I;9@" "RI=H7cEL" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port { "Kz#>Y7h&" "1H;f+x0J" "9yfE/aP?" "SVO/1vE'\''" "Dp>`bvY^" "HdZ=b8AR" } with-interface { df:59:* cb:C6:* fd:*:* bd:ee:15 F2:1b:77 5a:Ab:* d1:DD:69 00:dF:* } id equals { 9F95:979d } serial { "W,#1v9^L" "dK=I5w2~" "Xh51tX#Z" "W|SO^7p+" "q/$9M`&3" "L0egqhkc" "Q;ZhaO L" "1VT@_3+-" } name equals { "sLC_IeZ0" "uyDl3!'\''%" "Sj@8b~$X" "EXW*!-Kd" "_u8tM{0<" } parent-hash "W]_P!+7-" hash { "@2[K+BQL" " @/-L'\''=@" "A61T0=U4" "=_lLts/{" "XNSHKWn'\''" "|a{tACCh" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port { "lGGya;4 " "&O}+H*?3" ";zFFN-" hash "N{:t^rC~" id { bE28:* A1aa:* Cbc1:6130 5EB9:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port none-of { "5Z|q{oD " "TIp&-R+I" "*j0:mqm{" "n[PSiWbK" "mh=#eyiR" "+rg&18WP" "}!oMK,tm" } hash "Yt]2`N1~" parent-hash "atg,JQY-" serial "uBEk@%#+" name "O*9.A-AW" with-interface equals { fC:D4:* 75:ee:05 93:*:* Ca:AA:BF 55:F8:7f 89:B3:* C4:0E:* }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port none-of { "6$%l,XTW" "=9|vn?v<" "|G|z!gN," } hash { "PU$$Ze3@" "C!:Bp,Vy" "'\'''\''@1lTHi" "1fdP-c<6" } id equals-ordered { 67b6:* aCfA:* edD3:* eB7c:f594 E08c:* 9B0F:* 667F:Fe05 } parent-hash { "bcLD0MZC" "wI>f;$" "eEZGDHwf" "4Q3sUS++" "wY,SpD,k" "Z}-o#?8r" "L0k}},Q`" } serial equals { "WeyWk$wd" "k3qK9#tf" "f.PzwCh1" } name none-of { "6/R~QS1A" "TC3J&| g" "BAXF!1H:" "ETwE?L4K" "a,XQ@mS5" "*M40BIUR" "]EU19Gp6" } with-interface equals-ordered { f0:6d:* EC:56:bC fF:90:* Bf:80:* 1F:e5:bb ce:*:* b7:72:* } if !false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "[nV2,'\''_]" name equals { "Giz|X=bX" "N`*1%<6c>" "4_Eo@!%4" } parent-hash one-of { "jx>bd$fq" "v'\''Mgl~j#" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port { "Xb," "A4v9y81 " "kL!93cbP" "ZEft4UJ>" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "^q- .QhX" with-interface 9c:d3:52 name ">HR2>{#>" id { 524D:E4DA 9235:* 342d:* dFf8:dC1C b0a5:a3F6 52c2:* bDB6:* } parent-hash "VCxji7#0" serial ".-O35PI~" hash { "H/:8rNSr" "b=J@*vm%" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "Q$q*" } name "fRz5|x=$"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject via-port "vh BXA=^`7" "ps4dan9w" "dH>d%U9K" } parent-hash none-of { "tJqRQ3bn" "dlw=m3u|" "n6$r?u]e" "bV9Q?EH]" ">FA" "s6+S2%l5" "E3pv/;BY" } via-port "*5:v~5i9" id one-of { 2C15:8aca E1d0:* 8e8f:eBAf } if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface 11:*:* via-port "F>dN9k8u" id dd04:* serial equals-ordered { "8ceTmi`L" "U@?w]Bp&" } name equals { ">,7DlJUZ" "xg:B;try" "QnHe$K>[" "tq@1&:ZQ" "2bd6T5$R" "$hPfMM]-" } hash all-of { "bc&kA?os" "|ZYtEw{u" } parent-hash one-of { "2U=YXA{:" "c:Tm_#2S" "}z!w'\''1B/" "4ul%Cwk-" "O3>fc]{}" "v[m1e-Jh" " $|!r<:0" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface 26:9E:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface { 2a:08:04 f3:Da:* 75:*:* a5:99:Eb BF:62:5D } parent-hash "J-Okz#D8" name "[hEk%Lx@" serial { "&4Q_y:/T" "*4!n.F}n" "7he9Ds7-" "X-Q.5$Ex" "3G@Y~qU?" "MnBe" serial ".qUztFD?"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface 5d:*:* via-port "~E5V%!;e" if rule-applied' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface { 61:*:* 05:*:* } hash equals-ordered { "pqA>L{h/" "waG&}3`T" "y?>'\''tXXX" ".8 R}D4V" } parent-hash one-of { "zse-_#V7" "@J5SFAYW" "LD$|4E h" "xO :4mfF" "9O7SIM@'\''" } id { 9ACC:* 5A63:* } via-port all-of { "V7U8B7{>" "wVJhb+ w" } name { "cGx&|$|E" "fn?$,61e" } serial "U|~BC`7z"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface { a1:*:* 03:3E:* d5:4C:* A0:1A:dD } id D0FF:E036 hash ",ILd,|,2" parent-hash "IdwSC*:W" via-port equals { "EQz-_|Vs" } serial { ",$m4~]*8" "LQ,IDL~3" "H/=1CmFZ" "DGnkBUU1" "@}mYr2O#" } name "Cyd!Va`b" if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface aB:eF:c3 name "-w,Mcb$^" serial none-of { "X@%WOcGi" "UOz'\''%$kH" "4&4R.P`N" "N:Eq gX&" "O$^a$LeWOnXgR" } hash "0URbo;UI" if false' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface c0:*:* id { 20Bc:* ddD2:0221 b26F:8AcF 5E66:* aEa2:FEe2 } serial { "`xT6]S2'\''" "f$v;>cT8" "fPhC>4vl" "a.Me#7j^" } via-port "UUj@H.3r" hash { " ?n6!6k/" "Z>{_S%GH" } parent-hash "*CKflJ>`" name none-of { "^$~7=7Lw" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface CA:FF:*' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface cC:e7:BE hash "qRY/7Nrk" id equals-ordered { BcdA:2171 898c:735D c70A:6aC8 aC5A:* } name { "UmIo`9:u" "PqvByT+l" "Q~s-+B6&" "|QY3b4ba" ",w&!Pk&-" } parent-hash "m&yOwhm+" serial all-of { "!7+ql}$F" "aU>u uoT" "dW9fQg&<" "!sZ.wN0L" ",bxT.~h<" "8I~,f q=" "iZ2^XbSk" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface { CD:fE:* d5:6f:* } id { bCbF:* c04C:* DF52:Feeb Ec12:45De } serial equals-ordered { "U$@AJ5T^" "]CEwaZm1" "_#>'\''L8@3" } hash one-of { "obCl_1h*" "e|~iGd5I" "UkIf]O<@" "Uc;vK3W&" "XkVv'\''Kx!" "M'\''9Xp:kk" } parent-hash { "PmRYV5yf" "b1ae]ZLS" "<*#65Evo" "TJr#Z@&q" "K*uZHI,E" "^^6pBx3+" "cB~uUU>~" "L^U4+mV8" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface { cE:6E:4D 8D:27:* 48:a5:* 4A:22:18 } hash "QO*BIH-E" via-port "YO[Rxo1n"' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface d6:75:* serial "K6qOwgW0" name one-of { "nqK$62cR" }' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface d6:*:* id 4320:* name "+@rSM,?:," "rwM*Ex|j" } id one-of { 028c:7202 B82E:* } if rule-evaluated' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface equals { E6:4c:* 4F:8F:24 A8:c1:C8 5e:eB:Fb ED:*:* A1:3d:* fA:*:* } hash "rJjT-`yo" id 26a5:0e6F' Step #6 - "compile-libfuzzer-introspector-x86_64": + read -r line Step #6 - "compile-libfuzzer-introspector-x86_64": + echo 'reject with-interface none-of { C8:3C:* 4b:*:* 5c:2e:4c 7f:*:* BA:F7:* d3:4D:cb } parent-hash none-of { ":m_H'\''h`:" } id all-of { ADc6:* 332d:* } via-port equals-ordered { "vHE?ZN;x" "Ga:kiC`N" "PlOjBwj0" } name "GQu=1.0.1 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading contourpy-1.1.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (5.9 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting cycler>=0.10 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading cycler-0.12.1-py3-none-any.whl.metadata (3.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting fonttools>=4.22.0 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading fonttools-4.53.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (162 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting kiwisolver>=1.0.1 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading kiwisolver-1.4.7-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.whl.metadata (6.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting numpy<2,>=1.20 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading numpy-1.24.4-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (5.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting packaging>=20.0 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading packaging-24.1-py3-none-any.whl.metadata (3.2 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pillow>=6.2.0 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pillow-10.4.0-cp38-cp38-manylinux_2_28_x86_64.whl.metadata (9.2 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pyparsing>=2.3.1 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pyparsing-3.1.4-py3-none-any.whl.metadata (5.1 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting python-dateutil>=2.7 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading python_dateutil-2.9.0.post0-py2.py3-none-any.whl.metadata (8.4 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting importlib-resources>=3.2.0 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading importlib_resources-6.4.4-py3-none-any.whl.metadata (4.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting zipp>=3.1.0 (from importlib-resources>=3.2.0->matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading zipp-3.20.1-py3-none-any.whl.metadata (3.7 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: six>=1.5 in /usr/local/lib/python3.8/site-packages (from python-dateutil>=2.7->matplotlib) (1.15.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading matplotlib-3.7.5-cp38-cp38-manylinux_2_12_x86_64.manylinux2010_x86_64.whl (9.2 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/9.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸ 9.2/9.2 MB 61.0 MB/s eta 0:00:01  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 9.2/9.2 MB 48.6 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading contourpy-1.1.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (301 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading cycler-0.12.1-py3-none-any.whl (8.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading fonttools-4.53.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.7 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/4.7 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 4.7/4.7 MB 77.3 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading importlib_resources-6.4.4-py3-none-any.whl (35 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading kiwisolver-1.4.7-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.whl (1.2 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/1.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1.2/1.2 MB 72.8 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading numpy-1.24.4-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (17.3 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/17.3 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺ 17.0/17.3 MB 84.4 MB/s eta 0:00:01  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 17.3/17.3 MB 67.3 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading packaging-24.1-py3-none-any.whl (53 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pillow-10.4.0-cp38-cp38-manylinux_2_28_x86_64.whl (4.5 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/4.5 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 4.5/4.5 MB 79.5 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading pyparsing-3.1.4-py3-none-any.whl (104 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading python_dateutil-2.9.0.post0-py2.py3-none-any.whl (229 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading zipp-3.20.1-py3-none-any.whl (9.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Installing collected packages: zipp, python-dateutil, pyparsing, pillow, packaging, numpy, kiwisolver, fonttools, cycler, importlib-resources, contourpy, matplotlib Step #6 - "compile-libfuzzer-introspector-x86_64": Successfully installed contourpy-1.1.1 cycler-0.12.1 fonttools-4.53.1 importlib-resources-6.4.4 kiwisolver-1.4.7 matplotlib-3.7.5 numpy-1.24.4 packaging-24.1 pillow-10.4.0 pyparsing-3.1.4 python-dateutil-2.9.0.post0 zipp-3.20.1 Step #6 - "compile-libfuzzer-introspector-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data' and '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data' and '/src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.yaml' and '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.yaml' and '/src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_info' and '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_info' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_globals' and '/src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_globals' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_info' and '/src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_info' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_functions' and '/src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_functions' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_types' and '/src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_types' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_info' and '/src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_info' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-12-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-12-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-4-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-4-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-28-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-28-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-11-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-11-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-18-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-18-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-8-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-8-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-20-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-20-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-5-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-5-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-29-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-29-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-14-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-14-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-19-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-19-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-16-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-16-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-10-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-10-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-13-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-13-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-33-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-33-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-15-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-15-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-2-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-2-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-3-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-3-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-23-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-23-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": cp: '/src/inspector/allFunctionsWithMain-26-fa37JncCHr.yaml' and '/src/inspector/allFunctionsWithMain-26-fa37JncCHr.yaml' are the same file Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:14.729 INFO main - main: Running fuzz introspector post-processing Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:14.729 INFO utils - scan_executables_for_fuzz_introspector_logs: File: /workspace/out/libfuzzer-introspector-x86_64/llvm-symbolizer is executable Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:14.729 INFO utils - scan_executables_for_fuzz_introspector_logs: File: /workspace/out/libfuzzer-introspector-x86_64/fuzzer-usb-descriptor is executable Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:14.729 INFO utils - scan_executables_for_fuzz_introspector_logs: File: /workspace/out/libfuzzer-introspector-x86_64/fuzzer-uevent is executable Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:14.729 INFO utils - scan_executables_for_fuzz_introspector_logs: File: /workspace/out/libfuzzer-introspector-x86_64/fuzzer-rules is executable Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:14.985 INFO utils - scan_executables_for_fuzz_introspector_logs: Found match fuzzerLogFile-0-80V8lUK4gZ Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.057 INFO utils - scan_executables_for_fuzz_introspector_logs: Found match fuzzerLogFile-0-FO1UWGD7Yg Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.221 INFO utils - scan_executables_for_fuzz_introspector_logs: Found match fuzzerLogFile-0-WKvel5KDDJ Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.222 INFO commands - correlate_binaries_to_logs: Pairings: [{'executable_path': '/workspace/out/libfuzzer-introspector-x86_64/fuzzer-usb-descriptor', 'fuzzer_log_file': 'fuzzerLogFile-0-80V8lUK4gZ'}, {'executable_path': '/workspace/out/libfuzzer-introspector-x86_64/fuzzer-uevent', 'fuzzer_log_file': 'fuzzerLogFile-0-FO1UWGD7Yg'}, {'executable_path': '/workspace/out/libfuzzer-introspector-x86_64/fuzzer-rules', 'fuzzer_log_file': 'fuzzerLogFile-0-WKvel5KDDJ'}] Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.223 INFO main - main: Ending fuzz introspector post-processing Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.454 INFO main - main: Running fuzz introspector post-processing Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.454 INFO data_loader - load_all_profiles: - found 3 profiles to load Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.478 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.479 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.479 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.480 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.481 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.482 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.623 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.623 INFO data_loader - read_fuzzer_data_file_to_profile: Finished loading /src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:15.651 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:16.286 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:16.286 INFO data_loader - read_fuzzer_data_file_to_profile: Finished loading /src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:16.401 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:22.871 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:22.871 INFO data_loader - read_fuzzer_data_file_to_profile: Finished loading /src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:23.821 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.078 INFO analysis - load_data_files: Found 3 profiles Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.078 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.079 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.079 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-0-80V8lUK4gZ.data with fuzzerLogFile-0-80V8lUK4gZ.