starting build "35014027-7c2b-4907-80d5-0cb407b5978e" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 11.78kB Step #1: Step 1/21 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: ceb4e1c33284: Pulling fs layer Step #1: 918facb7b63f: Pulling fs layer Step #1: 66a560114586: Pulling fs layer Step #1: 295308f84cfe: Pulling fs layer Step #1: 512c9727052b: Pulling fs layer Step #1: c432cccd2f07: Pulling fs layer Step #1: ef17aae19049: Pulling fs layer Step #1: 955394b46518: Pulling fs layer Step #1: 1ade4475cfb3: Pulling fs layer Step #1: b5bca6eda27a: Pulling fs layer Step #1: 3700a0c2dc3f: Pulling fs layer Step #1: b38f33e67ea1: Pulling fs layer Step #1: 6bdec0b95847: Pulling fs layer Step #1: 422a007fb34d: Pulling fs layer Step #1: 0a9de37e92dd: Pulling fs layer Step #1: 29c50de0ab1d: Pulling fs layer Step #1: 70cfd754a2a0: Pulling fs layer Step #1: 917c40c462a2: Pulling fs layer Step #1: 66a560114586: Waiting Step #1: 2039ed00a790: Pulling fs layer Step #1: ef17aae19049: Waiting Step #1: 88122273cf90: Pulling fs layer Step #1: 955394b46518: Waiting Step #1: 08f3d46d4ff4: Pulling fs layer Step #1: 295308f84cfe: Waiting Step #1: 037056409c93: Pulling fs layer Step #1: fe6cff1be2ed: Pulling fs layer Step #1: 1ade4475cfb3: Waiting Step #1: 512c9727052b: Waiting Step #1: 5f991be1cb03: Pulling fs layer Step #1: c432cccd2f07: Waiting Step #1: 8e4c2cbe2174: Pulling fs layer Step #1: 3700a0c2dc3f: Waiting Step #1: b5bca6eda27a: Waiting Step #1: 78771360ed7e: Pulling fs layer Step #1: 6e54fbda3d17: Pulling fs layer Step #1: b38f33e67ea1: Waiting Step #1: 08f3d46d4ff4: Waiting Step #1: a8000f1c65db: Pulling fs layer Step #1: 29c50de0ab1d: Waiting Step #1: 037056409c93: Waiting Step #1: 51eb4d0182bb: Pulling fs layer Step #1: 2039ed00a790: Waiting Step #1: 794ef2ebe140: Pulling fs layer Step #1: 70cfd754a2a0: Waiting Step #1: fe6cff1be2ed: Waiting Step #1: 331aa7ba7917: Pulling fs layer Step #1: 88122273cf90: Waiting Step #1: 42cdc084face: Pulling fs layer Step #1: 0a9de37e92dd: Waiting Step #1: 5f991be1cb03: Waiting Step #1: 8e4c2cbe2174: Waiting Step #1: a8000f1c65db: Waiting Step #1: 78771360ed7e: Waiting Step #1: 422a007fb34d: Waiting Step #1: 6e54fbda3d17: Waiting Step #1: 51eb4d0182bb: Waiting Step #1: 42cdc084face: Waiting Step #1: 794ef2ebe140: Waiting Step #1: 6bdec0b95847: Waiting Step #1: 331aa7ba7917: Waiting Step #1: 918facb7b63f: Verifying Checksum Step #1: 918facb7b63f: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 295308f84cfe: Verifying Checksum Step #1: 295308f84cfe: Download complete Step #1: 66a560114586: Verifying Checksum Step #1: 66a560114586: Download complete Step #1: 512c9727052b: Verifying Checksum Step #1: 512c9727052b: Download complete Step #1: ef17aae19049: Verifying Checksum Step #1: ef17aae19049: Download complete Step #1: ceb4e1c33284: Verifying Checksum Step #1: ceb4e1c33284: Download complete Step #1: 955394b46518: Verifying Checksum Step #1: 955394b46518: Download complete Step #1: b549f31133a9: Pull complete Step #1: b5bca6eda27a: Verifying Checksum Step #1: b5bca6eda27a: Download complete Step #1: 3700a0c2dc3f: Verifying Checksum Step #1: 3700a0c2dc3f: Download complete Step #1: b38f33e67ea1: Verifying Checksum Step #1: b38f33e67ea1: Download complete Step #1: 6bdec0b95847: Verifying Checksum Step #1: 6bdec0b95847: Download complete Step #1: 422a007fb34d: Download complete Step #1: 0a9de37e92dd: Verifying Checksum Step #1: 0a9de37e92dd: Download complete Step #1: 29c50de0ab1d: Verifying Checksum Step #1: 29c50de0ab1d: Download complete Step #1: 70cfd754a2a0: Verifying Checksum Step #1: 70cfd754a2a0: Download complete Step #1: 1ade4475cfb3: Verifying Checksum Step #1: 1ade4475cfb3: Download complete Step #1: 2039ed00a790: Verifying Checksum Step #1: 2039ed00a790: Download complete Step #1: 917c40c462a2: Verifying Checksum Step #1: 917c40c462a2: Download complete Step #1: 88122273cf90: Verifying Checksum Step #1: 88122273cf90: Download complete Step #1: 08f3d46d4ff4: Verifying Checksum Step #1: 08f3d46d4ff4: Download complete Step #1: 037056409c93: Download complete Step #1: fe6cff1be2ed: Verifying Checksum Step #1: fe6cff1be2ed: Download complete Step #1: 5f991be1cb03: Verifying Checksum Step #1: 5f991be1cb03: Download complete Step #1: 8e4c2cbe2174: Verifying Checksum Step #1: 8e4c2cbe2174: Download complete Step #1: 78771360ed7e: Verifying Checksum Step #1: 78771360ed7e: Download complete Step #1: c432cccd2f07: Verifying Checksum Step #1: c432cccd2f07: Download complete Step #1: 6e54fbda3d17: Verifying Checksum Step #1: 6e54fbda3d17: Download complete Step #1: 51eb4d0182bb: Verifying Checksum Step #1: 51eb4d0182bb: Download complete Step #1: 794ef2ebe140: Verifying Checksum Step #1: 794ef2ebe140: Download complete Step #1: a8000f1c65db: Download complete Step #1: 331aa7ba7917: Verifying Checksum Step #1: 331aa7ba7917: Download complete Step #1: ceb4e1c33284: Pull complete Step #1: 918facb7b63f: Pull complete Step #1: 42cdc084face: Verifying Checksum Step #1: 42cdc084face: Download complete Step #1: 66a560114586: Pull complete Step #1: 295308f84cfe: Pull complete Step #1: 512c9727052b: Pull complete Step #1: c432cccd2f07: Pull complete Step #1: ef17aae19049: Pull complete Step #1: 955394b46518: Pull complete Step #1: 1ade4475cfb3: Pull complete Step #1: b5bca6eda27a: Pull complete Step #1: 3700a0c2dc3f: Pull complete Step #1: b38f33e67ea1: Pull complete Step #1: 6bdec0b95847: Pull complete Step #1: 422a007fb34d: Pull complete Step #1: 0a9de37e92dd: Pull complete Step #1: 29c50de0ab1d: Pull complete Step #1: 70cfd754a2a0: Pull complete Step #1: 917c40c462a2: Pull complete Step #1: 2039ed00a790: Pull complete Step #1: 88122273cf90: Pull complete Step #1: 08f3d46d4ff4: Pull complete Step #1: 037056409c93: Pull complete Step #1: fe6cff1be2ed: Pull complete Step #1: 5f991be1cb03: Pull complete Step #1: 8e4c2cbe2174: Pull complete Step #1: 78771360ed7e: Pull complete Step #1: 6e54fbda3d17: Pull complete Step #1: a8000f1c65db: Pull complete Step #1: 51eb4d0182bb: Pull complete Step #1: 794ef2ebe140: Pull complete Step #1: 331aa7ba7917: Pull complete Step #1: 42cdc084face: Pull complete Step #1: Digest: sha256:d222f6a29fcf4af18c61fb282e23c2b1609e9c167b0161577e1209bdf6dcb0f6 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 2d267578250f Step #1: Step 2/21 : RUN apt-get update && apt-get install -y build-essential autoconf automake libtool make pkg-config python flex bison zlib1g-dev libpcre3-dev cmake tshark Step #1: ---> Running in 6ca2f902586f Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Get:5 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1270 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4399 kB] Step #1: Get:7 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [994 kB] Step #1: Get:8 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [3937 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main i386 Packages [1268 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1555 kB] Step #1: Fetched 13.7 MB in 2s (6011 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: build-essential is already the newest version (12.8ubuntu1.1). Step #1: The following additional packages will be installed: Step #1: autotools-dev cmake-data file libarchive13 libc-ares2 libcap2 libcap2-bin Step #1: libfl-dev libfl2 libglib2.0-0 libglib2.0-data libicu66 libjbig0 Step #1: libjpeg-turbo8 libjpeg8 libjsoncpp1 libltdl-dev libltdl7 liblua5.2-0 Step #1: libmagic-mgc libmagic1 libmaxminddb0 libnl-3-200 libnl-genl-3-200 libpam-cap Step #1: libpcap0.8 libpcre16-3 libpcre32-3 libpcrecpp0v5 libpython2-stdlib Step #1: libpython2.7-minimal libpython2.7-stdlib librhash0 libsbc1 libsigsegv2 Step #1: libsmi2ldbl libsnappy1v5 libspandsp2 libspeexdsp1 libssh-gcrypt-4 libtiff5 Step #1: libuv1 libwebp6 libwireshark-data libwireshark13 libwiretap10 libwsutil11 Step #1: libxml2 m4 mime-support python2 python2-minimal python2.7 python2.7-minimal Step #1: shared-mime-info wireshark-common xdg-user-dirs Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext bison-doc cmake-doc Step #1: ninja-build flex-doc lrzip libtool-doc mmdb-bin snmp-mibs-downloader Step #1: gfortran | fortran95-compiler gcj-jdk geoipupdate geoip-database Step #1: geoip-database-extra libjs-leaflet libjs-leaflet.markercluster wireshark-doc Step #1: m4-doc python2-doc python-tk python2.7-doc binfmt-support Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev bison cmake cmake-data file flex Step #1: libarchive13 libc-ares2 libcap2 libcap2-bin libfl-dev libfl2 libglib2.0-0 Step #1: libglib2.0-data libicu66 libjbig0 libjpeg-turbo8 libjpeg8 libjsoncpp1 Step #1: libltdl-dev libltdl7 liblua5.2-0 libmagic-mgc libmagic1 libmaxminddb0 Step #1: libnl-3-200 libnl-genl-3-200 libpam-cap libpcap0.8 libpcre16-3 libpcre3-dev Step #1: libpcre32-3 libpcrecpp0v5 libpython2-stdlib libpython2.7-minimal Step #1: libpython2.7-stdlib librhash0 libsbc1 libsigsegv2 libsmi2ldbl libsnappy1v5 Step #1: libspandsp2 libspeexdsp1 libssh-gcrypt-4 libtiff5 libtool libuv1 libwebp6 Step #1: libwireshark-data libwireshark13 libwiretap10 libwsutil11 libxml2 m4 Step #1: mime-support pkg-config python-is-python2 python2 python2-minimal python2.7 Step #1: python2.7-minimal shared-mime-info tshark wireshark-common xdg-user-dirs Step #1: zlib1g-dev Step #1: 0 upgraded, 68 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 43.5 MB of archives. Step #1: After this operation, 219 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 flex amd64 2.6.4-6.2 [317 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-minimal amd64 2.7.18-1~20.04.4 [335 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7-minimal amd64 2.7.18-1~20.04.4 [1280 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2-minimal amd64 2.7.17-2ubuntu4 [27.5 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-stdlib amd64 2.7.18-1~20.04.4 [1887 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7 amd64 2.7.18-1~20.04.4 [248 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/universe amd64 libpython2-stdlib amd64 2.7.17-2ubuntu4 [7072 B] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2 amd64 2.7.17-2ubuntu4 [26.5 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcap2 amd64 1:2.32-1ubuntu0.1 [15.8 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcap2-bin amd64 1:2.32-1ubuntu0.1 [26.2 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.7 [1289 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.7 [5944 B] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpam-cap amd64 1:2.32-1ubuntu0.1 [8364 B] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libmaxminddb0 amd64 1.4.2-0ubuntu1.20.04.1 [26.2 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal/main amd64 libpcap0.8 amd64 1.9.1-3 [128 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal/main amd64 bison amd64 2:3.5.1+dfsg-1 [657 kB] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.2 [327 kB] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 libfl2 amd64 2.6.4-6.2 [11.5 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal/main amd64 libfl-dev amd64 2.6.4-6.2 [6316 B] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjpeg-turbo8 amd64 2.0.3-0ubuntu1.20.04.3 [118 kB] Step #1: Get:39 http://archive.ubuntu.com/ubuntu focal/main amd64 libjpeg8 amd64 8c-2ubuntu8 [2194 B] Step #1: Get:40 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:41 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:42 http://archive.ubuntu.com/ubuntu focal/main amd64 liblua5.2-0 amd64 5.2.4-1.1build3 [106 kB] Step #1: Get:43 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libnl-3-200 amd64 3.4.0-1ubuntu0.1 [54.4 kB] Step #1: Get:44 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libnl-genl-3-200 amd64 3.4.0-1ubuntu0.1 [11.2 kB] Step #1: Get:45 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre16-3 amd64 2:8.39-12ubuntu0.1 [150 kB] Step #1: Get:46 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre32-3 amd64 2:8.39-12ubuntu0.1 [140 kB] Step #1: Get:47 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcrecpp0v5 amd64 2:8.39-12ubuntu0.1 [15.5 kB] Step #1: Get:48 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre3-dev amd64 2:8.39-12ubuntu0.1 [540 kB] Step #1: Get:49 http://archive.ubuntu.com/ubuntu focal/universe amd64 libsmi2ldbl amd64 0.4.8+dfsg2-16 [100 kB] Step #1: Get:50 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjbig0 amd64 2.1-3.1ubuntu0.20.04.1 [27.3 kB] Step #1: Get:51 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libwebp6 amd64 0.6.1-2ubuntu0.20.04.3 [185 kB] Step #1: Get:52 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libtiff5 amd64 4.1.0+git191117-2ubuntu0.20.04.13 [164 kB] Step #1: Get:53 http://archive.ubuntu.com/ubuntu focal/universe amd64 libspandsp2 amd64 0.0.6+dfsg-2 [272 kB] Step #1: Get:54 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libspeexdsp1 amd64 1.2~rc1.2-1.1ubuntu1.20.04.1 [40.4 kB] Step #1: Get:55 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libssh-gcrypt-4 amd64 0.9.3-2ubuntu2.5 [202 kB] Step #1: Get:56 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:57 http://archive.ubuntu.com/ubuntu focal/universe amd64 libwireshark-data all 3.2.3-1 [1456 kB] Step #1: Get:58 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libc-ares2 amd64 1.15.0-1ubuntu0.5 [36.9 kB] Step #1: Get:59 http://archive.ubuntu.com/ubuntu focal/main amd64 libsbc1 amd64 1.4-1 [31.9 kB] Step #1: Get:60 http://archive.ubuntu.com/ubuntu focal/main amd64 libsnappy1v5 amd64 1.1.8-1build1 [16.7 kB] Step #1: Get:61 http://archive.ubuntu.com/ubuntu focal/universe amd64 libwsutil11 amd64 3.2.3-1 [61.1 kB] Step #1: Get:62 http://archive.ubuntu.com/ubuntu focal/universe amd64 libwiretap10 amd64 3.2.3-1 [199 kB] Step #1: Get:63 http://archive.ubuntu.com/ubuntu focal/universe amd64 libwireshark13 amd64 3.2.3-1 [15.2 MB] Step #1: Get:64 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: Get:65 http://archive.ubuntu.com/ubuntu focal/universe amd64 python-is-python2 all 2.7.17-4 [2496 B] Step #1: Get:66 http://archive.ubuntu.com/ubuntu focal/universe amd64 wireshark-common amd64 3.2.3-1 [441 kB] Step #1: Get:67 http://archive.ubuntu.com/ubuntu focal/universe amd64 tshark amd64 3.2.3-1 [137 kB] Step #1: Get:68 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 43.5 MB in 3s (13.4 MB/s) Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../0-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../1-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package flex. Step #1: Preparing to unpack .../2-flex_2.6.4-6.2_amd64.deb ... Step #1: Unpacking flex (2.6.4-6.2) ... Step #1: Selecting previously unselected package libpython2.7-minimal:amd64. Step #1: Preparing to unpack .../3-libpython2.7-minimal_2.7.18-1~20.04.4_amd64.deb ... Step #1: Unpacking libpython2.7-minimal:amd64 (2.7.18-1~20.04.4) ... Step #1: Selecting previously unselected package python2.7-minimal. Step #1: Preparing to unpack .../4-python2.7-minimal_2.7.18-1~20.04.4_amd64.deb ... Step #1: Unpacking python2.7-minimal (2.7.18-1~20.04.4) ... Step #1: Selecting previously unselected package python2-minimal. Step #1: Preparing to unpack .../5-python2-minimal_2.7.17-2ubuntu4_amd64.deb ... Step #1: Unpacking python2-minimal (2.7.17-2ubuntu4) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../6-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libpython2.7-stdlib:amd64. Step #1: Preparing to unpack .../7-libpython2.7-stdlib_2.7.18-1~20.04.4_amd64.deb ... Step #1: Unpacking libpython2.7-stdlib:amd64 (2.7.18-1~20.04.4) ... Step #1: Selecting previously unselected package python2.7. Step #1: Preparing to unpack .../8-python2.7_2.7.18-1~20.04.4_amd64.deb ... Step #1: Unpacking python2.7 (2.7.18-1~20.04.4) ... Step #1: Selecting previously unselected package libpython2-stdlib:amd64. Step #1: Preparing to unpack .../9-libpython2-stdlib_2.7.17-2ubuntu4_amd64.deb ... Step #1: Unpacking libpython2-stdlib:amd64 (2.7.17-2ubuntu4) ... Step #1: Setting up libpython2.7-minimal:amd64 (2.7.18-1~20.04.4) ... Step #1: Setting up python2.7-minimal (2.7.18-1~20.04.4) ... Step #1: Setting up python2-minimal (2.7.17-2ubuntu4) ... Step #1: Selecting previously unselected package python2. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18300 files and directories currently installed.) Step #1: Preparing to unpack .../00-python2_2.7.17-2ubuntu4_amd64.deb ... Step #1: Unpacking python2 (2.7.17-2ubuntu4) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libcap2:amd64. Step #1: Preparing to unpack .../04-libcap2_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libcap2:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libcap2-bin. Step #1: Preparing to unpack .../05-libcap2-bin_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libcap2-bin (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../06-libglib2.0-0_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../07-libglib2.0-data_2.64.6-1~ubuntu20.04.7_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../08-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libpam-cap:amd64. Step #1: Preparing to unpack .../09-libpam-cap_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libpam-cap:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../10-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../11-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../12-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package libmaxminddb0:amd64. Step #1: Preparing to unpack .../13-libmaxminddb0_1.4.2-0ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking libmaxminddb0:amd64 (1.4.2-0ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libpcap0.8:amd64. Step #1: Preparing to unpack .../14-libpcap0.8_1.9.1-3_amd64.deb ... Step #1: Unpacking libpcap0.8:amd64 (1.9.1-3) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../15-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../16-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../17-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../18-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package bison. Step #1: Preparing to unpack .../19-bison_2%3a3.5.1+dfsg-1_amd64.deb ... Step #1: Unpacking bison (2:3.5.1+dfsg-1) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../20-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../21-libarchive13_3.4.0-2ubuntu1.2_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.2) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../22-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../23-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../24-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libfl2:amd64. Step #1: Preparing to unpack .../25-libfl2_2.6.4-6.2_amd64.deb ... Step #1: Unpacking libfl2:amd64 (2.6.4-6.2) ... Step #1: Selecting previously unselected package libfl-dev:amd64. Step #1: Preparing to unpack .../26-libfl-dev_2.6.4-6.2_amd64.deb ... Step #1: Unpacking libfl-dev:amd64 (2.6.4-6.2) ... Step #1: Selecting previously unselected package libjpeg-turbo8:amd64. Step #1: Preparing to unpack .../27-libjpeg-turbo8_2.0.3-0ubuntu1.20.04.3_amd64.deb ... Step #1: Unpacking libjpeg-turbo8:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #1: Selecting previously unselected package libjpeg8:amd64. Step #1: Preparing to unpack .../28-libjpeg8_8c-2ubuntu8_amd64.deb ... Step #1: Unpacking libjpeg8:amd64 (8c-2ubuntu8) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../29-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../30-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package liblua5.2-0:amd64. Step #1: Preparing to unpack .../31-liblua5.2-0_5.2.4-1.1build3_amd64.deb ... Step #1: Unpacking liblua5.2-0:amd64 (5.2.4-1.1build3) ... Step #1: Selecting previously unselected package libnl-3-200:amd64. Step #1: Preparing to unpack .../32-libnl-3-200_3.4.0-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libnl-3-200:amd64 (3.4.0-1ubuntu0.1) ... Step #1: Selecting previously unselected package libnl-genl-3-200:amd64. Step #1: Preparing to unpack .../33-libnl-genl-3-200_3.4.0-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libnl-genl-3-200:amd64 (3.4.0-1ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre16-3:amd64. Step #1: Preparing to unpack .../34-libpcre16-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre32-3:amd64. Step #1: Preparing to unpack .../35-libpcre32-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcrecpp0v5:amd64. Step #1: Preparing to unpack .../36-libpcrecpp0v5_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre3-dev:amd64. Step #1: Preparing to unpack .../37-libpcre3-dev_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libsmi2ldbl:amd64. Step #1: Preparing to unpack .../38-libsmi2ldbl_0.4.8+dfsg2-16_amd64.deb ... Step #1: Unpacking libsmi2ldbl:amd64 (0.4.8+dfsg2-16) ... Step #1: Selecting previously unselected package libjbig0:amd64. Step #1: Preparing to unpack .../39-libjbig0_2.1-3.1ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking libjbig0:amd64 (2.1-3.1ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libwebp6:amd64. Step #1: Preparing to unpack .../40-libwebp6_0.6.1-2ubuntu0.20.04.3_amd64.deb ... Step #1: Unpacking libwebp6:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Selecting previously unselected package libtiff5:amd64. Step #1: Preparing to unpack .../41-libtiff5_4.1.0+git191117-2ubuntu0.20.04.13_amd64.deb ... Step #1: Unpacking libtiff5:amd64 (4.1.0+git191117-2ubuntu0.20.04.13) ... Step #1: Selecting previously unselected package libspandsp2:amd64. Step #1: Preparing to unpack .../42-libspandsp2_0.0.6+dfsg-2_amd64.deb ... Step #1: Unpacking libspandsp2:amd64 (0.0.6+dfsg-2) ... Step #1: Selecting previously unselected package libspeexdsp1:amd64. Step #1: Preparing to unpack .../43-libspeexdsp1_1.2~rc1.2-1.1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking libspeexdsp1:amd64 (1.2~rc1.2-1.1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libssh-gcrypt-4:amd64. Step #1: Preparing to unpack .../44-libssh-gcrypt-4_0.9.3-2ubuntu2.5_amd64.deb ... Step #1: Unpacking libssh-gcrypt-4:amd64 (0.9.3-2ubuntu2.5) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../45-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package libwireshark-data. Step #1: Preparing to unpack .../46-libwireshark-data_3.2.3-1_all.deb ... Step #1: Unpacking libwireshark-data (3.2.3-1) ... Step #1: Selecting previously unselected package libc-ares2:amd64. Step #1: Preparing to unpack .../47-libc-ares2_1.15.0-1ubuntu0.5_amd64.deb ... Step #1: Unpacking libc-ares2:amd64 (1.15.0-1ubuntu0.5) ... Step #1: Selecting previously unselected package libsbc1:amd64. Step #1: Preparing to unpack .../48-libsbc1_1.4-1_amd64.deb ... Step #1: Unpacking libsbc1:amd64 (1.4-1) ... Step #1: Selecting previously unselected package libsnappy1v5:amd64. Step #1: Preparing to unpack .../49-libsnappy1v5_1.1.8-1build1_amd64.deb ... Step #1: Unpacking libsnappy1v5:amd64 (1.1.8-1build1) ... Step #1: Selecting previously unselected package libwsutil11:amd64. Step #1: Preparing to unpack .../50-libwsutil11_3.2.3-1_amd64.deb ... Step #1: Unpacking libwsutil11:amd64 (3.2.3-1) ... Step #1: Selecting previously unselected package libwiretap10:amd64. Step #1: Preparing to unpack .../51-libwiretap10_3.2.3-1_amd64.deb ... Step #1: Unpacking libwiretap10:amd64 (3.2.3-1) ... Step #1: Selecting previously unselected package libwireshark13:amd64. Step #1: Preparing to unpack .../52-libwireshark13_3.2.3-1_amd64.deb ... Step #1: Unpacking libwireshark13:amd64 (3.2.3-1) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../53-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Selecting previously unselected package python-is-python2. Step #1: Preparing to unpack .../54-python-is-python2_2.7.17-4_all.deb ... Step #1: Unpacking python-is-python2 (2.7.17-4) ... Step #1: Selecting previously unselected package wireshark-common. Step #1: Preparing to unpack .../55-wireshark-common_3.2.3-1_amd64.deb ... Step #1: Unpacking wireshark-common (3.2.3-1) ... Step #1: Selecting previously unselected package tshark. Step #1: Preparing to unpack .../56-tshark_3.2.3-1_amd64.deb ... Step #1: Unpacking tshark (3.2.3-1) ... Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: Preparing to unpack .../57-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libssh-gcrypt-4:amd64 (0.9.3-2ubuntu2.5) ... Step #1: Setting up libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libsbc1:amd64 (1.4-1) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libmaxminddb0:amd64 (1.4.2-0ubuntu1.20.04.1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up libc-ares2:amd64 (1.15.0-1ubuntu0.5) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up libwsutil11:amd64 (3.2.3-1) ... Step #1: Setting up libjbig0:amd64 (2.1-3.1ubuntu0.20.04.1) ... Step #1: Setting up libcap2:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Setting up libsnappy1v5:amd64 (1.1.8-1build1) ... Step #1: Setting up libpython2.7-stdlib:amd64 (2.7.18-1~20.04.4) ... Step #1: Setting up libcap2-bin (1:2.32-1ubuntu0.1) ... Step #1: Setting up libsmi2ldbl:amd64 (0.4.8+dfsg2-16) ... Step #1: Setting up libwiretap10:amd64 (3.2.3-1) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up libpcap0.8:amd64 (1.9.1-3) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libwebp6:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libfl2:amd64 (2.6.4-6.2) ... Step #1: Setting up libjpeg-turbo8:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libwireshark-data (3.2.3-1) ... Step #1: Setting up liblua5.2-0:amd64 (5.2.4-1.1build3) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up libspeexdsp1:amd64 (1.2~rc1.2-1.1ubuntu1.20.04.1) ... Step #1: Setting up libnl-3-200:amd64 (3.4.0-1ubuntu0.1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libpam-cap:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libjpeg8:amd64 (8c-2ubuntu8) ... Step #1: Setting up python2.7 (2.7.18-1~20.04.4) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up libpython2-stdlib:amd64 (2.7.17-2ubuntu4) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.2) ... Step #1: Setting up libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up python2 (2.7.17-2ubuntu4) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up libnl-genl-3-200:amd64 (3.4.0-1ubuntu0.1) ... Step #1: Setting up bison (2:3.5.1+dfsg-1) ... Step #1: update-alternatives: using /usr/bin/bison.yacc to provide /usr/bin/yacc (yacc) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/yacc.1.gz because associated file /usr/share/man/man1/bison.yacc.1.gz (of link group yacc) doesn't exist Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libtiff5:amd64 (4.1.0+git191117-2ubuntu0.20.04.13) ... Step #1: Setting up python-is-python2 (2.7.17-4) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up flex (2.6.4-6.2) ... Step #1: Setting up libfl-dev:amd64 (2.6.4-6.2) ... Step #1: Setting up libspandsp2:amd64 (0.0.6+dfsg-2) ... Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Setting up libwireshark13:amd64 (3.2.3-1) ... Step #1: Setting up wireshark-common (3.2.3-1) ... Step #1: Setting up tshark (3.2.3-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 6ca2f902586f Step #1: ---> b65a179949d9 Step #1: Step 3/21 : ADD https://github.com/PhilipHazel/pcre2/releases/download/pcre2-10.39/pcre2-10.39.tar.gz pcre2-10.39.tar.gz Step #1: Step #1: Step #1: ---> 06f2e65c7f03 Step #1: Step 4/21 : ADD https://www.tcpdump.org/release/libpcap-1.9.1.tar.gz libpcap-1.9.1.tar.gz Step #1: Step #1: ---> 90d43c0150fc Step #1: Step 5/21 : ADD https://github.com/akheron/jansson/releases/download/v2.14/jansson-2.14.tar.gz jansson-2.14.tar.gz Step #1: Step #1: Step #1: ---> 6fa9e3ab9561 Step #1: Step 6/21 : RUN git clone --depth=1 https://github.com/yaml/libyaml Step #1: ---> Running in a34ac388c8aa Step #1: Cloning into 'libyaml'... Step #1: Removing intermediate container a34ac388c8aa Step #1: ---> f3dc23a0e0c6 Step #1: Step 7/21 : ADD https://github.com/lz4/lz4/archive/v1.9.2.tar.gz lz4-1.9.2.tar.gz Step #1: Step #1: Step #1: ---> 36ccea6f4dd9 Step #1: Step 8/21 : RUN git clone --depth 1 https://github.com/catenacyber/quadfuzz.git Step #1: ---> Running in 16b44a95db29 Step #1: Cloning into 'quadfuzz'... Step #1: Removing intermediate container 16b44a95db29 Step #1: ---> 12200f31e995 Step #1: Step 9/21 : RUN git clone --depth 1 -b develop https://github.com/madler/zlib.git Step #1: ---> Running in c974d34db190 Step #1: Cloning into 'zlib'... Step #1: Removing intermediate container c974d34db190 Step #1: ---> 0e04c5e9ebaf Step #1: Step 10/21 : RUN git clone --depth=1 https://github.com/catenacyber/fuzzpcap Step #1: ---> Running in 1e5b5c94c94d Step #1: Cloning into 'fuzzpcap'... Step #1: Removing intermediate container 1e5b5c94c94d Step #1: ---> 5cba0202da9e Step #1: Step 11/21 : ADD https://rules.emergingthreats.net/open/suricata/emerging.rules.zip emerging.rules.zip Step #1: Step #1: Step #1: ---> a9c1ff8a7a1d Step #1: Step 12/21 : ENV RUSTUP_TOOLCHAIN nightly Step #1: ---> Running in 436b946f2fc0 Step #1: Removing intermediate container 436b946f2fc0 Step #1: ---> cd8cd1fbae84 Step #1: Step 13/21 : RUN cargo install --force cbindgen Step #1: ---> Running in 95056a5f080d Step #1: info: syncing channel updates for 'nightly-x86_64-unknown-linux-gnu' Step #1: info: latest update on 2024-09-09, rust version 1.83.0-nightly (adf8d168a 2024-09-08) Step #1: info: downloading component 'cargo' Step #1: info: downloading component 'clippy' Step #1: info: downloading component 'rust-docs' Step #1: info: downloading component 'rust-std' Step #1: info: downloading component 'rustc' Step #1: info: downloading component 'rustfmt' Step #1: info: installing component 'cargo' Step #1: info: installing component 'clippy' Step #1: info: installing component 'rust-docs' Step #1: info: installing component 'rust-std' Step #1: info: installing component 'rustc' Step #1: info: installing component 'rustfmt' Step #1:  Updating crates.io index Step #1:  Downloading crates ... Step #1:  Downloaded cbindgen v0.27.0 Step #1:  Installing cbindgen v0.27.0 Step #1:  Updating crates.io index Step #1:  Locking 52 packages to latest compatible versions Step #1:  Adding heck v0.4.1 (latest: v0.5.0) Step #1:  Adding linux-raw-sys v0.4.14 (latest: v0.6.5) Step #1:  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #1:  Downloading crates ... Step #1:  Downloaded anstyle v1.0.8 Step #1:  Downloaded anstream v0.6.15 Step #1:  Downloaded cfg-if v1.0.0 Step #1:  Downloaded anstyle-query v1.1.1 Step #1:  Downloaded bitflags v2.6.0 Step #1:  Downloaded equivalent v1.0.1 Step #1:  Downloaded toml_datetime v0.6.8 Step #1:  Downloaded itoa v1.0.11 Step #1:  Downloaded strsim v0.11.1 Step #1:  Downloaded utf8parse v0.2.2 Step #1:  Downloaded clap_lex v0.7.2 Step #1:  Downloaded is_terminal_polyfill v1.70.1 Step #1:  Downloaded heck v0.4.1 Step #1:  Downloaded tempfile v3.12.0 Step #1:  Downloaded unicode-ident v1.0.12 Step #1:  Downloaded serde_derive v1.0.210 Step #1:  Downloaded toml v0.8.19 Step #1:  Downloaded indexmap v2.5.0 Step #1:  Downloaded toml_edit v0.22.20 Step #1:  Downloaded hashbrown v0.14.5 Step #1:  Downloaded winnow v0.6.18 Step #1:  Downloaded serde_json v1.0.128 Step #1:  Downloaded clap_builder v4.5.17 Step #1:  Downloaded memchr v2.7.4 Step #1:  Downloaded serde v1.0.210 Step #1:  Downloaded ryu v1.0.18 Step #1:  Downloaded syn v2.0.77 Step #1:  Downloaded log v0.4.22 Step #1:  Downloaded quote v1.0.37 Step #1:  Downloaded proc-macro2 v1.0.86 Step #1:  Downloaded clap v4.5.17 Step #1:  Downloaded once_cell v1.19.0 Step #1:  Downloaded fastrand v2.1.1 Step #1:  Downloaded rustix v0.38.36 Step #1:  Downloaded serde_spanned v0.6.7 Step #1:  Downloaded errno v0.3.9 Step #1:  Downloaded colorchoice v1.0.2 Step #1:  Downloaded anstyle-parse v0.2.5 Step #1:  Downloaded libc v0.2.158 Step #1:  Downloaded linux-raw-sys v0.4.14 Step #1:  Compiling proc-macro2 v1.0.86 Step #1: Compiling unicode-ident v1.0.12 Step #1: Compiling serde v1.0.210 Step #1:  Compiling utf8parse v0.2.2 Step #1: Compiling colorchoice v1.0.2 Step #1:  Compiling hashbrown v0.14.5 Step #1: Compiling rustix v0.38.36 Step #1: Compiling anstyle-query v1.1.1 Step #1: Compiling anstyle v1.0.8 Step #1:  Compiling is_terminal_polyfill v1.70.1 Step #1:  Compiling equivalent v1.0.1 Step #1:  Compiling clap_lex v0.7.2 Step #1:  Compiling linux-raw-sys v0.4.14 Step #1:  Compiling winnow v0.6.18 Step #1:  Compiling strsim v0.11.1 Step #1:  Compiling bitflags v2.6.0 Step #1:  Compiling serde_json v1.0.128 Step #1:  Compiling cbindgen v0.27.0 Step #1:  Compiling itoa v1.0.11 Step #1:  Compiling memchr v2.7.4 Step #1:  Compiling fastrand v2.1.1 Step #1:  Compiling once_cell v1.19.0 Step #1:  Compiling ryu v1.0.18 Step #1: Compiling cfg-if v1.0.0 Step #1:  Compiling heck v0.4.1 Step #1:  Compiling log v0.4.22 Step #1:  Compiling anstyle-parse v0.2.5 Step #1:  Compiling anstream v0.6.15 Step #1:  Compiling clap_builder v4.5.17 Step #1:  Compiling quote v1.0.37 Step #1:  Compiling indexmap v2.5.0 Step #1:  Compiling syn v2.0.77 Step #1:  Compiling tempfile v3.12.0 Step #1:  Compiling clap v4.5.17 Step #1:  Compiling serde_derive v1.0.210 Step #1:  Compiling serde_spanned v0.6.7 Step #1: Compiling toml_datetime v0.6.8 Step #1:  Compiling toml_edit v0.22.20 Step #1:  Compiling toml v0.8.19 Step #1:  Finished `release` profile [optimized] target(s) in 31.45s Step #1:  Installing /rust/bin/cbindgen Step #1:  Installed package `cbindgen v0.27.0` (executable `cbindgen`) Step #1: Removing intermediate container 95056a5f080d Step #1: ---> d0f68ae0711e Step #1: Step 14/21 : ENV RUSTUP_TOOLCHAIN nightly-2024-02-12 Step #1: ---> Running in c86e1b51ab33 Step #1: Removing intermediate container c86e1b51ab33 Step #1: ---> 4c37d3048cdc Step #1: Step 15/21 : RUN git clone --depth 1 https://github.com/OISF/suricata.git suricata Step #1: ---> Running in fa5c51bad033 Step #1: Cloning into 'suricata'... Step #1: Removing intermediate container fa5c51bad033 Step #1: ---> 6781908fd423 Step #1: Step 16/21 : RUN git clone --depth 1 --branch master-6.0.x https://github.com/OISF/suricata.git suricata6 Step #1: ---> Running in 2baf15ce911e Step #1: Cloning into 'suricata6'... Step #1: Removing intermediate container 2baf15ce911e Step #1: ---> 677cbd5c9c75 Step #1: Step 17/21 : RUN git clone --depth 1 --branch main-7.0.x https://github.com/OISF/suricata.git suricata7 Step #1: ---> Running in f33011005ac7 Step #1: Cloning into 'suricata7'... Step #1: Removing intermediate container f33011005ac7 Step #1: ---> 9e5b782f1a21 Step #1: Step 18/21 : RUN git clone --depth 1 https://github.com/OISF/libhtp.git libhtp Step #1: ---> Running in c31b34ebb32d Step #1: Cloning into 'libhtp'... Step #1: Removing intermediate container c31b34ebb32d Step #1: ---> 2b52a848936f Step #1: Step 19/21 : RUN git clone --depth 1 https://github.com/OISF/suricata-verify suricata-verify Step #1: ---> Running in 7893490a352f Step #1: Cloning into 'suricata-verify'... Step #1: Updating files: 74% (4850/6488) Updating files: 75% (4866/6488) Updating files: 76% (4931/6488) Updating files: 77% (4996/6488) Updating files: 78% (5061/6488) Updating files: 79% (5126/6488) Updating files: 80% (5191/6488) Updating files: 81% (5256/6488) Updating files: 82% (5321/6488) Updating files: 83% (5386/6488) Updating files: 84% (5450/6488) Updating files: 85% (5515/6488) Updating files: 86% (5580/6488) Updating files: 87% (5645/6488) Updating files: 88% (5710/6488) Updating files: 89% (5775/6488) Updating files: 90% (5840/6488) Updating files: 91% (5905/6488) Updating files: 92% (5969/6488) Updating files: 93% (6034/6488) Updating files: 94% (6099/6488) Updating files: 95% (6164/6488) Updating files: 96% (6229/6488) Updating files: 97% (6294/6488) Updating files: 98% (6359/6488) Updating files: 99% (6424/6488) Updating files: 100% (6488/6488) Updating files: 100% (6488/6488), done. Step #1: Removing intermediate container 7893490a352f Step #1: ---> b96043e788d4 Step #1: Step 20/21 : WORKDIR $SRC Step #1: ---> Running in acee7cb0e1f5 Step #1: Removing intermediate container acee7cb0e1f5 Step #1: ---> 88324e451c87 Step #1: Step 21/21 : COPY build.sh $SRC/ Step #1: ---> 0152e4950e4b Step #1: Successfully built 0152e4950e4b Step #1: Successfully tagged gcr.io/oss-fuzz/suricata:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/suricata Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filetPHEUL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/suricata-verify/.git Step #2 - "srcmap": + GIT_DIR=/src/suricata-verify Step #2 - "srcmap": + cd /src/suricata-verify Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/OISF/suricata-verify Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=218af4c1a548ada869b7af8187980858a2f00235 Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/suricata-verify" = { type: "git", url: "https://github.com/OISF/suricata-verify", rev: "218af4c1a548ada869b7af8187980858a2f00235" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file8iWK6c Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/suricata-verify" = { type: "git", url: "https://github.com/OISF/suricata-verify", rev: "218af4c1a548ada869b7af8187980858a2f00235" }' Step #2 - "srcmap": + mv /tmp/file8iWK6c /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libhtp/.git Step #2 - "srcmap": + GIT_DIR=/src/libhtp Step #2 - "srcmap": + cd /src/libhtp Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/OISF/libhtp.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ce25f9ebc17590356ca79851c0bd7d7fd287da53 Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/libhtp" = { type: "git", url: "https://github.com/OISF/libhtp.git", rev: "ce25f9ebc17590356ca79851c0bd7d7fd287da53" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filegEB0IH Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/libhtp" = { type: "git", url: "https://github.com/OISF/libhtp.git", rev: "ce25f9ebc17590356ca79851c0bd7d7fd287da53" }' Step #2 - "srcmap": + mv /tmp/filegEB0IH /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/suricata7/.git Step #2 - "srcmap": + GIT_DIR=/src/suricata7 Step #2 - "srcmap": + cd /src/suricata7 Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/OISF/suricata.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=0f3a37acaad7c3bb28ed3e24af70fb3757092136 Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/suricata7" = { type: "git", url: "https://github.com/OISF/suricata.git", rev: "0f3a37acaad7c3bb28ed3e24af70fb3757092136" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file48SHih Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/suricata7" = { type: "git", url: "https://github.com/OISF/suricata.git", rev: "0f3a37acaad7c3bb28ed3e24af70fb3757092136" }' Step #2 - "srcmap": + mv /tmp/file48SHih /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/suricata6/.git Step #2 - "srcmap": + GIT_DIR=/src/suricata6 Step #2 - "srcmap": + cd /src/suricata6 Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/OISF/suricata.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=56541c7c37d0de3f4c7eaafc19118ad837bbbc3d Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/suricata6" = { type: "git", url: "https://github.com/OISF/suricata.git", rev: "56541c7c37d0de3f4c7eaafc19118ad837bbbc3d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filejKBcJK Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/suricata6" = { type: "git", url: "https://github.com/OISF/suricata.git", rev: "56541c7c37d0de3f4c7eaafc19118ad837bbbc3d" }' Step #2 - "srcmap": + mv /tmp/filejKBcJK /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/suricata/.git Step #2 - "srcmap": + GIT_DIR=/src/suricata Step #2 - "srcmap": + cd /src/suricata Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/OISF/suricata.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=685baa9680c98acb4cdf35b77186600d6f582b8b Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/suricata" = { type: "git", url: "https://github.com/OISF/suricata.git", rev: "685baa9680c98acb4cdf35b77186600d6f582b8b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileUWhsXg Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/suricata" = { type: "git", url: "https://github.com/OISF/suricata.git", rev: "685baa9680c98acb4cdf35b77186600d6f582b8b" }' Step #2 - "srcmap": + mv /tmp/fileUWhsXg /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/fuzzpcap/.git Step #2 - "srcmap": + GIT_DIR=/src/fuzzpcap Step #2 - "srcmap": + cd /src/fuzzpcap Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/catenacyber/fuzzpcap Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=185c08feae72c8b4e5b2b2beab7bd69717ff0e84 Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/fuzzpcap" = { type: "git", url: "https://github.com/catenacyber/fuzzpcap", rev: "185c08feae72c8b4e5b2b2beab7bd69717ff0e84" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file4y77CO Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/fuzzpcap" = { type: "git", url: "https://github.com/catenacyber/fuzzpcap", rev: "185c08feae72c8b4e5b2b2beab7bd69717ff0e84" }' Step #2 - "srcmap": + mv /tmp/file4y77CO /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/zlib/.git Step #2 - "srcmap": + GIT_DIR=/src/zlib Step #2 - "srcmap": + cd /src/zlib Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/madler/zlib.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d476828316d05d54c6fd6a068b121b30c147b5cd Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/zlib" = { type: "git", url: "https://github.com/madler/zlib.git", rev: "d476828316d05d54c6fd6a068b121b30c147b5cd" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filehzHHpo Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/zlib" = { type: "git", url: "https://github.com/madler/zlib.git", rev: "d476828316d05d54c6fd6a068b121b30c147b5cd" }' Step #2 - "srcmap": + mv /tmp/filehzHHpo /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/quadfuzz/.git Step #2 - "srcmap": + GIT_DIR=/src/quadfuzz Step #2 - "srcmap": + cd /src/quadfuzz Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/catenacyber/quadfuzz.