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.079 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-0-FO1UWGD7Yg.data with fuzzerLogFile-0-FO1UWGD7Yg.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.079 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-0-WKvel5KDDJ.data with fuzzerLogFile-0-WKvel5KDDJ.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.079 INFO analysis - load_data_files: [+] Accummulating profiles Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.079 INFO analysis - load_data_files: Accummulating using multiprocessing Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.096 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.099 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.100 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.100 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.100 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.100 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.100 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.101 INFO code_coverage - load_llvm_coverage: Found 3 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.101 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzzer-usb-descriptor.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.101 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzzer-usb-descriptor.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.102 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.106 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.107 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.107 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.107 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.107 INFO fuzzer_profile - accummulate_profile: fuzzer-usb-descriptor: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.141 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.141 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.155 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.155 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.155 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.156 INFO code_coverage - load_llvm_coverage: Found 3 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.156 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzzer-uevent.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.157 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzzer-uevent.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.225 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.225 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.226 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.227 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.241 INFO fuzzer_profile - accummulate_profile: fuzzer-uevent: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.777 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.777 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.873 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.873 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.874 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.874 INFO code_coverage - load_llvm_coverage: Found 3 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.875 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzzer-rules.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:25.875 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzzer-rules.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:26.810 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:26.810 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:26.811 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:26.811 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:26.867 INFO fuzzer_profile - accummulate_profile: fuzzer-rules: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:28.898 INFO analysis - load_data_files: [+] Creating project profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:28.899 INFO project_profile - __init__: Creating merged profile of 3 profiles Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:28.899 INFO project_profile - __init__: Populating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:28.899 INFO project_profile - __init__: Populating functions unreached Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:28.903 INFO project_profile - __init__: Creating all_functions dictionary Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.189 INFO project_profile - __init__: Gathering complexity and incoming references of each function Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:48:37, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:49:38, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:50:39, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:51:40, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:53:41, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:54:43, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:55:45, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.919 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:56:46, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.920 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:58:38, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.920 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:59:39, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.920 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:61:41, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.920 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:63:42, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:29.920 INFO project_profile - __init__: Line numbers are different in the same function: LLVMFuzzerTestOneInput:64:43, ignoring Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.175 INFO project_profile - __init__: Completed creationg of merged profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.175 INFO analysis - load_data_files: [+] Refining profiles Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.234 INFO utils - get_target_coverage_url: Extracting coverage for https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports/20240907/linux -- fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.234 INFO analysis - overlay_calltree_with_coverage: Using coverage url: https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports-by-target/20240907/fuzzer-usb-descriptor/linux Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.235 INFO analysis - overlay_calltree_with_coverage: Overlaying 1 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.238 INFO analysis - overlay_calltree_with_coverage: Overlaying 2 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.238 INFO analysis - overlay_calltree_with_coverage: Overlaying 3 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.238 INFO analysis - overlay_calltree_with_coverage: Updating branch complexities Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.491 INFO analysis - overlay_calltree_with_coverage: [+] found 2 branch blockers. Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.492 INFO utils - get_target_coverage_url: Extracting coverage for https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports/20240907/linux -- fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.492 INFO analysis - overlay_calltree_with_coverage: Using coverage url: https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports-by-target/20240907/fuzzer-uevent/linux Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.492 INFO analysis - overlay_calltree_with_coverage: Overlaying 1 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.495 INFO analysis - overlay_calltree_with_coverage: Overlaying 2 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.495 INFO analysis - overlay_calltree_with_coverage: Overlaying 3 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.495 INFO analysis - overlay_calltree_with_coverage: Updating branch complexities Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.709 INFO analysis - overlay_calltree_with_coverage: [+] found 12 branch blockers. Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.711 INFO utils - get_target_coverage_url: Extracting coverage for https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports/20240907/linux -- fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.711 INFO analysis - overlay_calltree_with_coverage: Using coverage url: https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports-by-target/20240907/fuzzer-rules/linux Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.711 INFO analysis - overlay_calltree_with_coverage: Overlaying 1 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.716 INFO analysis - overlay_calltree_with_coverage: Overlaying 2 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.716 INFO analysis - overlay_calltree_with_coverage: Overlaying 3 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.716 INFO analysis - overlay_calltree_with_coverage: Updating branch complexities Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.895 INFO analysis - overlay_calltree_with_coverage: [+] found 61 branch blockers. Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_info Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_info Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_info Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_types Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_types Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_types Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_functions Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_functions Step #6 - "compile-libfuzzer-introspector-x86_64": debug info file: /src/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_functions Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.922 INFO commands - run_analysis_on_dir: Analyses to run: ['OptimalTargets', 'RuntimeCoverageAnalysis', 'FuzzEngineInputAnalysis', 'FilePathAnalyser', 'MetadataAnalysis', 'AnnotatedCFG'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.922 INFO commands - run_analysis_on_dir: [+] Creating HTML report Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.923 INFO html_report - create_html_report: - Creating HTML report Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:30.923 INFO html_report - create_section_project_overview: - Creating reachability overview table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.274 INFO html_report - create_section_fuzzers_overview: - Creating table with overview of all fuzzers Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.274 INFO html_report - create_section_all_functions: - Creating table with information about all functions in target Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.691 INFO html_report - create_all_function_table: Assembled a total of 8620 entries Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.692 INFO html_report - create_section_fuzzer_detailed_section: - Creating section with details about each fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 INFO calltree_analysis - __init__: Creating FuzzCalltreeAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 INFO calltree_analysis - create_calltree: In calltree Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 INFO calltree_analysis - create_calltree: At end Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 INFO calltree_analysis - create_calltree: calltree_html_section_string: : 18 -- : 18 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 INFO calltree_analysis - create_calltree: Calltree created Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 INFO calltree_analysis - create_branch_blocker_table: Creating branch blocker table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:31.719 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.324 INFO font_manager - _load_fontmanager: generated new fontManager Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.613 INFO html_helpers - create_horisontal_calltree_image: Creating image fuzzer-usb-descriptor_colormap.png Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.614 INFO html_helpers - create_horisontal_calltree_image: - extracted the callsites (13 nodes) Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.672 INFO html_helpers - create_horisontal_calltree_image: - iterated over color list Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.672 INFO html_helpers - create_horisontal_calltree_image: - saving image Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.845 INFO html_helpers - create_horisontal_calltree_image: - image saved Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.845 INFO calltree_analysis - create_branch_blocker_table: Creating branch blocker table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.845 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.845 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.847 INFO calltree_analysis - __init__: Creating FuzzCalltreeAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.847 INFO calltree_analysis - create_calltree: In calltree Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.848 INFO calltree_analysis - create_calltree: At end Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.848 INFO calltree_analysis - create_calltree: calltree_html_section_string: : 80 -- : 80 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.848 INFO calltree_analysis - create_calltree: Calltree created Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 INFO calltree_analysis - create_branch_blocker_table: Creating branch blocker table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.849 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.850 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.922 INFO html_helpers - create_horisontal_calltree_image: Creating image fuzzer-uevent_colormap.png Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.922 INFO html_helpers - create_horisontal_calltree_image: - extracted the callsites (54 nodes) Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.976 INFO html_helpers - create_horisontal_calltree_image: - iterated over color list Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:32.976 INFO html_helpers - create_horisontal_calltree_image: - saving image Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 INFO html_helpers - create_horisontal_calltree_image: - image saved Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 INFO calltree_analysis - create_branch_blocker_table: Creating branch blocker table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.066 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.067 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.067 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.067 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.067 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.067 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.087 INFO calltree_analysis - __init__: Creating FuzzCalltreeAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.087 INFO calltree_analysis - create_calltree: In calltree Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.088 INFO calltree_analysis - create_calltree: At end Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 INFO calltree_analysis - create_calltree: calltree_html_section_string: : 111 -- : 111 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 INFO calltree_analysis - create_calltree: Calltree created Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 INFO calltree_analysis - create_branch_blocker_table: Creating branch blocker table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.089 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.090 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.344 INFO html_helpers - create_horisontal_calltree_image: Creating image fuzzer-rules_colormap.png Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.344 INFO html_helpers - create_horisontal_calltree_image: - extracted the callsites (81 nodes) Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.408 INFO html_helpers - create_horisontal_calltree_image: - iterated over color list Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.408 INFO html_helpers - create_horisontal_calltree_image: - saving image Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.515 INFO html_helpers - create_horisontal_calltree_image: - image saved Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.515 INFO calltree_analysis - create_branch_blocker_table: Creating branch blocker table Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.516 ERROR calltree_analysis - create_branch_blocker_table: The calltree index is not valid! Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.545 INFO html_report - create_section_optional_analyses: - Handling optional analyses Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.545 INFO optimal_targets - analysis_func: - Running analysis OptimalTargets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:33.545 INFO optimal_targets - iteratively_get_optimal_targets: - in iteratively_get_optimal_targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:36.267 INFO optimal_targets - analysis_get_optimal_targets: - in analysis_get_optimal_targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:36.284 INFO optimal_targets - iteratively_get_optimal_targets: Getting 3 optimal targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:36.284 INFO optimal_targets - iteratively_get_optimal_targets: - sorting by unreached complexity. Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:36.287 INFO optimal_targets - add_func_to_reached_and_clone: Creating a deepcopy Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:38.833 INFO optimal_targets - add_func_to_reached_and_clone: Updating hitcount Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:38.837 INFO optimal_targets - add_func_to_reached_and_clone: Updating hitcount-related data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:39.495 INFO optimal_targets - analysis_get_optimal_targets: - in analysis_get_optimal_targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:39.513 INFO optimal_targets - iteratively_get_optimal_targets: - sorting by unreached complexity. Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:39.515 INFO optimal_targets - add_func_to_reached_and_clone: Creating a deepcopy Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:42.347 INFO optimal_targets - add_func_to_reached_and_clone: Updating hitcount Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:42.351 INFO optimal_targets - add_func_to_reached_and_clone: Updating hitcount-related data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:43.001 INFO optimal_targets - analysis_get_optimal_targets: - in analysis_get_optimal_targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:43.030 INFO optimal_targets - iteratively_get_optimal_targets: - sorting by unreached complexity. Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:43.033 INFO optimal_targets - add_func_to_reached_and_clone: Creating a deepcopy Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:45.604 INFO optimal_targets - add_func_to_reached_and_clone: Updating hitcount Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:45.606 INFO optimal_targets - add_func_to_reached_and_clone: Updating hitcount-related data Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:46.269 INFO optimal_targets - iteratively_get_optimal_targets: Found the following optimal functions: { ['bool tao::pegtl::normal, void> >::match<(tao::pegtl::apply_mode)1, (tao::pegtl::rewind_mode)0, usbguard::RuleParser::label_actions, tao::pegtl::state_control::type, tao::pegtl::string_input<(tao::pegtl::tracking_mode)0, tao::pegtl::ascii::eol::lf_crlf, std::__1::basic_string, std::__1::allocator > >, usbguard::Rule&, tao::pegtl::tracer >&>(tao::pegtl::string_input<(tao::pegtl::tracking_mode)0, tao::pegtl::ascii::eol::lf_crlf, std::__1::basic_string, std::__1::allocator > >&, usbguard::Rule&, tao::pegtl::tracer >&)', 'bool tao::pegtl::normal >::match<(tao::pegtl::apply_mode)1, (tao::pegtl::rewind_mode)0, usbguard::RuleParser::condition_actions, tao::pegtl::state_control::type, tao::pegtl::string_input<(tao::pegtl::tracking_mode)0, tao::pegtl::ascii::eol::lf_crlf, std::__1::basic_string, std::__1::allocator > >, usbguard::Rule&, tao::pegtl::tracer >&>(tao::pegtl::string_input<(tao::pegtl::tracking_mode)0, tao::pegtl::ascii::eol::lf_crlf, std::__1::basic_string, std::__1::allocator > >&, usbguard::Rule&, tao::pegtl::tracer >&)', 'usbguard::RulePrivate::appliesToWithConditions(usbguard::Rule const&, bool)'] } Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:46.809 INFO html_report - create_all_function_table: Assembled a total of 8620 entries Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.166 INFO optimal_targets - analysis_func: - Completed analysis OptimalTargets Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.205 INFO engine_input - analysis_func: - Running analysis FuzzEngineInputAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.205 INFO engine_input - analysis_func: Generating input for fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.206 INFO calltree_analysis - __init__: Creating FuzzCalltreeAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.206 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: LLVMFuzzerTestOneInput Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.206 INFO engine_input - analysis_func: Generating input for fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.207 INFO calltree_analysis - __init__: Creating FuzzCalltreeAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.208 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN3tao5pegtl12string_inputILNS0_13tracking_modeE0ENS0_5ascii3eol7lf_crlfENSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEEED2Ev Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.208 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN3tao5pegtl12memory_inputILNS0_13tracking_modeE0ENS0_5ascii3eol7lf_crlfENSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEEE4markILNS0_11rewind_modeE2EEENS0_8internal6markerINSG_8iteratorEXT_EEEv Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.208 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard6UEvent10fromStringERKNSt3__112basic_stringIcNS1_11char_traitsIcEENS1_9allocatorIcEEEEbb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.208 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN3tao5pegtl12string_inputILNS0_13tracking_modeE0ENS0_5ascii3eol7lf_crlfENSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEEED2Ev Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.208 INFO engine_input - analysis_func: Generating input for fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.209 INFO calltree_analysis - __init__: Creating FuzzCalltreeAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard11make_uniqueINS_11RulePrivateEJEEENSt3__110unique_ptrIT_NS2_14default_deleteIS4_EEEEDpOT0_ Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZNK3tao5pegtl12memory_inputILNS0_13tracking_modeE0ENS0_5ascii3eol7lf_crlfENSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEEE8positionEv Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard19parseRuleFromStringERKNSt3__112basic_stringIcNS0_11char_traitsIcEENS0_9allocatorIcEEEES8_mb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN3tao5pegtl12string_inputILNS0_13tracking_modeE0ENS0_5ascii3eol7lf_crlfENSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEEED2Ev Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard19parseRuleFromStringERKNSt3__112basic_stringIcNS0_11char_traitsIcEENS0_9allocatorIcEEEES8_mb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard19parseRuleFromStringERKNSt3__112basic_stringIcNS0_11char_traitsIcEENS0_9allocatorIcEEEES8_mb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN3tao5pegtl12string_inputILNS0_13tracking_modeE0ENS0_5ascii3eol7lf_crlfENSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEEED2Ev Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard19parseRuleFromStringERKNSt3__112basic_stringIcNS0_11char_traitsIcEENS0_9allocatorIcEEEES8_mb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard19parseRuleFromStringERKNSt3__112basic_stringIcNS0_11char_traitsIcEENS0_9allocatorIcEEEES8_mb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - get_fuzzer_focus_function_section: Found focus function: _ZN8usbguard19parseRuleFromStringERKNSt3__112basic_stringIcNS0_11char_traitsIcEENS0_9allocatorIcEEEES8_mb Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.210 INFO engine_input - analysis_func: - Completed analysis FuzzEngineInputAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.211 INFO runtime_coverage_analysis - analysis_func: - Running analysis RuntimeCoverageAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.211 INFO runtime_coverage_analysis - get_low_cov_high_line_funcs: Extracting low cov high line funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.226 INFO runtime_coverage_analysis - analysis_func: - Completed analysis RuntimeCoverageAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.227 INFO filepath_analyser - analysis_func: - Running analysis FilePathAnalyser Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.966 INFO metadata - analysis_func: - Running analysis MetadataAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.966 INFO metadata - analysis_func: - Completed analysis MetadataAnalysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.966 INFO annotated_cfg - __init__: Creating annotated CFG Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.966 INFO annotated_cfg - analysis_func: Creating annotated CFGs Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.966 INFO annotated_cfg - analysis_func: Analysing: fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.967 INFO annotated_cfg - analysis_func: Analysing: fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.969 INFO annotated_cfg - analysis_func: Analysing: fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.973 INFO utils - get_target_coverage_url: Extracting coverage for https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports/20240907/linux -- fuzzer-usb-descriptor Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.973 INFO utils - get_target_coverage_url: Extracting coverage for https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports/20240907/linux -- fuzzer-uevent Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.973 INFO utils - get_target_coverage_url: Extracting coverage for https://storage.googleapis.com/oss-fuzz-coverage/usbguard/reports/20240907/linux -- fuzzer-rules Step #6 - "compile-libfuzzer-introspector-x86_64": Loading report: Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:47.987 INFO debug_info - extract_all_functions_in_debug_info: Extracting functions Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:48.171 INFO debug_info - extract_all_functions_in_debug_info: Extracting functions Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:48.639 INFO debug_info - extract_all_functions_in_debug_info: Extracting functions Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:48.781 INFO debug_info - load_debug_all_yaml_files: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:11:57.770 INFO debug_info - load_debug_all_yaml_files: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": Correlating Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:03.917 INFO debug_info - correlate_debugged_function_to_debug_types: Creating dictionary Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:03.917 INFO debug_info - create_friendly_debug_types: Have to create for 28052 addresses Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:03.961 INFO debug_info - create_friendly_debug_types: Idx: 2500 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:03.980 INFO debug_info - create_friendly_debug_types: Idx: 5000 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.001 INFO debug_info - create_friendly_debug_types: Idx: 7500 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.021 INFO debug_info - create_friendly_debug_types: Idx: 10000 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.043 INFO debug_info - create_friendly_debug_types: Idx: 12500 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.065 INFO debug_info - create_friendly_debug_types: Idx: 15000 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.086 INFO debug_info - create_friendly_debug_types: Idx: 17500 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.107 INFO debug_info - create_friendly_debug_types: Idx: 20000 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.338 INFO debug_info - create_friendly_debug_types: Idx: 22500 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.359 INFO debug_info - create_friendly_debug_types: Idx: 25000 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:04.379 INFO debug_info - create_friendly_debug_types: Idx: 27500 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:05.633 INFO debug_info - correlate_debugged_function_to_debug_types: Finished creating dictionary Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/allocator_traits.h ------- 7 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/allocator.h ------- 11 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/compressed_pair.h ------- 20 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/string ------- 212 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__iterator/wrap_iter.h ------- 20 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/initializer_list ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/string_view ------- 57 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__type_traits/integral_constant.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__tree ------- 125 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__utility/pair.h ------- 13 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/map ------- 100 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/pointer_traits.h ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__functional/operations.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/unique_ptr.h ------- 32 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/limits ------- 18 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/string.h ------- 22 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/stdlib.h ------- 37 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/stdlib.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/stdio.h ------- 45 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/ctype.h ------- 14 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/x86_64-linux-gnu/bits/wctype-wchar.h ------- 16 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/wctype.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/wchar.h ------- 59 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__math/traits.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__math/modulo.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/x86_64-linux-gnu/bits/mathcalls.h ------- 57 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/time.h ------- 10 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/locale.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__utility/piecewise_construct.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/ostream ------- 40 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__string/char_traits.h ------- 18 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__iterator/ostreambuf_iterator.h ------- 7 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/tuple ------- 28 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/UEvent.hpp ------- 12 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/fstream ------- 70 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__ios/fpos.h ------- 8 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/marker.hpp ------- 15 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/iterator.hpp ------- 8 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/shared_ptr.h ------- 36 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/position.hpp ------- 11 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/vector ------- 123 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__split_buffer ------- 51 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/parse_error.hpp ------- 16 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/sstream ------- 39 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/copy_n.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__iterator/reverse_iterator.h ------- 15 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/uninitialized_algorithms.h ------- 8 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__utility/exception_guard.h ------- 9 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/iomanip ------- 7 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/string_input.hpp ------- 12 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/memory_input.hpp ------- 40 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/action_input.hpp ------- 17 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/allocation_guard.h ------- 9 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/contrib/trace.hpp ------- 18 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__mutex/mutex.h ------- 8 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/Logger.hpp ------- 26 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__mutex/unique_lock.h ------- 18 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__mutex/tag_types.h ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/sort.h ------- 23 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__functional/function.h ------- 29 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/sift_down.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/new ------- 9 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/stdexcept ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/allocate_at_least.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__iterator/distance.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Tests/Fuzzers/fuzzer-uevent.cpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/min.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/comp.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/ios ------- 23 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/locale ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/streambuf ------- 14 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__locale ------- 12 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__string/constexpr_c_functions.h ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/UEvent.cpp ------- 11 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/demangle.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/contrib/state_control.hpp ------- 7 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/normal.hpp ------- 7 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/contrib/shuffle_states.hpp ------- 14 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__utility/integer_sequence.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/seq.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/match.hpp ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/star.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/one.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/input_pair.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/peek_char.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/bump_help.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/bump.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__utility/swap.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/move.h ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/copy_move_common.h ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/unwrap_range.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/unwrap_iter.h ------- 6 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/iterator_operations.h ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/max.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/UEventParser.cpp ------- 6 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/fill_n.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__utility/convert_to_integral.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/copy.h ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__fwd/sstream.h ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/ranges.hpp ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/range.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/eof.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/until.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/parse.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/typeinfo ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/istream ------- 44 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__fwd/fstream.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/Logger.cpp ------- 39 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/Exception.hpp ------- 17 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__exception/exception.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/iter_swap.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__memory/swap_allocator.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__bit/countl.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__bit/countr.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__bit/blsr.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/push_heap.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/pop_heap.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/sort_heap.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__debug_utils/strict_weak_ordering_check.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/make_heap.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/partial_sort.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__debug_utils/randomize_range.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__algorithm/find_first_of.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Common/Utility.cpp ------- 21 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Common/Utility.hpp ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__hash_table ------- 117 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/unordered_map ------- 102 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__functional/hash.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/USB.hpp ------- 34 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Tests/Fuzzers/fuzzer-usb-descriptor.cpp ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__math/rounding_functions.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/include/x86_64-linux-gnu/bits/uintn-identity.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/USB.cpp ------- 37 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Common/ByteOrder.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__chrono/steady_clock.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__chrono/duration.h ------- 27 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__chrono/time_point.h ------- 8 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RulePrivate.hpp ------- 62 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/Rule.hpp ------- 93 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/RuleCondition.hpp ------- 27 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__iterator/advance.h ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__random/bernoulli_distribution.h ------- 13 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__random/random_device.h ------- 9 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__random/mersenne_twister_engine.h ------- 11 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__random/uniform_real_distribution.h ------- 15 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Tests/Fuzzers/fuzzer-rules.cpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/RuleParser.hpp ------- 13 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/Rule.cpp ------- 62 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/opt.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RuleParser/Actions.hpp ------- 33 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/if_must.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/must.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/any.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/not_at.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/sor.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/action.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/rep_opt.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/rep.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/string.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/plus.hpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/RuleParser.cpp ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/Predicates.hpp ------- 2 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__iterator/next.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RulePrivate.cpp ------- 57 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/Utility.cpp ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/public/usbguard/RuleCondition.cpp ------- 24 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/AllowedMatchesCondition.hpp ------- 6 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/AllowedMatchesCondition.cpp ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/FixedStateCondition.hpp ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/FixedStateCondition.cpp ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/LocaltimeCondition.hpp ------- 7 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/LocaltimeCondition.cpp ------- 6 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__chrono/system_clock.h ------- 3 Step #6 - "compile-libfuzzer-introspector-x86_64": /usr/local/include/c++/v1/__random/generate_canonical.h ------- 1 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RandomStateCondition.hpp ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RandomStateCondition.cpp ------- 4 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RuleAppliedCondition.hpp ------- 6 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RuleAppliedCondition.cpp ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RuleEvaluatedCondition.hpp ------- 6 Step #6 - "compile-libfuzzer-introspector-x86_64": /src/usbguard/src/Library/RuleEvaluatedCondition.cpp ------- 5 Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.363 INFO analysis - extract_test_information: All test files Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.364 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_Base64.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.364 INFO analysis - extract_test_information: /src/libqb/tests/crash_test_dummy.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.365 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringChrono.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.365 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_spec_parser.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.366 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_UEventParser.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.366 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/GeneratorsImpl.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.366 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_registry.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.366 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/RandomNumberGeneration.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.366 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Compilation.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.367 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/TimingTests/Sleep.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.367 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_spec.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.367 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/EnumToString.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.367 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringWhich.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.367 INFO analysis - extract_test_information: /workspace/oss-fuzz/projects/example/my-api-repo/do_stuff_unittest.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.368 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/PEGTL/src/test/pegtl/test_result.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.368 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Matchers.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.369 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_Rule.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.369 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_case_info.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.369 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringVector.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.369 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/SurrogateCpps/catch_test_spec.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.369 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Regression/test_Rule_ghi113.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.370 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Exception.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.370 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_case_registry_impl.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.370 INFO analysis - extract_test_information: /workspace/oss-fuzz/projects/upx/fuzzers/test_packed_file_fuzzer.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.370 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/String.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.371 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/PartTracker.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.371 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/InternalBenchmark.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.371 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringOptional.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.371 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Regression/test_Rule_ghi37.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.371 INFO analysis - extract_test_information: /workspace/oss-fuzz/projects/tinyxml2/xmltest2.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.372 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringVariant.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.372 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Misc.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.372 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/.conan/test_package/test_package.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.372 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Tricky.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.373 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/StringManip.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.373 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/VariadicMacros.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.373 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_IPCServer_AccessControl.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.373 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_RuleParser.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.373 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Generators.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.374 INFO analysis - extract_test_information: /src/usbguard/src/test_filesystem.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.374 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/PEGTL/src/test/pegtl/test_setup.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.374 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Regression/test_Rule_ghi247.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.374 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_interfaces_testcase.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.374 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_RuleAttribute_id.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.375 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringByte.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.375 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/PEGTL/src/test/pegtl/test_empty.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.375 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/Tag.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.375 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/Details.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.375 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/Xml.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.376 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringGeneral.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.376 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringTuple.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.376 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Message.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.376 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Class.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.376 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/CompileTimePerfTests/All.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.377 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/BDD.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.377 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_UMockdevDeviceDefinition.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.377 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_UEvent.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.377 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/CompileTimePerfTests/10.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.377 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringPair.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.378 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Decomposition.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.378 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/ToString.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.378 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/SurrogateCpps/catch_test_case_tracker.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.378 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Approx.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.378 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/CompileTimePerfTests/100.