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=83b7a8eff832485fbeb7670cf6134af470b7e915 Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/quadfuzz" = { type: "git", url: "https://github.com/catenacyber/quadfuzz.git", rev: "83b7a8eff832485fbeb7670cf6134af470b7e915" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filewFSqgV Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/quadfuzz" = { type: "git", url: "https://github.com/catenacyber/quadfuzz.git", rev: "83b7a8eff832485fbeb7670cf6134af470b7e915" }' Step #2 - "srcmap": + mv /tmp/filewFSqgV /tmp/filetPHEUL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libyaml/.git Step #2 - "srcmap": + GIT_DIR=/src/libyaml Step #2 - "srcmap": + cd /src/libyaml Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/yaml/libyaml Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=840b65c40675e2d06bf40405ad3f12dec7f35923 Step #2 - "srcmap": + jq_inplace /tmp/filetPHEUL '."/src/libyaml" = { type: "git", url: "https://github.com/yaml/libyaml", rev: "840b65c40675e2d06bf40405ad3f12dec7f35923" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileZ1Xmvr Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + jq '."/src/libyaml" = { type: "git", url: "https://github.com/yaml/libyaml", rev: "840b65c40675e2d06bf40405ad3f12dec7f35923" }' Step #2 - "srcmap": + mv /tmp/fileZ1Xmvr /tmp/filetPHEUL Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filetPHEUL Step #2 - "srcmap": + rm /tmp/filetPHEUL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/suricata-verify": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/OISF/suricata-verify", Step #2 - "srcmap": "rev": "218af4c1a548ada869b7af8187980858a2f00235" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/libhtp": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/OISF/libhtp.git", Step #2 - "srcmap": "rev": "ce25f9ebc17590356ca79851c0bd7d7fd287da53" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/suricata7": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/OISF/suricata.git", Step #2 - "srcmap": "rev": "0f3a37acaad7c3bb28ed3e24af70fb3757092136" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/suricata6": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/OISF/suricata.git", Step #2 - "srcmap": "rev": "56541c7c37d0de3f4c7eaafc19118ad837bbbc3d" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/suricata": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/OISF/suricata.git", Step #2 - "srcmap": "rev": "685baa9680c98acb4cdf35b77186600d6f582b8b" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/fuzzpcap": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/catenacyber/fuzzpcap", Step #2 - "srcmap": "rev": "185c08feae72c8b4e5b2b2beab7bd69717ff0e84" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/zlib": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/madler/zlib.git", Step #2 - "srcmap": "rev": "d476828316d05d54c6fd6a068b121b30c147b5cd" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/quadfuzz": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/catenacyber/quadfuzz.git", Step #2 - "srcmap": "rev": "83b7a8eff832485fbeb7670cf6134af470b7e915" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/libyaml": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/yaml/libyaml", Step #2 - "srcmap": "rev": "840b65c40675e2d06bf40405ad3f12dec7f35923" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = memory ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -xvzf pcre2-10.39.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/LICENCE Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/PrepareRelease Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/RunTest.bat Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/132html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/compile Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/depcomp Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/config.sub Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/libpcre2-16.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/README Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/FindReadline.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/FindEditline.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/FindPackageHandleStandardArgs.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/pcre2-config-version.cmake.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/pcre2-config.cmake.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/cmake/COPYING-CMAKE-SCRIPTS Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/aclocal.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/config.guess Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/configure Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/CleanTxt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/install-sh Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/RunGrepTest.bat Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/pcre2-config.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/ltsugar.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/libtool.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/ltversion.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/ltoptions.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/pcre2_visibility.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/ax_pthread.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/m4/lt~obsolete.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/COPYING Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/INSTALL Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/ChangeLog Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/libpcre2-posix.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/HACKING Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/test-driver Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/missing Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/configure.ac Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/ar-lib Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/config-cmake.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput21 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput24 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput2 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutputEBC Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput18 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/greplist Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput21 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput25 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput3A Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput20 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepoutput8 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput16 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput17 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput23 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-16-4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepoutputCN Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput8 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput7 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-8-3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepinput3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput22-32 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput13 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput15 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/wintestoutput3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput10 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput14-8 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput1 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput5 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepoutputN Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-32-4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput24 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput9 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-32-3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput10 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput16 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput25 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput3B Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput15 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput13 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testbtables Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-8-2 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput12-16 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepbinary Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepinputx Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/greppatN4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput5 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput19 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-16-3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput6 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput23 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput7 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput18 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-8-4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput22-8 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput22 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepinputM Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepoutputC Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput9 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput20 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput6 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/valgrind-jit.supp Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput12 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepinput8 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput14-16 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepfilelist Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput2 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepinputv Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepoutput Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput11 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput12-32 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput4 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/grepinput Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-32-2 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput8-16-2 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/wintestinput3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinputEBC Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput14-32 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput14 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput22-16 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput11-32 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput1 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testinput19 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput11-16 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/testdata/testoutput17 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/RunTest Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2posix.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_intmodedep.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_find_bracket.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_jit_compile.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_newline.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2posix.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_substitute.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_match_data.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_tables.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_ucp.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_jit_simd_inc.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_config.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_jit_test.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2demo.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_serialize.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_compile.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_chartables.c.dist Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_jit_match.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_study.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_script_run.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_xclass.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_dfa_match.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_valid_utf.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_substring.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_ord2utf.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_jit_neon_inc.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2.h.generic Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_extuni.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeSPARC_common.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitConfig.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeMIPS_64.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitUtils.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeARM_T2_32.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativePPC_64.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeARM_64.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeMIPS_common.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeMIPS_32.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeS390X.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeX86_common.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeARM_32.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeSPARC_32.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitLir.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitWXExecAllocator.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitLir.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeX86_32.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativePPC_32.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitExecAllocator.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitProtExecAllocator.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativeX86_64.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitNativePPC_common.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/sljit/sljitConfigInternal.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_jit_misc.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/config.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_auto_possess.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_pattern_info.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_fuzzsupport.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_maketables.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_printint.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_string_utils.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_ucd.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2test.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_convert.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_internal.h Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_context.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2grep.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_error.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_match.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/config.h.generic Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/src/pcre2_dftables.c Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/perltest.sh Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/AUTHORS Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/Detrail Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/NON-AUTOTOOLS-BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/ltmain.sh Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/NEWS Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_maketables_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_get_error_message.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_jit_compile.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_character_tables.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2demo.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match_data_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_maketables.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2limits.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_heap_limit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_glob_escape.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_length_byname.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2partial.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_substitute_callout.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2syntax.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_general_context_copy.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_general_context_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_parens_nest_limit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_config.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_jit_stack_create.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2-config.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2api.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_general_context_create.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match_data_create.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_get_match_data_size.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2grep.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_serialize_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_code_copy.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_pattern_convert.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_compile_extra_options.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_nametable_scan.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match_context_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2-config.1 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2sample.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2posix.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_get_ovector_count.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2convert.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_callout_enumerate.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_compile.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/ Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2test.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2pattern.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_nametable_scan.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_jit_stack_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/index.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_get_byname.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_compile_recursion_guard.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_convert_context_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_jit_compile.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_heap_limit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2unicode.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2syntax.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_get_error_message.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_number_from_name.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_jit_stack_assign.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_parens_nest_limit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_code_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2convert.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2matching.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_get_ovector_count.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2sample.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_maketables.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2jit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match_context_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_config.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_compile_context_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_pattern_info.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substitute.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_substitute_callout.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2-config.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_recursion_memory_management.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_serialize_encode.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_serialize_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_recursion_limit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_serialize_get_number_of_codes.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_pattern_convert.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_offset_limit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_get_startchar.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2grep.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2build.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_jit_match.