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.379 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Condition.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.379 INFO analysis - extract_test_information: /src/usbguard/src/Tests/Unit/test_Utility.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.379 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Benchmark.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.379 INFO analysis - extract_test_information: /workspace/oss-fuzz/projects/tinyxml2/xmltest.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.379 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/CmdLine.tests.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:44.380 INFO analysis - extract_test_information: /src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_case_tracker.cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:46.524 INFO debug_info - dump_debug_report: No such file: - Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:46.528 INFO debug_info - dump_debug_report: No such file: Type Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:46.677 INFO main - main: Ending fuzz introspector report generation Step #6 - "compile-libfuzzer-introspector-x86_64": 2024-09-07 10:12:46.679 INFO main - main: Ending fuzz introspector post-processing Finished Step #6 - "compile-libfuzzer-introspector-x86_64" Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: CommandException: 1 files/objects could not be removed. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/all_debug_info.json [Content-Type=application/json]... Step #8: / [0/393 files][ 0.0 B/221.4 MiB] 0% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_info [Content-Type=application/octet-stream]... Step #8: / [0/393 files][ 0.0 B/221.4 MiB] 0% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-80V8lUK4gZ.data [Content-Type=application/octet-stream]... Step #8: / [0/393 files][ 0.0 B/221.4 MiB] 0% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-12-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [0/393 files][ 0.0 B/221.4 MiB] 0% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/all-friendly-debug-types.json [Content-Type=application/json]... Step #8: / [0/393 files][ 0.0 B/221.4 MiB] 0% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/calltree_view_0.html [Content-Type=text/html]... Step #8: / [0/393 files][ 2.2 MiB/221.4 MiB] 0% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/calltree_view_1.html [Content-Type=text/html]... Step #8: / [1/393 files][ 2.7 MiB/221.4 MiB] 1% Done / [1/393 files][ 2.9 MiB/221.4 MiB] 1% Done / [2/393 files][ 3.4 MiB/221.4 MiB] 1% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-4-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [2/393 files][ 4.4 MiB/221.4 MiB] 1% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/calltree.js [Content-Type=application/javascript]... Step #8: / [2/393 files][ 4.4 MiB/221.4 MiB] 1% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_globals [Content-Type=application/octet-stream]... Step #8: / [2/393 files][ 4.4 MiB/221.4 MiB] 1% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-28-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [2/393 files][ 7.2 MiB/221.4 MiB] 3% Done / [3/393 files][ 8.5 MiB/221.4 MiB] 3% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer-uevent.covreport [Content-Type=application/octet-stream]... Step #8: / [3/393 files][ 8.8 MiB/221.4 MiB] 3% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-11-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [3/393 files][ 9.6 MiB/221.4 MiB] 4% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/exe_to_fuzz_introspector_logs.yaml [Content-Type=application/octet-stream]... Step #8: / [3/393 files][ 10.1 MiB/221.4 MiB] 4% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer-usb-descriptor.covreport [Content-Type=application/octet-stream]... Step #8: / [3/393 files][ 10.3 MiB/221.4 MiB] 4% Done / [4/393 files][ 10.9 MiB/221.4 MiB] 4% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-18-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 15.8 MiB/221.4 MiB] 7% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer-usb-descriptor_colormap.png [Content-Type=image/png]... Step #8: / [4/393 files][ 16.9 MiB/221.4 MiB] 7% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/styles.css [Content-Type=text/css]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_info [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 18.7 MiB/221.4 MiB] 8% Done / [4/393 files][ 18.7 MiB/221.4 MiB] 8% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzz_report.html [Content-Type=text/html]... Step #8: / [4/393 files][ 19.8 MiB/221.4 MiB] 8% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-8-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 20.1 MiB/221.4 MiB] 9% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 20.9 MiB/221.4 MiB] 9% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_functions [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 21.1 MiB/221.4 MiB] 9% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzz-introspector-engine-input.json [Content-Type=application/json]... Step #8: / [4/393 files][ 21.4 MiB/221.4 MiB] 9% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-20-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 21.9 MiB/221.4 MiB] 9% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-5-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/custom.js [Content-Type=application/javascript]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-29-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [4/393 files][ 22.3 MiB/221.4 MiB] 10% Done / [4/393 files][ 22.3 MiB/221.4 MiB] 10% Done / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-19-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-14-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/all_functions.js [Content-Type=application/javascript]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-16-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-10-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/all-files.json [Content-Type=application/json]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-13-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_types [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.6 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-33-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [5/393 files][ 22.6 MiB/221.4 MiB] 10% Done / [6/393 files][ 22.6 MiB/221.4 MiB] 10% Done / [7/393 files][ 22.6 MiB/221.4 MiB] 10% Done / [8/393 files][ 22.6 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-15-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [8/393 files][ 22.6 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_info [Content-Type=application/octet-stream]... Step #8: / [8/393 files][ 22.6 MiB/221.4 MiB] 10% Done / [9/393 files][ 22.6 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-2-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.yaml [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-3-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [9/393 files][ 22.6 MiB/221.4 MiB] 10% Done / [9/393 files][ 22.6 MiB/221.4 MiB] 10% Done / [9/393 files][ 22.6 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer-rules_colormap.png [Content-Type=image/png]... Step #8: / [9/393 files][ 22.6 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-23-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: / [9/393 files][ 22.6 MiB/221.4 MiB] 10% Done - - [10/393 files][ 22.9 MiB/221.4 MiB] 10% Done - [11/393 files][ 23.1 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-26-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [12/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [12/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [13/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-22-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [13/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-17-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [13/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-32-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [13/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-24-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [13/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-7-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [13/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [14/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_types [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/summary.json [Content-Type=application/json]... Step #8: - [14/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [14/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.yaml [Content-Type=application/octet-stream]... Step #8: - [15/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [15/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-0-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/all-fuzz-introspector-functions.json [Content-Type=application/json]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-6-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-27-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_functions [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/calltree_view_2.html [Content-Type=text/html]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_functions [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-80V8lUK4gZ.data.debug_all_globals [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-30-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-21-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-WKvel5KDDJ.data [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/prism.js [Content-Type=application/javascript]... Step #8: - [16/393 files][ 23.3 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/test-files.json [Content-Type=application/json]... Step #8: - [16/393 files][ 23.5 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-1-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [16/393 files][ 23.5 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/analysis_1.js [Content-Type=application/javascript]... Step #8: - [16/393 files][ 24.0 MiB/221.4 MiB] 10% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-FO1UWGD7Yg.data.debug_all_globals [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/clike.js [Content-Type=application/javascript]... Step #8: - [16/393 files][ 24.8 MiB/221.4 MiB] 11% Done - [16/393 files][ 24.8 MiB/221.4 MiB] 11% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-9-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/branch-blockers.json [Content-Type=application/json]... Step #8: - [16/393 files][ 25.3 MiB/221.4 MiB] 11% Done - [16/393 files][ 25.3 MiB/221.4 MiB] 11% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/prism.css [Content-Type=text/css]... Step #8: - [16/393 files][ 25.8 MiB/221.4 MiB] 11% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer_table_data.js [Content-Type=application/javascript]... Step #8: - [17/393 files][ 25.8 MiB/221.4 MiB] 11% Done - [17/393 files][ 25.8 MiB/221.4 MiB] 11% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer-rules.covreport [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-25-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: - [17/393 files][ 26.1 MiB/221.4 MiB] 11% Done - [17/393 files][ 26.1 MiB/221.4 MiB] 11% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/allFunctionsWithMain-31-fa37JncCHr.yaml [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzerLogFile-0-WKvel5KDDJ.data.debug_all_types [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/fuzzer-uevent_colormap.png [Content-Type=image/png]... Step #8: - [17/393 files][ 26.4 MiB/221.4 MiB] 11% Done - [17/393 files][ 26.4 MiB/221.4 MiB] 11% Done - [18/393 files][ 26.4 MiB/221.4 MiB] 11% Done - [18/393 files][ 26.4 MiB/221.4 MiB] 11% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/test_filesystem.cpp [Content-Type=text/x-c++src]... Step #8: - [18/393 files][ 27.4 MiB/221.4 MiB] 12% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/AllowedMatchesCondition.cpp [Content-Type=text/x-c++src]... Step #8: - [18/393 files][ 27.9 MiB/221.4 MiB] 12% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/LocaltimeCondition.cpp [Content-Type=text/x-c++src]... Step #8: - [18/393 files][ 27.9 MiB/221.4 MiB] 12% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RandomStateCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: - [18/393 files][ 28.2 MiB/221.4 MiB] 12% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RuleEvaluatedCondition.cpp [Content-Type=text/x-c++src]... Step #8: - [19/393 files][ 28.4 MiB/221.4 MiB] 12% Done - [20/393 files][ 28.4 MiB/221.4 MiB] 12% Done - [20/393 files][ 28.4 MiB/221.4 MiB] 12% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RulePrivate.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/LocaltimeCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: - [20/393 files][ 28.7 MiB/221.4 MiB] 12% Done - [20/393 files][ 28.7 MiB/221.4 MiB] 12% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RandomStateCondition.cpp [Content-Type=text/x-c++src]... Step #8: - [20/393 files][ 30.0 MiB/221.4 MiB] 13% Done - [21/393 files][ 30.2 MiB/221.4 MiB] 13% Done - [22/393 files][ 30.2 MiB/221.4 MiB] 13% Done - [23/393 files][ 30.2 MiB/221.4 MiB] 13% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/AllowedMatchesCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: - [23/393 files][ 30.8 MiB/221.4 MiB] 13% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/FixedStateCondition.cpp [Content-Type=text/x-c++src]... Step #8: - [23/393 files][ 31.3 MiB/221.4 MiB] 14% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RulePrivate.cpp [Content-Type=text/x-c++src]... Step #8: - [24/393 files][ 31.3 MiB/221.4 MiB] 14% Done - [24/393 files][ 31.6 MiB/221.4 MiB] 14% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/UEventParser.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/UEvent.hpp [Content-Type=text/x-c++hdr]... Step #8: - [24/393 files][ 31.8 MiB/221.4 MiB] 14% Done - [24/393 files][ 31.8 MiB/221.4 MiB] 14% Done - [25/393 files][ 32.4 MiB/221.4 MiB] 14% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/UEvent.cpp [Content-Type=text/x-c++src]... Step #8: - [25/393 files][ 32.9 MiB/221.4 MiB] 14% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/Utility.cpp [Content-Type=text/x-c++src]... Step #8: - [25/393 files][ 33.9 MiB/221.4 MiB] 15% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RuleEvaluatedCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: - [25/393 files][ 34.9 MiB/221.4 MiB] 15% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RuleAppliedCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/FixedStateCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/UEventParser.hpp [Content-Type=text/x-c++hdr]... Step #8: - [25/393 files][ 36.0 MiB/221.4 MiB] 16% Done - [25/393 files][ 36.0 MiB/221.4 MiB] 16% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_spec.cpp [Content-Type=text/x-c++src]... Step #8: - [25/393 files][ 36.5 MiB/221.4 MiB] 16% Done - [25/393 files][ 37.2 MiB/221.4 MiB] 16% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RuleAppliedCondition.cpp [Content-Type=text/x-c++src]... Step #8: - [25/393 files][ 39.7 MiB/221.4 MiB] 17% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/Rule.cpp [Content-Type=text/x-c++src]... Step #8: - [25/393 files][ 40.7 MiB/221.4 MiB] 18% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/Predicates.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringWhich.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Misc.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [25/393 files][ 41.8 MiB/221.4 MiB] 18% Done - [25/393 files][ 41.8 MiB/221.4 MiB] 18% Done - [25/393 files][ 41.8 MiB/221.4 MiB] 18% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/USB.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/Logger.hpp [Content-Type=text/x-c++hdr]... Step #8: - [26/393 files][ 42.0 MiB/221.4 MiB] 18% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/Logger.cpp [Content-Type=text/x-c++src]... Step #8: - [26/393 files][ 42.0 MiB/221.4 MiB] 18% Done - [26/393 files][ 42.0 MiB/221.4 MiB] 18% Done - [27/393 files][ 42.0 MiB/221.4 MiB] 18% Done - [27/393 files][ 42.3 MiB/221.4 MiB] 19% Done - [28/393 files][ 43.7 MiB/221.4 MiB] 19% Done - [29/393 files][ 43.7 MiB/221.4 MiB] 19% Done - [30/393 files][ 43.7 MiB/221.4 MiB] 19% Done - [31/393 files][ 44.0 MiB/221.4 MiB] 19% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/RuleCondition.hpp [Content-Type=text/x-c++hdr]... Step #8: - [31/393 files][ 44.8 MiB/221.4 MiB] 20% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/Exception.hpp [Content-Type=text/x-c++hdr]... Step #8: - [31/393 files][ 45.3 MiB/221.4 MiB] 20% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RuleParser/Grammar.hpp [Content-Type=text/x-c++hdr]... Step #8: - [31/393 files][ 45.5 MiB/221.4 MiB] 20% Done - [32/393 files][ 45.5 MiB/221.4 MiB] 20% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/Rule.hpp [Content-Type=text/x-c++hdr]... Step #8: - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/RuleParser.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/RuleCondition.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/RuleParser/Actions.hpp [Content-Type=text/x-c++hdr]... Step #8: - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/USB.hpp [Content-Type=text/x-c++hdr]... Step #8: - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Library/public/usbguard/RuleParser.cpp [Content-Type=text/x-c++src]... Step #8: - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Common/Utility.cpp [Content-Type=text/x-c++src]... Step #8: - [32/393 files][ 46.6 MiB/221.4 MiB] 21% Done - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Common/Utility.hpp [Content-Type=text/x-c++hdr]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Fuzzers/fuzzer-uevent.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Fuzzers/fuzzer-rules.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Fuzzers/fuzzer-usb-descriptor.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_Base64.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Regression/test_Rule_ghi37.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Regression/test_Rule_ghi247.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Regression/test_Rule_ghi113.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done - [33/393 files][ 46.7 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_UMockdevDeviceDefinition.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 47.4 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_UEvent.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 47.4 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_UEventParser.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 47.6 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_Utility.cpp [Content-Type=text/x-c++src]... Step #8: - [33/393 files][ 47.6 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_RuleParser.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_IPCServer_AccessControl.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_Rule.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Common/ByteOrder.hpp [Content-Type=text/x-c++hdr]... Step #8: - [33/393 files][ 48.3 MiB/221.4 MiB] 21% Done - [33/393 files][ 48.3 MiB/221.4 MiB] 21% Done - [33/393 files][ 48.3 MiB/221.4 MiB] 21% Done - [33/393 files][ 48.3 MiB/221.4 MiB] 21% Done - [34/393 files][ 48.3 MiB/221.4 MiB] 21% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/Tests/Unit/test_RuleAttribute_id.cpp [Content-Type=text/x-c++src]... Step #8: - [34/393 files][ 48.9 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_interfaces_testcase.cpp [Content-Type=text/x-c++src]... Step #8: - [34/393 files][ 49.1 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/CompileTimePerfTests/10.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [35/393 files][ 49.1 MiB/221.4 MiB] 22% Done - [35/393 files][ 49.1 MiB/221.4 MiB] 22% Done - [36/393 files][ 49.4 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_case_registry_impl.cpp [Content-Type=text/x-c++src]... Step #8: - [36/393 files][ 49.6 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/CompileTimePerfTests/All.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [36/393 files][ 49.9 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/RandomNumberGeneration.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/CompileTimePerfTests/100.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [36/393 files][ 50.2 MiB/221.4 MiB] 22% Done - [36/393 files][ 50.2 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/InternalBenchmark.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [36/393 files][ 50.4 MiB/221.4 MiB] 22% Done - [37/393 files][ 50.7 MiB/221.4 MiB] 22% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_spec_parser.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/GeneratorsImpl.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [37/393 files][ 50.9 MiB/221.4 MiB] 23% Done - [37/393 files][ 50.9 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_registry.cpp [Content-Type=text/x-c++src]... Step #8: - [37/393 files][ 51.4 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/Details.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [38/393 files][ 51.4 MiB/221.4 MiB] 23% Done - [38/393 files][ 51.4 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/Xml.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [38/393 files][ 52.0 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/CmdLine.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [38/393 files][ 52.5 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/StringManip.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/String.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/PartTracker.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [38/393 files][ 52.5 MiB/221.4 MiB] 23% Done - [38/393 files][ 52.5 MiB/221.4 MiB] 23% Done - [38/393 files][ 52.5 MiB/221.4 MiB] 23% Done - [39/393 files][ 52.7 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/VariadicMacros.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [39/393 files][ 53.0 MiB/221.4 MiB] 23% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/ToString.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [39/393 files][ 53.5 MiB/221.4 MiB] 24% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/IntrospectiveTests/Tag.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [40/393 files][ 53.8 MiB/221.4 MiB] 24% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Compilation.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [41/393 files][ 53.8 MiB/221.4 MiB] 24% Done - [41/393 files][ 53.8 MiB/221.4 MiB] 24% Done - [41/393 files][ 53.8 MiB/221.4 MiB] 24% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringChrono.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/EnumToString.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [41/393 files][ 54.3 MiB/221.4 MiB] 24% Done - [41/393 files][ 54.3 MiB/221.4 MiB] 24% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/SurrogateCpps/catch_test_spec.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/SurrogateCpps/catch_test_case_tracker.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Condition.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [41/393 files][ 54.3 MiB/221.4 MiB] 24% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_case_tracker.cpp [Content-Type=text/x-c++src]... Step #8: - [41/393 files][ 54.6 MiB/221.4 MiB] 24% Done - [41/393 files][ 54.6 MiB/221.4 MiB] 24% Done - [41/393 files][ 54.6 MiB/221.4 MiB] 24% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringByte.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [41/393 files][ 55.3 MiB/221.4 MiB] 24% Done - [42/393 files][ 55.9 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Decomposition.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [42/393 files][ 55.9 MiB/221.4 MiB] 25% Done - [43/393 files][ 55.9 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/include/internal/catch_test_case_info.cpp [Content-Type=text/x-c++src]... Step #8: - [43/393 files][ 56.9 MiB/221.4 MiB] 25% Done - [44/393 files][ 56.9 MiB/221.4 MiB] 25% Done - [45/393 files][ 56.9 MiB/221.4 MiB] 25% Done - [46/393 files][ 56.9 MiB/221.4 MiB] 25% Done - [47/393 files][ 56.9 MiB/221.4 MiB] 25% Done - [48/393 files][ 56.9 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Exception.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [48/393 files][ 56.9 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringTuple.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringVector.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [48/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [48/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Generators.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [49/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [49/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [50/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Tricky.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [50/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [51/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Message.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [51/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Matchers.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [51/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringOptional.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [51/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Approx.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [51/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Benchmark.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringVariant.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/BDD.tests.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringPair.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/Class.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/UsageTests/ToStringGeneral.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [52/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/projects/SelfTest/TimingTests/Sleep.tests.cpp [Content-Type=text/x-c++src]... Step #8: - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/ascii.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/Catch/.conan/test_package/test_package.cpp [Content-Type=text/x-c++src]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/memory_input.hpp [Content-Type=text/x-c++hdr]... Step #8: - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/normal.hpp [Content-Type=text/x-c++hdr]... Step #8: - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/string_input.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/match.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/parse_error.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/rules.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/parse.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/position.hpp [Content-Type=text/x-c++hdr]... Step #8: - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/contrib/shuffle_states.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/contrib/state_control.hpp [Content-Type=text/x-c++hdr]... Step #8: - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [53/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [54/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [55/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [56/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [57/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [57/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [58/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/contrib/trace.hpp [Content-Type=text/x-c++hdr]... Step #8: - [58/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/string.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/must.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/demangle.hpp [Content-Type=text/x-c++hdr]... Step #8: - [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done - [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/star.hpp [Content-Type=text/x-c++hdr]... Step #8: - [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ \ [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/bump.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [59/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [60/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [61/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [62/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [63/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [64/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [65/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [65/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [66/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [66/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/iterator.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/one.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [66/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [66/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/rep_opt.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [66/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/opt.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/pegtl_string.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [66/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/ranges.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [67/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/sor.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [67/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/seq.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [68/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [69/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [70/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [71/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [71/393 files][ 57.0 MiB/221.4 MiB] 25% Done \ [71/393 files][ 57.0 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/until.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/eof.hpp [Content-Type=text/x-c++hdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/rep.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [71/393 files][ 57.1 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/not_at.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [71/393 files][ 57.1 MiB/221.4 MiB] 25% Done \ [71/393 files][ 57.1 MiB/221.4 MiB] 25% Done \ [71/393 files][ 57.1 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/input_pair.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [71/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [72/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [73/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [74/393 files][ 57.2 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/marker.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [74/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [75/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [75/393 files][ 57.2 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/any.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [76/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [76/393 files][ 57.2 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/plus.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [76/393 files][ 57.2 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/list.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [76/393 files][ 57.2 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/action.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [77/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [78/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [79/393 files][ 57.2 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/lf_crlf_eol.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [80/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [81/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [82/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [82/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [83/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [84/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [85/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [86/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [87/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [88/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [89/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [90/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [91/393 files][ 57.2 MiB/221.4 MiB] 25% Done \ [91/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [92/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/peek_char.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [93/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [94/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [95/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [96/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [97/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [98/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [99/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/action_input.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [100/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [101/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [102/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [102/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [103/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [104/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [105/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [106/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [107/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [108/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [108/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [109/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [110/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [111/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [112/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [113/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [114/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [115/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [116/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [117/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [118/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/bump_help.