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_callout_enumerate.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_copy_bynumber.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_convert_context_copy.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_compile.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match_context_create.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match_data_create.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_general_context_create.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2serialize.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_list_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match_data_create_from_pattern.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_length_byname.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_compile_context_create.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_compile_context_copy.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_convert_context_create.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_max_pattern_length.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_length_bynumber.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_general_context_copy.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2limits.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2callout.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2posix.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_converted_pattern_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/README.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_general_context_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_depth_limit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_glob_escape.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_compile_extra_options.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_jit_free_unused_memory.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_jit_stack_create.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_maketables_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2api.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2demo.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_glob_separator.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_copy_byname.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_serialize_decode.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/NON-AUTOTOOLS-BUILD.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2compat.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_bsr.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match_context_copy.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_match_data_free.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_character_tables.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2partial.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_newline.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_get_match_data_size.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_match_limit.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_code_copy.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_set_callout.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_get_ovector_pointer.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2perform.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_list_get.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_dfa_match.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_code_copy_with_tables.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_get_mark.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/html/pcre2_substring_get_bynumber.html Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2jit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_serialize_decode.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match_context_create.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2serialize.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2perform.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_list_get.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_depth_limit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_match_limit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/index.html.src Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_serialize_get_number_of_codes.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2callout.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match_context_copy.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_bsr.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_list_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_dfa_match.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_compile_context_create.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_convert_context_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_compile_context_copy.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_code_copy_with_tables.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2grep.1 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_convert_context_create.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substitute.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_compile_recursion_guard.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2test.1 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_converted_pattern_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_number_from_name.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_newline.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_glob_separator.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2matching.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_max_pattern_length.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_match_data_create_from_pattern.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_recursion_limit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2test.txt Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_pattern_info.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_compile_context_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_jit_free_unused_memory.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2unicode.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_recursion_memory_management.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_jit_stack_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_convert_context_copy.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_jit_stack_assign.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_code_free.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_get_byname.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_get_startchar.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_get_mark.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_callout.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_get_bynumber.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2compat.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_jit_match.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_get_ovector_pointer.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_copy_bynumber.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2pattern.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_copy_byname.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_set_offset_limit.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_serialize_encode.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2_substring_length_bynumber.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/doc/pcre2build.3 Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/libpcre2-8.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/RunGrepTest Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/CheckMan Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39/libpcre2-32.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": + cd pcre2-10.39 Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --disable-shared Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a race-free mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the compiler supports GNU C... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to enable C11 features... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdio.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for wchar.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for minix/config.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether it is safe to define __EXTENSIONS__... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether _XOPEN_SOURCE should be defined... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking the archiver (ar) interface... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int64_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the -Werror option is usable... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for simple visibility declarations... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for __attribute__((uninitialized))... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dirent.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for windows.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/wait.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for an ANSI C-conforming const... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bcopy... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memfd_create... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memmove... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mkostemp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for realpath... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for secure_getenv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strerror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for zlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gzopen in -lz... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bzlib.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libbz2... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether Intel CET is enabled... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libpcre2-8.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libpcre2-16.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libpcre2-32.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libpcre2-posix.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcre2-config Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/pcre2.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing script-chmod commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing delete-old-chartables commands Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": pcre2-10.39 configuration summary: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Install prefix ..................... : /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": C preprocessor ..................... : Step #3 - "compile-libfuzzer-coverage-x86_64": C compiler ......................... : clang Step #3 - "compile-libfuzzer-coverage-x86_64": Linker ............................. : /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": C preprocessor flags ............... : Step #3 - "compile-libfuzzer-coverage-x86_64": C compiler flags ................... : -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fvisibility=hidden Step #3 - "compile-libfuzzer-coverage-x86_64": Linker flags ....................... : Step #3 - "compile-libfuzzer-coverage-x86_64": Extra libraries .................... : Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Build 8-bit pcre2 library .......... : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Build 16-bit pcre2 library ......... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Build 32-bit pcre2 library ......... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Include debugging code ............. : no Step #3 - "compile-libfuzzer-coverage-x86_64": Enable JIT compiling support ....... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Use SELinux allocator in JIT ....... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Enable Unicode support ............. : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Newline char/sequence .............. : lf Step #3 - "compile-libfuzzer-coverage-x86_64": \R matches only ANYCRLF ............ : no Step #3 - "compile-libfuzzer-coverage-x86_64": \C is disabled ..................... : no Step #3 - "compile-libfuzzer-coverage-x86_64": EBCDIC coding ...................... : no Step #3 - "compile-libfuzzer-coverage-x86_64": EBCDIC code for NL ................. : n/a Step #3 - "compile-libfuzzer-coverage-x86_64": Rebuild char tables ................ : no Step #3 - "compile-libfuzzer-coverage-x86_64": Internal link size ................. : 2 Step #3 - "compile-libfuzzer-coverage-x86_64": Nested parentheses limit ........... : 250 Step #3 - "compile-libfuzzer-coverage-x86_64": Heap limit ......................... : 20000000 kibibytes Step #3 - "compile-libfuzzer-coverage-x86_64": Match limit ........................ : 10000000 Step #3 - "compile-libfuzzer-coverage-x86_64": Match depth limit .................. : MATCH_LIMIT Step #3 - "compile-libfuzzer-coverage-x86_64": Build shared libs .................. : no Step #3 - "compile-libfuzzer-coverage-x86_64": Build static libs .................. : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Use JIT in pcre2grep ............... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Enable callouts in pcre2grep ....... : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Enable fork in pcre2grep callouts .. : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Initial buffer size for pcre2grep .. : 20480 Step #3 - "compile-libfuzzer-coverage-x86_64": Maximum buffer size for pcre2grep .. : 1048576 Step #3 - "compile-libfuzzer-coverage-x86_64": Link pcre2grep with libz ........... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Link pcre2grep with libbz2 ......... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Link pcre2test with libedit ........ : no Step #3 - "compile-libfuzzer-coverage-x86_64": Link pcre2test with libreadline .... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Valgrind support ................... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Code coverage ...................... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Fuzzer support ..................... : no Step #3 - "compile-libfuzzer-coverage-x86_64": Use %zu and %td .................... : auto Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 clean Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "src/pcre2_chartables.c testSinput test3input test3output test3outputA test3outputB testtry teststdout teststderr teststderrgrep testtemp1grep testtemp2grep testtrygrep testNinputgrep" || rm -f src/pcre2_chartables.c testSinput test3input test3output test3outputA test3outputB testtry teststdout teststderr teststderrgrep testtemp1grep testtemp2grep testtrygrep testNinputgrep Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "libpcre2-8.la libpcre2-posix.la" || rm -f libpcre2-8.la libpcre2-posix.la Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf .libs _libs Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "" || rm -f Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcre2grep pcre2test Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f *.o Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "RunTest.log RunGrepTest.log" || rm -f RunTest.log RunGrepTest.log Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f *.lo Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f Step #3 - "compile-libfuzzer-coverage-x86_64": rm -rf src/.libs src/_libs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f src/*.o Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "RunTest.trs RunGrepTest.trs" || rm -f RunTest.trs RunGrepTest.trs Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f src/*.lo Step #3 - "compile-libfuzzer-coverage-x86_64": test -z "test-suite.log" || rm -f test-suite.log Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f ./so_locations Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 all Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f src/pcre2_chartables.c Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s /src/pcre2-10.39/src/pcre2_chartables.c.dist /src/pcre2-10.39/src/pcre2_chartables.c Step #3 - "compile-libfuzzer-coverage-x86_64": make all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/pcre2-10.39' Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/pcre2grep-pcre2grep.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_auto_possess.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_compile.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_config.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_context.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_convert.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_dfa_match.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_error.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_extuni.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_find_bracket.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_jit_compile.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_maketables.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_match.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_newline.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_match_data.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_ord2utf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_pattern_info.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_serialize.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_script_run.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_string_utils.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_study.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_substitute.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_substring.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_ucd.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_tables.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_valid_utf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_xclass.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_8_la-pcre2_chartables.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/pcre2test-pcre2test.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libpcre2_posix_la-pcre2posix.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libpcre2-8.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libpcre2-posix.