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [118/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/if_must.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [119/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [120/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [120/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [121/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [122/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [123/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [124/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [125/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [126/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [127/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [128/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [129/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [130/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [131/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/include/tao/pegtl/internal/range.hpp [Content-Type=text/x-c++hdr]... Step #8: \ [132/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [133/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/src/test/pegtl/test_result.cpp [Content-Type=text/x-c++src]... Step #8: \ [134/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/src/test/pegtl/test_empty.cpp [Content-Type=text/x-c++src]... Step #8: \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/usbguard/src/ThirdParty/PEGTL/src/test/pegtl/test_setup.cpp [Content-Type=text/x-c++src]... Step #8: \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__split_buffer [Content-Type=application/octet-stream]... Step #8: \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/tuple [Content-Type=application/octet-stream]... Step #8: \ [135/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [136/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [137/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [138/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [139/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [140/393 files][ 57.3 MiB/221.4 MiB] 25% Done \ [141/393 files][ 57.3 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/ios [Content-Type=application/octet-stream]... Step #8: \ [141/393 files][ 57.4 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/src/libqb/tests/crash_test_dummy.c [Content-Type=text/x-csrc]... Step #8: \ [141/393 files][ 57.4 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/stdexcept [Content-Type=application/octet-stream]... Step #8: \ [142/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [143/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [144/393 files][ 57.4 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/iosfwd [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/map [Content-Type=application/octet-stream]... Step #8: \ [144/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [145/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [146/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [147/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [147/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [148/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [149/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [149/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [150/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [151/393 files][ 57.4 MiB/221.4 MiB] 25% Done \ [152/393 files][ 57.4 MiB/221.4 MiB] 25% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/fstream [Content-Type=application/octet-stream]... Step #8: \ [152/393 files][ 58.2 MiB/221.4 MiB] 26% Done \ [153/393 files][ 60.8 MiB/221.4 MiB] 27% Done \ [154/393 files][ 60.8 MiB/221.4 MiB] 27% Done \ [155/393 files][ 60.8 MiB/221.4 MiB] 27% Done \ [156/393 files][ 60.8 MiB/221.4 MiB] 27% Done \ [157/393 files][ 60.8 MiB/221.4 MiB] 27% Done \ [158/393 files][ 60.8 MiB/221.4 MiB] 27% Done \ [159/393 files][ 60.9 MiB/221.4 MiB] 27% Done \ [160/393 files][ 60.9 MiB/221.4 MiB] 27% Done \ [161/393 files][ 62.2 MiB/221.4 MiB] 28% Done \ [162/393 files][ 62.2 MiB/221.4 MiB] 28% Done \ [163/393 files][ 63.5 MiB/221.4 MiB] 28% Done \ [164/393 files][ 64.8 MiB/221.4 MiB] 29% Done \ [165/393 files][ 66.1 MiB/221.4 MiB] 29% Done \ [166/393 files][ 66.6 MiB/221.4 MiB] 30% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/stddef.h [Content-Type=text/x-chdr]... Step #8: \ [166/393 files][ 69.7 MiB/221.4 MiB] 31% Done \ [167/393 files][ 70.2 MiB/221.4 MiB] 31% Done \ [168/393 files][ 70.8 MiB/221.4 MiB] 31% Done \ [169/393 files][ 71.3 MiB/221.4 MiB] 32% Done \ [170/393 files][ 72.1 MiB/221.4 MiB] 32% Done \ [171/393 files][ 72.1 MiB/221.4 MiB] 32% Done \ [172/393 files][ 73.1 MiB/221.4 MiB] 33% Done \ [173/393 files][ 73.6 MiB/221.4 MiB] 33% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/new [Content-Type=application/octet-stream]... Step #8: \ [174/393 files][ 73.9 MiB/221.4 MiB] 33% Done | | [174/393 files][ 76.7 MiB/221.4 MiB] 34% Done | [175/393 files][ 78.5 MiB/221.4 MiB] 35% Done | [176/393 files][ 79.5 MiB/221.4 MiB] 35% Done | [177/393 files][ 81.6 MiB/221.4 MiB] 36% Done | [178/393 files][ 81.6 MiB/221.4 MiB] 36% Done | [179/393 files][ 90.7 MiB/221.4 MiB] 40% Done | [180/393 files][ 90.7 MiB/221.4 MiB] 40% Done | [181/393 files][ 90.7 MiB/221.4 MiB] 40% Done | [182/393 files][ 97.2 MiB/221.4 MiB] 43% Done | [183/393 files][101.0 MiB/221.4 MiB] 45% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/iomanip [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/typeinfo [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/unordered_map [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/limits [Content-Type=application/octet-stream]... Step #8: | [184/393 files][109.6 MiB/221.4 MiB] 49% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/ostream [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/string [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/locale [Content-Type=application/octet-stream]... Step #8: | [185/393 files][115.2 MiB/221.4 MiB] 52% Done | [186/393 files][115.7 MiB/221.4 MiB] 52% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/string_view [Content-Type=application/octet-stream]... Step #8: | [186/393 files][120.4 MiB/221.4 MiB] 54% Done | [186/393 files][120.9 MiB/221.4 MiB] 54% Done | [187/393 files][122.2 MiB/221.4 MiB] 55% Done | [187/393 files][123.0 MiB/221.4 MiB] 55% Done | [187/393 files][124.8 MiB/221.4 MiB] 56% Done | [187/393 files][125.8 MiB/221.4 MiB] 56% Done | [188/393 files][127.1 MiB/221.4 MiB] 57% Done | [188/393 files][127.1 MiB/221.4 MiB] 57% Done | [189/393 files][127.1 MiB/221.4 MiB] 57% Done | [190/393 files][127.6 MiB/221.4 MiB] 57% Done | [191/393 files][128.1 MiB/221.4 MiB] 57% Done | [192/393 files][128.1 MiB/221.4 MiB] 57% Done | [192/393 files][133.3 MiB/221.4 MiB] 60% Done | [193/393 files][134.1 MiB/221.4 MiB] 60% Done | [194/393 files][134.3 MiB/221.4 MiB] 60% Done | [195/393 files][139.9 MiB/221.4 MiB] 63% Done | [195/393 files][142.5 MiB/221.4 MiB] 64% Done | [196/393 files][148.5 MiB/221.4 MiB] 67% Done | [197/393 files][149.3 MiB/221.4 MiB] 67% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/istream [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/stdlib.h [Content-Type=text/x-chdr]... Step #8: | [198/393 files][165.0 MiB/221.4 MiB] 74% Done | [199/393 files][165.0 MiB/221.4 MiB] 74% Done | [200/393 files][166.6 MiB/221.4 MiB] 75% Done | [201/393 files][167.6 MiB/221.4 MiB] 75% Done | [202/393 files][169.1 MiB/221.4 MiB] 76% Done | [203/393 files][171.5 MiB/221.4 MiB] 77% Done | [204/393 files][171.5 MiB/221.4 MiB] 77% Done | [205/393 files][174.8 MiB/221.4 MiB] 78% Done | [206/393 files][179.8 MiB/221.4 MiB] 81% Done | [207/393 files][180.3 MiB/221.4 MiB] 81% Done | [208/393 files][180.3 MiB/221.4 MiB] 81% Done | [209/393 files][181.1 MiB/221.4 MiB] 81% Done | [210/393 files][181.6 MiB/221.4 MiB] 82% Done | [211/393 files][181.9 MiB/221.4 MiB] 82% Done | [212/393 files][182.1 MiB/221.4 MiB] 82% Done | [213/393 files][182.1 MiB/221.4 MiB] 82% Done | [214/393 files][182.6 MiB/221.4 MiB] 82% Done | [215/393 files][183.2 MiB/221.4 MiB] 82% Done | [216/393 files][184.2 MiB/221.4 MiB] 83% Done | [217/393 files][184.4 MiB/221.4 MiB] 83% Done | [218/393 files][184.7 MiB/221.4 MiB] 83% Done | [219/393 files][185.0 MiB/221.4 MiB] 83% Done | [220/393 files][187.3 MiB/221.4 MiB] 84% Done | [221/393 files][188.4 MiB/221.4 MiB] 85% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__functional/function.h [Content-Type=text/x-chdr]... Step #8: | [222/393 files][189.9 MiB/221.4 MiB] 85% Done | [223/393 files][192.5 MiB/221.4 MiB] 86% Done | [224/393 files][192.5 MiB/221.4 MiB] 86% Done | [225/393 files][192.7 MiB/221.4 MiB] 87% Done | [225/393 files][195.2 MiB/221.4 MiB] 88% Done | [226/393 files][195.5 MiB/221.4 MiB] 88% Done | [227/393 files][198.1 MiB/221.4 MiB] 89% Done | [227/393 files][198.3 MiB/221.4 MiB] 89% Done | [228/393 files][199.9 MiB/221.4 MiB] 90% Done | [229/393 files][200.2 MiB/221.4 MiB] 90% Done | [230/393 files][200.4 MiB/221.4 MiB] 90% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/streambuf [Content-Type=application/octet-stream]... Step #8: | [231/393 files][202.0 MiB/221.4 MiB] 91% Done | [232/393 files][202.0 MiB/221.4 MiB] 91% Done | [233/393 files][202.8 MiB/221.4 MiB] 91% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/enable_if.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/initializer_list [Content-Type=application/octet-stream]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__hash_table [Content-Type=application/octet-stream]... Step #8: | [234/393 files][205.6 MiB/221.4 MiB] 92% Done | [235/393 files][205.6 MiB/221.4 MiB] 92% Done | [235/393 files][206.9 MiB/221.4 MiB] 93% Done | [236/393 files][206.9 MiB/221.4 MiB] 93% Done | [236/393 files][209.2 MiB/221.4 MiB] 94% Done / / [236/393 files][209.7 MiB/221.4 MiB] 94% Done / [236/393 files][209.7 MiB/221.4 MiB] 94% Done / [236/393 files][209.7 MiB/221.4 MiB] 94% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__node_handle [Content-Type=application/octet-stream]... Step #8: / [237/393 files][210.0 MiB/221.4 MiB] 94% Done / [237/393 files][210.5 MiB/221.4 MiB] 95% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__tree [Content-Type=application/octet-stream]... Step #8: / [237/393 files][211.0 MiB/221.4 MiB] 95% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/vector [Content-Type=application/octet-stream]... Step #8: / [237/393 files][211.3 MiB/221.4 MiB] 95% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/sstream [Content-Type=application/octet-stream]... Step #8: / [238/393 files][211.5 MiB/221.4 MiB] 95% Done / [239/393 files][211.5 MiB/221.4 MiB] 95% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__locale [Content-Type=application/octet-stream]... Step #8: / [240/393 files][211.5 MiB/221.4 MiB] 95% Done / [240/393 files][211.5 MiB/221.4 MiB] 95% Done / [240/393 files][211.8 MiB/221.4 MiB] 95% Done / [241/393 files][212.1 MiB/221.4 MiB] 95% Done / [242/393 files][212.1 MiB/221.4 MiB] 95% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__threading_support [Content-Type=application/octet-stream]... Step #8: / [242/393 files][213.1 MiB/221.4 MiB] 96% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__utility/integer_sequence.h [Content-Type=text/x-chdr]... Step #8: / [242/393 files][213.6 MiB/221.4 MiB] 96% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/comp.h [Content-Type=text/x-chdr]... Step #8: / [242/393 files][213.9 MiB/221.4 MiB] 96% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/sift_down.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__utility/swap.h [Content-Type=text/x-chdr]... Step #8: / [242/393 files][214.4 MiB/221.4 MiB] 96% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__utility/piecewise_construct.h [Content-Type=text/x-chdr]... Step #8: / [242/393 files][214.4 MiB/221.4 MiB] 96% Done / [242/393 files][214.7 MiB/221.4 MiB] 96% Done / [243/393 files][214.7 MiB/221.4 MiB] 96% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__utility/exception_guard.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][215.0 MiB/221.4 MiB] 97% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__utility/pair.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][215.5 MiB/221.4 MiB] 97% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__utility/convert_to_integral.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][216.0 MiB/221.4 MiB] 97% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/copy.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][216.3 MiB/221.4 MiB] 97% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/unwrap_range.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][216.6 MiB/221.4 MiB] 97% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/push_heap.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/copy_n.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][217.1 MiB/221.4 MiB] 98% Done / [243/393 files][217.1 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/copy_move_common.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][217.6 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/pop_heap.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][217.9 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/sort_heap.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/fill_n.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][218.1 MiB/221.4 MiB] 98% Done / [243/393 files][218.1 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/unwrap_iter.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][218.7 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/min.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][219.0 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/make_heap.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][219.0 MiB/221.4 MiB] 98% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/move.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][219.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/iterator_operations.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/max.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][220.0 MiB/221.4 MiB] 99% Done / [243/393 files][220.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/partial_sort.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][220.4 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/sort.h [Content-Type=text/x-chdr]... Step #8: / [243/393 files][220.4 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/iter_swap.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.4 MiB/221.4 MiB] 99% Done / [244/393 files][220.4 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/comp_ref_type.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__algorithm/find_first_of.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.4 MiB/221.4 MiB] 99% Done / [244/393 files][220.4 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__tuple/tuple_types.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__functional/hash.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__functional/binary_function.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__functional/operations.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__bit/countl.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/nat.h [Content-Type=text/x-chdr]... Step #8: / [244/393 files][220.5 MiB/221.4 MiB] 99% Done / [245/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__bit/blsr.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__bit/countr.h [Content-Type=text/x-chdr]... Step #8: / [245/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/add_lvalue_reference.h [Content-Type=text/x-chdr]... Step #8: / [245/393 files][220.5 MiB/221.4 MiB] 99% Done / [245/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/is_swappable.