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pcre2grep Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pcre2test Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/pcre2-10.39' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 install Step #3 - "compile-libfuzzer-coverage-x86_64": make install-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/pcre2-10.39' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/pcre2-10.39' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/doc/pcre2' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c pcre2-config '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 AUTHORS COPYING ChangeLog LICENCE NEWS README doc/pcre2.txt doc/pcre2-config.txt doc/pcre2grep.txt doc/pcre2test.txt '/usr/local/share/doc/pcre2' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/doc/pcre2/html' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 src/pcre2posix.h '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/man/man1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/html/NON-AUTOTOOLS-BUILD.txt doc/html/README.txt doc/html/index.html doc/html/pcre2-config.html doc/html/pcre2.html doc/html/pcre2_callout_enumerate.html doc/html/pcre2_code_copy.html doc/html/pcre2_code_copy_with_tables.html doc/html/pcre2_code_free.html doc/html/pcre2_compile.html doc/html/pcre2_compile_context_copy.html doc/html/pcre2_compile_context_create.html doc/html/pcre2_compile_context_free.html doc/html/pcre2_config.html doc/html/pcre2_convert_context_copy.html doc/html/pcre2_convert_context_create.html doc/html/pcre2_convert_context_free.html doc/html/pcre2_converted_pattern_free.html doc/html/pcre2_dfa_match.html doc/html/pcre2_general_context_copy.html doc/html/pcre2_general_context_create.html doc/html/pcre2_general_context_free.html doc/html/pcre2_get_error_message.html doc/html/pcre2_get_mark.html doc/html/pcre2_get_match_data_size.html doc/html/pcre2_get_ovector_count.html doc/html/pcre2_get_ovector_pointer.html doc/html/pcre2_get_startchar.html doc/html/pcre2_jit_compile.html doc/html/pcre2_jit_free_unused_memory.html doc/html/pcre2_jit_match.html doc/html/pcre2_jit_stack_assign.html doc/html/pcre2_jit_stack_create.html doc/html/pcre2_jit_stack_free.html doc/html/pcre2_maketables.html doc/html/pcre2_maketables_free.html doc/html/pcre2_match.html doc/html/pcre2_match_context_copy.html doc/html/pcre2_match_context_create.html doc/html/pcre2_match_context_free.html '/usr/local/share/doc/pcre2/html' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/man/man3' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 libpcre2-8.pc libpcre2-posix.pc '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 src/pcre2.h '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c libpcre2-8.la libpcre2-posix.la '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/html/pcre2_match_data_create.html doc/html/pcre2_match_data_create_from_pattern.html doc/html/pcre2_match_data_free.html doc/html/pcre2_pattern_convert.html doc/html/pcre2_pattern_info.html doc/html/pcre2_serialize_decode.html doc/html/pcre2_serialize_encode.html doc/html/pcre2_serialize_free.html doc/html/pcre2_serialize_get_number_of_codes.html doc/html/pcre2_set_bsr.html doc/html/pcre2_set_callout.html doc/html/pcre2_set_character_tables.html doc/html/pcre2_set_compile_extra_options.html doc/html/pcre2_set_compile_recursion_guard.html doc/html/pcre2_set_depth_limit.html doc/html/pcre2_set_glob_escape.html doc/html/pcre2_set_glob_separator.html doc/html/pcre2_set_heap_limit.html doc/html/pcre2_set_match_limit.html doc/html/pcre2_set_max_pattern_length.html doc/html/pcre2_set_offset_limit.html doc/html/pcre2_set_newline.html doc/html/pcre2_set_parens_nest_limit.html doc/html/pcre2_set_recursion_limit.html doc/html/pcre2_set_recursion_memory_management.html doc/html/pcre2_set_substitute_callout.html doc/html/pcre2_substitute.html doc/html/pcre2_substring_copy_byname.html doc/html/pcre2_substring_copy_bynumber.html doc/html/pcre2_substring_free.html doc/html/pcre2_substring_get_byname.html doc/html/pcre2_substring_get_bynumber.html doc/html/pcre2_substring_length_byname.html doc/html/pcre2_substring_length_bynumber.html doc/html/pcre2_substring_list_free.html doc/html/pcre2_substring_list_get.html doc/html/pcre2_substring_nametable_scan.html doc/html/pcre2_substring_number_from_name.html doc/html/pcre2api.html doc/html/pcre2build.html '/usr/local/share/doc/pcre2/html' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/pcre2-config.1 doc/pcre2grep.1 doc/pcre2test.1 '/usr/local/share/man/man1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/html/pcre2callout.html doc/html/pcre2compat.html doc/html/pcre2convert.html doc/html/pcre2demo.html doc/html/pcre2grep.html doc/html/pcre2jit.html doc/html/pcre2limits.html doc/html/pcre2matching.html doc/html/pcre2partial.html doc/html/pcre2pattern.html doc/html/pcre2perform.html doc/html/pcre2posix.html doc/html/pcre2sample.html doc/html/pcre2serialize.html doc/html/pcre2syntax.html doc/html/pcre2test.html doc/html/pcre2unicode.html '/usr/local/share/doc/pcre2/html' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/pcre2.3 doc/pcre2_callout_enumerate.3 doc/pcre2_code_copy.3 doc/pcre2_code_copy_with_tables.3 doc/pcre2_code_free.3 doc/pcre2_compile.3 doc/pcre2_compile_context_copy.3 doc/pcre2_compile_context_create.3 doc/pcre2_compile_context_free.3 doc/pcre2_config.3 doc/pcre2_convert_context_copy.3 doc/pcre2_convert_context_create.3 doc/pcre2_convert_context_free.3 doc/pcre2_converted_pattern_free.3 doc/pcre2_dfa_match.3 doc/pcre2_general_context_copy.3 doc/pcre2_general_context_create.3 doc/pcre2_general_context_free.3 doc/pcre2_get_error_message.3 doc/pcre2_get_mark.3 doc/pcre2_get_match_data_size.3 doc/pcre2_get_ovector_count.3 doc/pcre2_get_ovector_pointer.3 doc/pcre2_get_startchar.3 doc/pcre2_jit_compile.3 doc/pcre2_jit_free_unused_memory.3 doc/pcre2_jit_match.3 doc/pcre2_jit_stack_assign.3 doc/pcre2_jit_stack_create.3 doc/pcre2_jit_stack_free.3 doc/pcre2_maketables.3 doc/pcre2_maketables_free.3 doc/pcre2_match.3 doc/pcre2_match_context_copy.3 doc/pcre2_match_context_create.3 doc/pcre2_match_context_free.3 doc/pcre2_match_data_create.3 doc/pcre2_match_data_create_from_pattern.3 doc/pcre2_match_data_free.3 doc/pcre2_pattern_convert.3 '/usr/local/share/man/man3' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/pcre2_pattern_info.3 doc/pcre2_serialize_decode.3 doc/pcre2_serialize_encode.3 doc/pcre2_serialize_free.3 doc/pcre2_serialize_get_number_of_codes.3 doc/pcre2_set_bsr.3 doc/pcre2_set_callout.3 doc/pcre2_set_character_tables.3 doc/pcre2_set_compile_extra_options.3 doc/pcre2_set_compile_recursion_guard.3 doc/pcre2_set_depth_limit.3 doc/pcre2_set_glob_escape.3 doc/pcre2_set_glob_separator.3 doc/pcre2_set_heap_limit.3 doc/pcre2_set_match_limit.3 doc/pcre2_set_max_pattern_length.3 doc/pcre2_set_offset_limit.3 doc/pcre2_set_newline.3 doc/pcre2_set_parens_nest_limit.3 doc/pcre2_set_recursion_limit.3 doc/pcre2_set_recursion_memory_management.3 doc/pcre2_set_substitute_callout.3 doc/pcre2_substitute.3 doc/pcre2_substring_copy_byname.3 doc/pcre2_substring_copy_bynumber.3 doc/pcre2_substring_free.3 doc/pcre2_substring_get_byname.3 doc/pcre2_substring_get_bynumber.3 doc/pcre2_substring_length_byname.3 doc/pcre2_substring_length_bynumber.3 doc/pcre2_substring_list_free.3 doc/pcre2_substring_list_get.3 doc/pcre2_substring_nametable_scan.3 doc/pcre2_substring_number_from_name.3 doc/pcre2api.3 doc/pcre2build.3 doc/pcre2callout.3 doc/pcre2compat.3 doc/pcre2convert.3 doc/pcre2demo.3 '/usr/local/share/man/man3' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/pcre2jit.3 doc/pcre2limits.3 doc/pcre2matching.3 doc/pcre2partial.3 doc/pcre2pattern.3 doc/pcre2perform.3 doc/pcre2posix.3 doc/pcre2sample.3 doc/pcre2serialize.3 doc/pcre2syntax.3 doc/pcre2unicode.3 '/usr/local/share/man/man3' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libpcre2-8.lai /usr/local/lib/libpcre2-8.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libpcre2-posix.lai /usr/local/lib/libpcre2-posix.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libpcre2-8.a /usr/local/lib/libpcre2-8.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libpcre2-8.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /usr/local/lib/libpcre2-8.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libpcre2-posix.a /usr/local/lib/libpcre2-posix.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libpcre2-posix.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /usr/local/lib/libpcre2-posix.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/rust/bin:/sbin" ldconfig -n /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c pcre2grep pcre2test '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pcre2grep /usr/local/bin/pcre2grep Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pcre2test /usr/local/bin/pcre2test Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/pcre2-10.39' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/pcre2-10.39' Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -xvzf lz4-1.9.2.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.circleci/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.circleci/config.yml Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.circleci/images/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.circleci/images/primary/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.circleci/images/primary/Dockerfile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.gitattributes Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/.travis.yml Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/INSTALL Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/Makefile.inc Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/NEWS Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/appveyor.yml Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/cmake_unofficial/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/cmake_unofficial/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/cmake_unofficial/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/changelog Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/compat Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/control Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/copyright Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/dirs Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/docs Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/liblz4-dev.install Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/liblz4.install Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/debian/rules Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/djgpp/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/djgpp/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/djgpp/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/djgpp/README.MD Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/gen_manual/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/gen_manual/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/gen_manual/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/gen_manual/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/gen_manual/gen-lz4-manual.sh Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/gen_manual/gen_manual.cpp Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/GetLz4LibraryVersion.py Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/InstallSymlink.py Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/contrib/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/contrib/gen_manual/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/contrib/gen_manual/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/contrib/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/examples/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/examples/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/lib/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/meson_options.txt Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/programs/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/programs/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/tests/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/meson/tests/meson.build Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/snap/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/snap/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/contrib/snap/snapcraft.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/doc/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/doc/lz4_Block_format.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/doc/lz4_Frame_format.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/doc/lz4_manual.html Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/doc/lz4frame_manual.html Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/COPYING Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/HCStreaming_ringBuffer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/blockStreaming_doubleBuffer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/blockStreaming_doubleBuffer.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/blockStreaming_lineByLine.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/blockStreaming_lineByLine.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/blockStreaming_ringBuffer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/compress_functions.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/dictionaryRandomAccess.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/dictionaryRandomAccess.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/frameCompress.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/printVersion.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/simple_buffer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/examples/streaming_api_basics.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/dll/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/dll/example/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/dll/example/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/dll/example/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/dll/example/fullbench-dll.sln Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/dll/example/fullbench-dll.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/liblz4-dll.rc.in Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/liblz4.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4frame.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4frame.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4frame_static.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4hc.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/lz4hc.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/xxhash.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/lib/xxhash.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/compress_frame_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/compress_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/compress_hc_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/decompress_frame_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/decompress_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/fuzz.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/fuzz_helpers.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/lz4_helpers.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/lz4_helpers.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/ossfuzz.sh Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/round_trip_frame_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/round_trip_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/round_trip_hc_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/round_trip_stream_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/standaloneengine.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/ossfuzz/travisoss.sh Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/COPYING Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/bench.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/bench.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/datagen.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/datagen.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/lz4-exe.rc.in Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/lz4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/lz4.1.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/lz4cli.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/lz4io.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/lz4io.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/platform.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/programs/util.h Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/COPYING Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/checkFrame.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/checkTag.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/datagencli.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/frametest.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/fullbench.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/roundTripTest.c Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/test-lz4-list.py Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/test-lz4-speed.py Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/test-lz4-versions.py Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/test_custom_block_sizes.sh Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/tests/test_install.sh Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/.gitignore Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/datagen/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/datagen/datagen.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/frametest/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/frametest/frametest.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/fullbench-dll/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/fullbench-dll/fullbench-dll.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/fullbench/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/fullbench/fullbench.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/fuzzer/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/fuzzer/fuzzer.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/liblz4-dll/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/liblz4-dll/liblz4-dll.rc Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/liblz4-dll/liblz4-dll.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/liblz4/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/liblz4/liblz4.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/lz4.sln Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/lz4/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/lz4/lz4.rc Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2010/lz4/lz4.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/datagen/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/datagen/datagen.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/frametest/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/frametest/frametest.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/fullbench-dll/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/fullbench-dll/fullbench-dll.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/fullbench/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/fullbench/fullbench.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/fuzzer/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/fuzzer/fuzzer.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/liblz4-dll/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/liblz4-dll/liblz4-dll.rc Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/liblz4-dll/liblz4-dll.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/liblz4/ Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/liblz4/liblz4.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": lz4-1.9.2/visual/VS2017/lz4.sln Step #3 - "compile-libfuzzer-coverage-x86_64": + cd lz4-1.9.2 Step #3 - "compile-libfuzzer-coverage-x86_64": + make liblz4.a Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/lz4-1.9.2/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": compiling static library Step #3 - "compile-libfuzzer-coverage-x86_64": lz4.c:608:20: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] Step #3 - "compile-libfuzzer-coverage-x86_64": 608 | int LZ4_sizeofState() { return LZ4_STREAMSIZE; } Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  void Step #3 - "compile-libfuzzer-coverage-x86_64": lz4.c:2377:26: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] Step #3 - "compile-libfuzzer-coverage-x86_64": 2377 | int LZ4_sizeofStreamState() { return LZ4_STREAMSIZE; } Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  void Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/lz4-1.9.2/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp lib/liblz4.a /usr/local/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp lib/lz4.h lib/lz4frame.h lib/lz4frame_static.h lib/lz4hc.h /usr/local/include/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd .. Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -xvzf jansson-2.14.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test-driver Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/missing Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/depcomp Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/install-sh Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/config.guess Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/jansson.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/aclocal.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/hashtable.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/dump.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/jansson_private.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/version.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/lookup3.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/jansson.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/value.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/hashtable.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/utf.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/memory.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/pack_unpack.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/error.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/strbuffer.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/utf.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/load.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/strbuffer.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/jansson.def Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/jansson_config.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/strconv.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/hashtable_seed.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/src/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/run-suites Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ossfuzz/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ossfuzz/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ossfuzz/json_load_dump_fuzzer.cc Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ossfuzz/testinput.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ossfuzz/standaloneengine.cc Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/ossfuzz/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-string/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-string/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/garbage-at-the-end/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/garbage-at-the-end/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/garbage-at-the-end/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-in-unterminated-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-in-unterminated-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-in-unterminated-array/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-in-unterminated-array/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-truncated-at-e/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-truncated-at-e/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-truncated-at-e/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/extra-comma-in-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/extra-comma-in-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/extra-comma-in-array/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-negative-real/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-negative-real/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-negative-real/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-empty-key/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-empty-key/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-empty-key/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-empty-key/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-object-key/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-object-key/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-object-key/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/ascii-unicode-identifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/ascii-unicode-identifier/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/ascii-unicode-identifier/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-garbage-at-end/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-garbage-at-end/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-garbage-at-end/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/too-big-negative-integer/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/too-big-negative-integer/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/too-big-negative-integer/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-negative-integer/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-negative-integer/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-negative-integer/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-outside-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-outside-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-outside-string/nostrip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-outside-string/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/minus-sign-without-number/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/minus-sign-without-number/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/minus-sign-without-number/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-escape/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-escape/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-escape/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-comma/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-comma/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-comma/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unicode-identifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unicode-identifier/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unicode-identifier/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/integer-starting-with-zero/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/integer-starting-with-zero/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/integer-starting-with-zero/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/too-big-positive-integer/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/too-big-positive-integer/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/too-big-positive-integer/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/garbage-after-newline/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/garbage-after-newline/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/garbage-after-newline/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/extra-comma-in-multiline-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/extra-comma-in-multiline-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/extra-comma-in-multiline-array/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-apostrophes/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-apostrophes/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-apostrophes/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-value/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-value/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-value/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-value/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-garbage-after-e/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-garbage-after-e/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-garbage-after-e/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-positive-overflow/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-positive-overflow/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-positive-overflow/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-unicode-escape/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-unicode-escape/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-unicode-escape/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/tab-character-in-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/tab-character-in-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/tab-character-in-string/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-colon/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-colon/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-colon/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-no-colon/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/run Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-second-surrogate/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-second-surrogate/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-second-surrogate/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/truncated-unicode-surrogate/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/truncated-unicode-surrogate/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/truncated-unicode-surrogate/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-string/nostrip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-byte-in-string/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/recursion-depth/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/recursion-depth/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/recursion-depth/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/empty/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/empty/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/empty/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/apostrophe/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/apostrophe/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/apostrophe/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-unterminated-value/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-unterminated-value/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-unterminated-value/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/object-unterminated-value/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-escape-in-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-escape-in-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/null-escape-in-string/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array-and-object/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array-and-object/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array-and-object/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-array-and-object/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-truncated-at-point/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-truncated-at-point/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-truncated-at-point/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-brace/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-brace/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-brace/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-brace/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-one-comma/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-one-comma/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-one-comma/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/bracket-one-comma/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/brace-comma/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/brace-comma/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/brace-comma/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/negative-integer-starting-with-zero/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/negative-integer-starting-with-zero/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/negative-integer-starting-with-zero/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-negative-overflow/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-negative-overflow/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/real-negative-overflow/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-identifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-identifier/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/invalid-identifier/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-bracket/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-bracket/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-bracket/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-open-bracket/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-object-and-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-object-and-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-object-and-array/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-key/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-key/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-key/error.normal Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/unterminated-key/error.strip Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-second-surrogate/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-second-surrogate/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid/lone-second-surrogate/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-escape/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-escape/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-escape/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-string/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-array/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-after-backslash/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-after-backslash/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-after-backslash/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/lone-invalid-utf-8/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/lone-invalid-utf-8/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/lone-invalid-utf-8/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-real-after-e/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-real-after-e/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-real-after-e/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-exponent/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-bigger-int/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-bigger-int/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-bigger-int/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-int/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-int/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-int/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/truncated-utf-8/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/truncated-utf-8/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/truncated-utf-8/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/lone-utf-8-continuation-byte/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/lone-utf-8-continuation-byte/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/lone-utf-8-continuation-byte/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-4-byte-encoding/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-4-byte-encoding/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-4-byte-encoding/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/run Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-3-byte-encoding/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-3-byte-encoding/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-3-byte-encoding/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-identifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-identifier/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/invalid-utf-8-in-identifier/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-ascii-encoding/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-ascii-encoding/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/overlong-ascii-encoding/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/encoded-surrogate-half/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/encoded-surrogate-half/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/encoded-surrogate-half/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/restricted-utf-8/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/restricted-utf-8/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/restricted-utf-8/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/not-in-unicode-range/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/not-in-unicode-range/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/invalid-unicode/not-in-unicode-range/error Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/three-byte-utf-8/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/three-byte-utf-8/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/three-byte-utf-8/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/string-escapes/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/string-escapes/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/string-escapes/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/two-byte-utf-8/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/two-byte-utf-8/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/two-byte-utf-8/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/null/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/null/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/null/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/false/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/false/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/false/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-int/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-int/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-int/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-positive-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-positive-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-positive-exponent/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-object/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-object/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-object/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/utf-surrogate-four-byte-encoding/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/utf-surrogate-four-byte-encoding/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/utf-surrogate-four-byte-encoding/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-one/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-one/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-one/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/true/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/true/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/true/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e-positive-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e-positive-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e-positive-exponent/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/utf-8-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/utf-8-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/utf-8-string/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/one-byte-utf-8/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/one-byte-utf-8/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/one-byte-utf-8/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-array/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-ascii-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-ascii-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-ascii-string/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/escaped-utf-control-char/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/escaped-utf-control-char/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/escaped-utf-control-char/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-0/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-0/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-0/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-exponent/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-real/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-real/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-real/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-string/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/run Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-1/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-1/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-1/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e-negative-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e-negative-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e-negative-exponent/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-underflow/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-underflow/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-underflow/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-123/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-123/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/simple-int-123/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/complex-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/complex-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/complex-array/env Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/complex-array/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-fraction-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-fraction-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-fraction-exponent/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-subnormal-number/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-subnormal-number/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-subnormal-number/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-capital-e/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-zero/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-zero/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/negative-zero/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-negative-exponent/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-negative-exponent/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/real-negative-exponent/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-object/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-object/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-object/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/short-string/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/short-string/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/short-string/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-object-in-array/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-object-in-array/input Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/valid/empty-object-in-array/output Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_memory_funcs.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_simple.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_equal.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_unpack.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_object.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_dump.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_load_callback.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_version.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_chaos.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/run Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_load.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_sprintf.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_loadb.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_copy.