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/remove_extent.h [Content-Type=text/x-chdr]... Step #8: / [245/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/remove_reference.h [Content-Type=text/x-chdr]... Step #8: / [245/393 files][220.5 MiB/221.4 MiB] 99% Done / [245/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/remove_cv.h [Content-Type=text/x-chdr]... Step #8: / [245/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/type_identity.h [Content-Type=text/x-chdr]... Step #8: / [246/393 files][220.5 MiB/221.4 MiB] 99% Done / [247/393 files][220.5 MiB/221.4 MiB] 99% Done / [248/393 files][220.5 MiB/221.4 MiB] 99% Done / [249/393 files][220.5 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/aligned_storage.h [Content-Type=text/x-chdr]... Step #8: / [250/393 files][220.5 MiB/221.4 MiB] 99% Done / [250/393 files][220.5 MiB/221.4 MiB] 99% Done / [251/393 files][220.5 MiB/221.4 MiB] 99% Done / [251/393 files][220.5 MiB/221.4 MiB] 99% Done / [252/393 files][220.5 MiB/221.4 MiB] 99% Done / [253/393 files][220.5 MiB/221.4 MiB] 99% Done / [254/393 files][220.6 MiB/221.4 MiB] 99% Done / [255/393 files][220.6 MiB/221.4 MiB] 99% Done / [256/393 files][220.6 MiB/221.4 MiB] 99% Done / [257/393 files][220.6 MiB/221.4 MiB] 99% Done / [258/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__random/bernoulli_distribution.h [Content-Type=text/x-chdr]... Step #8: / [259/393 files][220.6 MiB/221.4 MiB] 99% Done / [260/393 files][220.6 MiB/221.4 MiB] 99% Done / [260/393 files][220.6 MiB/221.4 MiB] 99% Done / [261/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__exception/exception.h [Content-Type=text/x-chdr]... Step #8: / [262/393 files][220.6 MiB/221.4 MiB] 99% Done / [263/393 files][220.6 MiB/221.4 MiB] 99% Done / [264/393 files][220.6 MiB/221.4 MiB] 99% Done / [264/393 files][220.6 MiB/221.4 MiB] 99% Done / [265/393 files][220.6 MiB/221.4 MiB] 99% Done / [266/393 files][220.6 MiB/221.4 MiB] 99% Done / [267/393 files][220.6 MiB/221.4 MiB] 99% Done / [268/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__random/mersenne_twister_engine.h [Content-Type=text/x-chdr]... Step #8: / [268/393 files][220.6 MiB/221.4 MiB] 99% Done / [269/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/datasizeof.h [Content-Type=text/x-chdr]... Step #8: / [269/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__math/modulo.h [Content-Type=text/x-chdr]... Step #8: / [269/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__math/rounding_functions.h [Content-Type=text/x-chdr]... Step #8: / [270/393 files][220.6 MiB/221.4 MiB] 99% Done / [271/393 files][220.6 MiB/221.4 MiB] 99% Done / [271/393 files][220.6 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__math/traits.h [Content-Type=text/x-chdr]... Step #8: / [272/393 files][220.7 MiB/221.4 MiB] 99% Done / [273/393 files][220.7 MiB/221.4 MiB] 99% Done / [274/393 files][220.7 MiB/221.4 MiB] 99% Done / [275/393 files][220.7 MiB/221.4 MiB] 99% Done / [276/393 files][220.7 MiB/221.4 MiB] 99% Done / [277/393 files][220.7 MiB/221.4 MiB] 99% Done / [278/393 files][220.7 MiB/221.4 MiB] 99% Done / [278/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__random/uniform_real_distribution.h [Content-Type=text/x-chdr]... Step #8: / [278/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__random/random_device.h [Content-Type=text/x-chdr]... Step #8: / [278/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__random/generate_canonical.h [Content-Type=text/x-chdr]... Step #8: / [278/393 files][220.7 MiB/221.4 MiB] 99% Done / [279/393 files][220.7 MiB/221.4 MiB] 99% Done / [280/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__string/constexpr_c_functions.h [Content-Type=text/x-chdr]... Step #8: / [280/393 files][220.7 MiB/221.4 MiB] 99% Done / [281/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__functional/unary_function.h [Content-Type=text/x-chdr]... Step #8: / [281/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__tuple/tuple_indices.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__chrono/system_clock.h [Content-Type=text/x-chdr]... Step #8: / [281/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__type_traits/integral_constant.h [Content-Type=text/x-chdr]... Step #8: / [281/393 files][220.7 MiB/221.4 MiB] 99% Done / [281/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__string/char_traits.h [Content-Type=text/x-chdr]... Step #8: / [281/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/iterator_traits.h [Content-Type=text/x-chdr]... Step #8: / [281/393 files][220.7 MiB/221.4 MiB] 99% Done / [282/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/reverse_iterator.h [Content-Type=text/x-chdr]... Step #8: / [283/393 files][220.7 MiB/221.4 MiB] 99% Done / [284/393 files][220.7 MiB/221.4 MiB] 99% Done / [285/393 files][220.7 MiB/221.4 MiB] 99% Done / [286/393 files][220.7 MiB/221.4 MiB] 99% Done / [287/393 files][220.7 MiB/221.4 MiB] 99% Done / [287/393 files][220.7 MiB/221.4 MiB] 99% Done / [288/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/next.h [Content-Type=text/x-chdr]... Step #8: / [288/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/ostreambuf_iterator.h [Content-Type=text/x-chdr]... Step #8: / [288/393 files][220.7 MiB/221.4 MiB] 99% Done / [289/393 files][220.7 MiB/221.4 MiB] 99% Done / [290/393 files][220.7 MiB/221.4 MiB] 99% Done / [291/393 files][220.7 MiB/221.4 MiB] 99% Done / [292/393 files][220.7 MiB/221.4 MiB] 99% Done / [293/393 files][220.7 MiB/221.4 MiB] 99% Done / [294/393 files][220.7 MiB/221.4 MiB] 99% Done / [295/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/distance.h [Content-Type=text/x-chdr]... Step #8: / [296/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/iterator.h [Content-Type=text/x-chdr]... Step #8: / [297/393 files][220.7 MiB/221.4 MiB] 99% Done / [297/393 files][220.7 MiB/221.4 MiB] 99% Done / [297/393 files][220.7 MiB/221.4 MiB] 99% Done / [298/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/wrap_iter.h [Content-Type=text/x-chdr]... Step #8: / [298/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__iterator/advance.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__ios/fpos.h [Content-Type=text/x-chdr]... Step #8: / [299/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/string.h [Content-Type=text/x-chdr]... Step #8: / [299/393 files][220.7 MiB/221.4 MiB] 99% Done / [299/393 files][220.7 MiB/221.4 MiB] 99% Done / [299/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/string_view.h [Content-Type=text/x-chdr]... Step #8: / [299/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/ostream.h [Content-Type=text/x-chdr]... Step #8: / [299/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/sstream.h [Content-Type=text/x-chdr]... Step #8: / [299/393 files][220.7 MiB/221.4 MiB] 99% Done / [300/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/ios.h [Content-Type=text/x-chdr]... Step #8: / [300/393 files][220.7 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/fstream.h [Content-Type=text/x-chdr]... Step #8: / [300/393 files][220.8 MiB/221.4 MiB] 99% Done / [301/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__fwd/istream.h [Content-Type=text/x-chdr]... Step #8: / [301/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__mutex/unique_lock.h [Content-Type=text/x-chdr]... Step #8: / [301/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__mutex/mutex.h [Content-Type=text/x-chdr]... Step #8: / [301/393 files][220.8 MiB/221.4 MiB] 99% Done / [302/393 files][220.8 MiB/221.4 MiB] 99% Done / [303/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/allocate_at_least.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__mutex/tag_types.h [Content-Type=text/x-chdr]... Step #8: / [303/393 files][220.8 MiB/221.4 MiB] 99% Done / [303/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/swap_allocator.h [Content-Type=text/x-chdr]... Step #8: / [303/393 files][220.8 MiB/221.4 MiB] 99% Done / [304/393 files][220.8 MiB/221.4 MiB] 99% Done / [305/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/pointer_traits.h [Content-Type=text/x-chdr]... Step #8: / [305/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/uninitialized_algorithms.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/unique_ptr.h [Content-Type=text/x-chdr]... Step #8: / [305/393 files][220.8 MiB/221.4 MiB] 99% Done / [305/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/allocator_traits.h [Content-Type=text/x-chdr]... Step #8: / [305/393 files][220.8 MiB/221.4 MiB] 99% Done / [306/393 files][220.8 MiB/221.4 MiB] 99% Done / [307/393 files][220.8 MiB/221.4 MiB] 99% Done / [308/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/shared_ptr.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/compressed_pair.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/allocator.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__memory/allocation_guard.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__debug_utils/randomize_range.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__chrono/steady_clock.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__chrono/time_point.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__chrono/duration.h [Content-Type=text/x-chdr]... Step #8: / [309/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/include/c++/v1/__debug_utils/strict_weak_ordering_check.h [Content-Type=text/x-chdr]... Step #8: / [310/393 files][220.8 MiB/221.4 MiB] 99% Done / [310/393 files][220.8 MiB/221.4 MiB] 99% Done / [311/393 files][220.8 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/lib/clang/18/include/__stdarg_va_list.h [Content-Type=text/x-chdr]... Step #8: / [311/393 files][220.9 MiB/221.4 MiB] 99% Done - Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/lib/clang/18/include/__stddef_size_t.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/lib/clang/18/include/__stddef_ptrdiff_t.h [Content-Type=text/x-chdr]... Step #8: - [311/393 files][220.9 MiB/221.4 MiB] 99% Done - [311/393 files][220.9 MiB/221.4 MiB] 99% Done - [312/393 files][220.9 MiB/221.4 MiB] 99% Done - [313/393 files][220.9 MiB/221.4 MiB] 99% Done - [314/393 files][220.9 MiB/221.4 MiB] 99% Done - [315/393 files][220.9 MiB/221.4 MiB] 99% Done - [316/393 files][220.9 MiB/221.4 MiB] 99% Done - [317/393 files][220.9 MiB/221.4 MiB] 99% Done - [318/393 files][220.9 MiB/221.4 MiB] 99% Done - [319/393 files][220.9 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/wctype.h [Content-Type=text/x-chdr]... Step #8: - [319/393 files][220.9 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/local/lib/clang/18/include/__stddef_max_align_t.h [Content-Type=text/x-chdr]... Step #8: - [319/393 files][220.9 MiB/221.4 MiB] 99% Done - [320/393 files][221.0 MiB/221.4 MiB] 99% Done - [321/393 files][221.0 MiB/221.4 MiB] 99% Done - [322/393 files][221.0 MiB/221.4 MiB] 99% Done - [323/393 files][221.0 MiB/221.4 MiB] 99% Done - [324/393 files][221.0 MiB/221.4 MiB] 99% Done - [325/393 files][221.0 MiB/221.4 MiB] 99% Done - [326/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/stdio.h [Content-Type=text/x-chdr]... Step #8: - [326/393 files][221.0 MiB/221.4 MiB] 99% Done - [327/393 files][221.0 MiB/221.4 MiB] 99% Done - [328/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/ctype.h [Content-Type=text/x-chdr]... Step #8: - [328/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/time.h [Content-Type=text/x-chdr]... Step #8: - [328/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/string.h [Content-Type=text/x-chdr]... Step #8: - [328/393 files][221.0 MiB/221.4 MiB] 99% Done - [329/393 files][221.0 MiB/221.4 MiB] 99% Done - [330/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/unistd.h [Content-Type=text/x-chdr]... Step #8: - [330/393 files][221.0 MiB/221.4 MiB] 99% Done - [331/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/locale.h [Content-Type=text/x-chdr]... Step #8: - [331/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/dirent.h [Content-Type=text/x-chdr]... Step #8: - [332/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/stdint.h [Content-Type=text/x-chdr]... Step #8: - [332/393 files][221.0 MiB/221.4 MiB] 99% Done - [333/393 files][221.0 MiB/221.4 MiB] 99% Done - [333/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/wchar.h [Content-Type=text/x-chdr]... Step #8: - [333/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/stdlib.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.0 MiB/221.4 MiB] 99% Done - [334/393 files][221.0 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/math.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/resource.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.0 MiB/221.4 MiB] 99% Done - [334/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/dirent.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/mathcalls.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/wctype-wchar.h [Content-Type=text/x-chdr]... Step #8: Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/uintn-identity.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.1 MiB/221.4 MiB] 99% Done - [334/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/stat.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/thread-shared-types.h [Content-Type=text/x-chdr]... Step #8: - [334/393 files][221.1 MiB/221.4 MiB] 99% Done - [335/393 files][221.1 MiB/221.4 MiB] 99% Done - [336/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/pthreadtypes.h [Content-Type=text/x-chdr]... Step #8: - [336/393 files][221.1 MiB/221.4 MiB] 99% Done - [337/393 files][221.1 MiB/221.4 MiB] 99% Done - [338/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/stdint-intn.h [Content-Type=text/x-chdr]... Step #8: - [339/393 files][221.1 MiB/221.4 MiB] 99% Done - [339/393 files][221.1 MiB/221.4 MiB] 99% Done - [340/393 files][221.1 MiB/221.4 MiB] 99% Done - [341/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/struct_mutex.h [Content-Type=text/x-chdr]... Step #8: - [341/393 files][221.1 MiB/221.4 MiB] 99% Done - [342/393 files][221.1 MiB/221.4 MiB] 99% Done - [343/393 files][221.1 MiB/221.4 MiB] 99% Done - [344/393 files][221.1 MiB/221.4 MiB] 99% Done - [345/393 files][221.1 MiB/221.4 MiB] 99% Done - [346/393 files][221.1 MiB/221.4 MiB] 99% Done - [347/393 files][221.1 MiB/221.4 MiB] 99% Done - [348/393 files][221.1 MiB/221.4 MiB] 99% Done - [349/393 files][221.1 MiB/221.4 MiB] 99% Done - [350/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/struct_FILE.h [Content-Type=text/x-chdr]... Step #8: - [350/393 files][221.1 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/wint_t.h [Content-Type=text/x-chdr]... Step #8: - [350/393 files][221.1 MiB/221.4 MiB] 99% Done - [351/393 files][221.2 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/mbstate_t.h [Content-Type=text/x-chdr]... Step #8: - [351/393 files][221.2 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/time_t.h [Content-Type=text/x-chdr]... Step #8: - [351/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/__fpos_t.h [Content-Type=text/x-chdr]... Step #8: - [351/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/struct_timespec.h [Content-Type=text/x-chdr]... Step #8: - [351/393 files][221.3 MiB/221.4 MiB] 99% Done - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/__FILE.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/clock_t.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/FILE.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/struct_timeval.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/__mbstate_t.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/workspace/oss-fuzz/projects/example/my-api-repo/do_stuff_unittest.cpp [Content-Type=text/x-c++src]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/types/struct_tm.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/sys/types.h [Content-Type=text/x-chdr]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/workspace/oss-fuzz/projects/upx/fuzzers/test_packed_file_fuzzer.cpp [Content-Type=text/x-c++src]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/workspace/oss-fuzz/projects/tinyxml2/xmltest.cpp [Content-Type=text/x-c++src]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/workspace/oss-fuzz/projects/tinyxml2/xmltest2.cpp [Content-Type=text/x-c++src]... Step #8: - [352/393 files][221.3 MiB/221.4 MiB] 99% Done - [353/393 files][221.3 MiB/221.4 MiB] 99% Done - [354/393 files][221.3 MiB/221.4 MiB] 99% Done - [355/393 files][221.3 MiB/221.4 MiB] 99% Done Copying file:///workspace/out/libfuzzer-introspector-x86_64/inspector/source-code/usr/include/x86_64-linux-gnu/bits/stdint-uintn.h [Content-Type=text/x-chdr]... Step #8: - [355/393 files][221.3 MiB/221.4 MiB] 99% Done - [356/393 files][221.3 MiB/221.4 MiB] 99% Done - [357/393 files][221.3 MiB/221.4 MiB] 99% Done - [358/393 files][221.3 MiB/221.4 MiB] 99% Done - [359/393 files][221.3 MiB/221.4 MiB] 99% Done - [360/393 files][221.3 MiB/221.4 MiB] 99% Done - [361/393 files][221.3 MiB/221.4 MiB] 99% Done - [362/393 files][221.3 MiB/221.4 MiB] 99% Done - [363/393 files][221.3 MiB/221.4 MiB] 99% Done - [364/393 files][221.3 MiB/221.4 MiB] 99% Done - [365/393 files][221.3 MiB/221.4 MiB] 99% Done - [366/393 files][221.3 MiB/221.4 MiB] 99% Done - [367/393 files][221.3 MiB/221.4 MiB] 99% Done - [368/393 files][221.3 MiB/221.4 MiB] 99% Done - [369/393 files][221.3 MiB/221.4 MiB] 99% Done - [370/393 files][221.3 MiB/221.4 MiB] 99% Done - [371/393 files][221.3 MiB/221.4 MiB] 99% Done - [372/393 files][221.3 MiB/221.4 MiB] 99% Done - [373/393 files][221.3 MiB/221.4 MiB] 99% Done - [374/393 files][221.3 MiB/221.4 MiB] 99% Done - [375/393 files][221.3 MiB/221.4 MiB] 99% Done - [376/393 files][221.3 MiB/221.4 MiB] 99% Done - [377/393 files][221.3 MiB/221.4 MiB] 99% Done - [378/393 files][221.3 MiB/221.4 MiB] 99% Done - [379/393 files][221.3 MiB/221.4 MiB] 99% Done - [380/393 files][221.3 MiB/221.4 MiB] 99% Done - [381/393 files][221.3 MiB/221.4 MiB] 99% Done - [382/393 files][221.4 MiB/221.4 MiB] 99% Done - [383/393 files][221.4 MiB/221.4 MiB] 99% Done - [384/393 files][221.4 MiB/221.4 MiB] 99% Done - [385/393 files][221.4 MiB/221.4 MiB] 99% Done - [386/393 files][221.4 MiB/221.4 MiB] 99% Done - [387/393 files][221.4 MiB/221.4 MiB] 99% Done - [388/393 files][221.4 MiB/221.4 MiB] 99% Done - [389/393 files][221.4 MiB/221.4 MiB] 99% Done - [390/393 files][221.4 MiB/221.4 MiB] 99% Done - [391/393 files][221.4 MiB/221.4 MiB] 99% Done - [392/393 files][221.4 MiB/221.4 MiB] 99% Done \ \ [393/393 files][221.4 MiB/221.4 MiB] 100% Done | Step #8: Operation completed over 393 objects/221.4 MiB. Finished Step #8 PUSH DONE