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/check-exports Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_pack.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_fixed_size.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/util.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_dump_callback.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_number.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/test_array.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/api/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/suites/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/bin/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/bin/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/bin/json_process.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/bin/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/scripts/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/scripts/valgrind.sh Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/scripts/run-tests.sh Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/test/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/compile Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/android/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/android/jansson_config.h Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/README.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/configure Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/jansson_private_config.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/jansson_config.h.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/CheckFunctionKeywords.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/janssonConfig.cmake.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/FindSphinx.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/CodeCoverage.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/cmake/jansson_private_config.h.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/github_commits.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/ext/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/ext/refcounting.py Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/conformance.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/threadsafety.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/upgrading.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/Makefile.am Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/README Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/tutorial.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/conf.py Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/gettingstarted.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/changes.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/apiref.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/index.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/doc/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/scripts/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/scripts/clang-format Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/scripts/clang-format-check Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/CHANGES Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/ltmain.sh Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/config.sub Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/examples/ Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/examples/README.rst Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/examples/simple_parse.c Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/configure.ac Step #3 - "compile-libfuzzer-coverage-x86_64": jansson-2.14/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": + cd jansson-2.14 Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --disable-shared Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a race-free mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the compiler supports GNU C... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to enable C11 features... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the compiler supports GNU C++... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to enable C++11 features... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang++... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdio.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking for endian.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fcntl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for locale.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sched.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/param.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int32_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint32_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint16_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint8_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unsigned long long int... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for long long int... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inline... inline Step #3 - "compile-libfuzzer-coverage-x86_64": checking for close... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getpid... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gettimeofday... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for localeconv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for open... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for read... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sched_yield... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strtoll... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc __sync builtins... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc __atomic builtins... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for -Bsymbolic-functions linker flag... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang options needed to detect all undeclared functions... -fno-builtin Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether __GLIBC__ is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for -Wno-format-truncation... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating jansson.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/jansson_config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating test/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating test/bin/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating test/ossfuzz/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating test/suites/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating test/suites/api/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating jansson_private_config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": make all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/src' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT dump.lo -MD -MP -MF .deps/dump.Tpo -c -o dump.lo dump.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT error.lo -MD -MP -MF .deps/error.Tpo -c -o error.lo error.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT hashtable.lo -MD -MP -MF .deps/hashtable.Tpo -c -o hashtable.lo hashtable.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT hashtable_seed.lo -MD -MP -MF .deps/hashtable_seed.Tpo -c -o hashtable_seed.lo hashtable_seed.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT load.lo -MD -MP -MF .deps/load.Tpo -c -o load.lo load.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT memory.lo -MD -MP -MF .deps/memory.Tpo -c -o memory.lo memory.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT pack_unpack.lo -MD -MP -MF .deps/pack_unpack.Tpo -c -o pack_unpack.lo pack_unpack.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT strbuffer.lo -MD -MP -MF .deps/strbuffer.Tpo -c -o strbuffer.lo strbuffer.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT strconv.lo -MD -MP -MF .deps/strconv.Tpo -c -o strconv.lo strconv.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT utf.lo -MD -MP -MF .deps/utf.Tpo -c -o utf.lo utf.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT value.lo -MD -MP -MF .deps/value.Tpo -c -o value.lo value.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT version.lo -MD -MP -MF .deps/version.Tpo -c -o version.lo version.c Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT dump.lo -MD -MP -MF .deps/dump.Tpo -c dump.c -o dump.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT hashtable.lo -MD -MP -MF .deps/hashtable.Tpo -c hashtable.c -o hashtable.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT load.lo -MD -MP -MF .deps/load.Tpo -c load.c -o load.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT error.lo -MD -MP -MF .deps/error.Tpo -c error.c -o error.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT pack_unpack.lo -MD -MP -MF .deps/pack_unpack.Tpo -c pack_unpack.c -o pack_unpack.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT strbuffer.lo -MD -MP -MF .deps/strbuffer.Tpo -c strbuffer.c -o strbuffer.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT value.lo -MD -MP -MF .deps/value.Tpo -c value.c -o value.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT version.lo -MD -MP -MF .deps/version.Tpo -c version.c -o version.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT memory.lo -MD -MP -MF .deps/memory.Tpo -c memory.c -o memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT strconv.lo -MD -MP -MF .deps/strconv.Tpo -c strconv.c -o strconv.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT hashtable_seed.lo -MD -MP -MF .deps/hashtable_seed.Tpo -c hashtable_seed.c -o hashtable_seed.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT utf.lo -MD -MP -MF .deps/utf.Tpo -c utf.c -o utf.o Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/version.Tpo .deps/version.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/error.Tpo .deps/error.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/memory.Tpo .deps/memory.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/strbuffer.Tpo .deps/strbuffer.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/utf.Tpo .deps/utf.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/hashtable_seed.Tpo .deps/hashtable_seed.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/strconv.Tpo .deps/strconv.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/dump.Tpo .deps/dump.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/hashtable.Tpo .deps/hashtable.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/pack_unpack.Tpo .deps/pack_unpack.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/load.Tpo .deps/load.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/value.Tpo .deps/value.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -Wall -Wextra -Wdeclaration-after-statement -Wshadow -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -no-undefined -export-symbols-regex '^json_|^jansson_' -version-info 18:0:14 -Wl,--default-symver -o libjansson.la -rpath /usr/local/lib dump.lo error.lo hashtable.lo hashtable_seed.lo load.lo memory.lo pack_unpack.lo strbuffer.lo strconv.lo utf.lo value.lo version.lo Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/libjansson.a dump.o error.o hashtable.o hashtable_seed.o load.o memory.o pack_unpack.o strbuffer.o strconv.o utf.o value.o version.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/libjansson.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libjansson.la" && ln -s "../libjansson.la" "libjansson.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in test Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in bin Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in suites Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in api Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Entering directory '/src/jansson-2.14/test/suites/api' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Leaving directory '/src/jansson-2.14/test/suites/api' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Entering directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Leaving directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in ossfuzz Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/ossfuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/ossfuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/jansson-2.14/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/jansson-2.14/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/jansson-2.14/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/src' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --mode=install /usr/bin/install -c libjansson.la '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libjansson.lai /usr/local/lib/libjansson.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libjansson.a /usr/local/lib/libjansson.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libjansson.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /usr/local/lib/libjansson.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/rust/bin:/sbin" ldconfig -n /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 jansson.h '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 jansson_config.h '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/jansson-2.14/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in test Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in bin Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/test/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/test/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in suites Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in api Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/suites/api' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Entering directory '/src/jansson-2.14/test/suites/api' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Leaving directory '/src/jansson-2.14/test/suites/api' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/suites/api' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Entering directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Leaving directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/test/suites' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in ossfuzz Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/test/ossfuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test/ossfuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test/ossfuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/test/ossfuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/jansson-2.14/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 jansson.pc '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/jansson-2.14' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd .. Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -xvzf libpcap-1.9.1.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_snaplen.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-rdmasniff.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ftmacros.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/VERSION Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-savefile.manfile.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-snf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/nlpid.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dbus.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_next_ex.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/makefile Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/pktdrvr.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/pkt_rx0.asm Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/makefile.wc Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/bin2c.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/readme.dos Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/makefile.dj Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/pkt_rx1.s Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/msdos/pktdrvr.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-bpf.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/CONTRIBUTING.md Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_dump_file.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_findalldevs.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/varattrs.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/optimize.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dos.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/nametoaddr.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-null.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_close.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_get_selectable_fd.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-bt-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_immediate_mode.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_timeout.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/fad-getad.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_dump_open.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_breakloop.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_tstamp_type.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-aix7.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-hpux11.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-solaris2.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-sunos4.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-osf5.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-aix4.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-osf4.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/lbl/os-ultrix4.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_dump.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_fileno.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_open_dead.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/libpcap.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sf-pcap.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_datalink_name_to_val.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-snoop.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_lib_version.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_protocol_linux.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/config.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-rpcap.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-snf.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-bt-monitor-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dos.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_get_tstamp_precision.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/README.md Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-sita.html Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_statustostr.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/mkdep Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_open_live.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/grammar.y Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_file.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sockutils.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/DLT_ALLOCATE_HOWTO.md Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.tru64 Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.septel Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.Win32.md Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.macos Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.aix Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.sita Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.dag Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.hpux Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/doc/README.linux.md Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_activate.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/org.tcpdump.chmod_bpf.plist Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_can_set_rfmon.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/bpf_dump.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_promisc.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/nametoaddr.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-sita.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dag.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-config.1 Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ieee80211.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-namedb.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_offline_filter.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/fad-gifc.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/configure Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/capturetest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/can_set_rfmon_test.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/threadsignaltest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/opentest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/selpolltest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/unix.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/valgrindtest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/reactivatetest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/findalldevstest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/testprogs/filtertest.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/usb.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/compiler-tests.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/pcap-inttypes.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/namedb.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/pcap.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/bpf.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/vlan.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/ipnet.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/funcattrs.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/socket.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/nflog.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/can_socketcan.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/bluetooth.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/sll.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap/dlt.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-netfilter-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/portability.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-int.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/llc.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-rpcap-int.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-filter.manmisc.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sf-pcapng.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/atmuni31.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_tstamp_type_name_to_val.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-bt-linux.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcap-protocol.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-bt-monitor-linux.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_setdirection.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcap-protocol.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ethertype.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_compile.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-usb-linux.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dbus.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/fmtutils.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-pf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/tests/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/tests/shb-option-too-long.pcapng Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/etherent.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_rfmon.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/chmod_bpf Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_tstamp_precision.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/bpf_filter.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_create.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dag.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/gencode.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sf-pcapng.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-septel.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-npf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-linktype.manmisc.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/CHANGES Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_datalink.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/INSTALL.md Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ChmodBPF/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ChmodBPF/StartupParameters.plist Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ChmodBPF/ChmodBPF Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-sita.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/config.guess Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/have_siocglifconf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/FindFseeko.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/FindDAG.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/FindTC.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/FindLFS.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/FindSNF.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake/Modules/FindPacket.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/nomkdep Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/fmtutils.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_datalink.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sf-pcap.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/arcnet.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_open_offline.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-common.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_freecode.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_is_swapped.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_strerror.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_snapshot.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_tstamp_type_val_to_name.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/aclocal.m4 Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_dump_ftell.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dll.rc Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmakeconfig.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_setfilter.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_datalink_val_to_name.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_loop.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_inject.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-types.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/install-sh Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-netmap.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_stats.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_list_tstamp_types.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/scanner.l Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-libdlpi.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-tc.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-tc.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_lookupnet.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-netfilter-linux.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/strtok_r.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/win_asprintf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/snprintf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/win_snprintf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/getopt.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/strlcat.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/asprintf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/getopt.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/missing/strlcpy.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-dlpi.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Win32/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Win32/Prj/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Win32/Prj/wpcap.vcxproj Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Win32/Prj/wpcap.sln Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Win32/Prj/wpcap.vcxproj.filters Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_dump_close.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_dump_flush.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/fad-glifc.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-netmap.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_major_version.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/config.sub Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-enet.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_setnonblock.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/TODO Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-new.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/bpf_image.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sunatmpos.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-usb-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/extract.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/ppp.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/dlpisubs.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-rpcap.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/gencode.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-common.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/optimize.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/configure.ac Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-nit.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/sockutils.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_set_buffer_size.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_lookupdev.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_list_datalinks.3pcap.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-snit.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-rdmasniff.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/savefile.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_get_required_select_timeout.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/diag-control.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-bpf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/cmake_uninstall.cmake.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-config.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/CREDITS Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/ Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/log.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/org.tcpdump.rpcapd.plist Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd-config.manfile.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/log.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/win32-svc.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/fileconf.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/win32-svc.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.rc Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/Makefile.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/fileconf.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.xinetd.conf Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.socket Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/daemon.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/config_params.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.manadmin.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd.inetd.conf Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/daemon.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/rpcapd/rpcapd@.service Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap_geterr.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-tstamp.manmisc.in Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/pcap-septel.c Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/dlpisubs.h Step #3 - "compile-libfuzzer-coverage-x86_64": libpcap-1.9.1/Makefile-devel-adds Step #3 - "compile-libfuzzer-coverage-x86_64": + cd libpcap-1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --disable-shared Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking target system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C99... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the compiler supports the -fvisibility=hidden option... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inline... inline Step #3 - "compile-libfuzzer-coverage-x86_64": checking for special C compiler options needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _LARGEFILE_SOURCE value needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioccom.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioccom.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/ioccom.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/sockio.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/sockio.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/sockio.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netpacket/packet.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netpacket/packet.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netpacket/packet.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/pfvar.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/sockios.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/if_bonding.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI ioctl definitions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strerror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strerror_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether strerror_r is GNU-style... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vsyslog... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vsnprintf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for snprintf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vasprintf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for asprintf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcat... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcpy... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strtok_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ffs... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ffs is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getaddrinfo... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing putmsg... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether getnetbyname_r is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for the Linux getnetbyname_r()... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether getprotobyname_r is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for the Linux getprotobyname_r()... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ether_hostton... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ether_hostton is declared... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ether_hostton is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking pthread.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking pthread.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_create... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if --disable-protochain option is specified... enabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/bpf.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/bpf.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/bpf.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/pfilt.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/pfilt.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/pfilt.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/enet.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/enet.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/enet.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/nit.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/nit.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/nit.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/net/nit.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/net/nit.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/net/nit.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/socket.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/socket.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/socket.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/raw.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/raw.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/raw.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/dlpi.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/dlpi.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/dlpi.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking packet capture type... linux Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/wireless.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for nl_socket_alloc in -lnl-3... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for nl_socket_alloc in -lnl... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for nl_handle_alloc in -lnl... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/ethtool.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct tpacket_stats... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct tpacket_auxdata.tp_vlan_tci... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getifaddrs... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking ifaddrs.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking ifaddrs.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ifaddrs.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/net_tstamp.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/net_tstamp.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/net_tstamp.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for socklen_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dagapi.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking dagapi.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dagapi.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we have Septel API headers... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we have Myricom Sniffer API... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether TurboCap is supported... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to enable remote packet capture... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build optimizer debugging code... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build parser debugging code... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for flex... flex Step #3 - "compile-libfuzzer-coverage-x86_64": checking lex output file root... lex.yy Step #3 - "compile-libfuzzer-coverage-x86_64": checking lex library... -lfl Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether yytext is a pointer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for capable lex... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bison... bison -y Step #3 - "compile-libfuzzer-coverage-x86_64": checking for capable yacc/bison... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr.sa_len... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr_storage... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dl_hp_ppa_info_t.dl_module_id_1... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if unaligned accesses fail... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for USB sniffing support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Device for USB sniffing is /dev/usbmon Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/compiler.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/compiler.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/compiler.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/usbdevice_fs.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/usbdevice_fs.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/usbdevice_fs.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct usbdevfs_ctrltransfer.bRequestType... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the platform could support netfilter sniffing... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we can compile the netfilter support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we can compile the netmap support... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking bluetooth/bluetooth.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking bluetooth/bluetooth.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bluetooth/bluetooth.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Bluetooth sniffing is not supported; install bluez-lib devel to enable it Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking for D-Bus... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ibv_get_device_list in -libverbs... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap-filter.manmisc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap-linktype.manmisc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap-tstamp.manmisc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap-savefile.manfile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_compile.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_datalink.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_dump_open.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_get_tstamp_precision.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_list_datalinks.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_list_tstamp_types.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_open_dead.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_open_offline.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_set_immediate_mode.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_set_tstamp_precision.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap_set_tstamp_type.3pcap Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rpcapd/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rpcapd/rpcapd.manadmin Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rpcapd/rpcapd-config.manfile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating testprogs/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing default-1 commands Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./pcap-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./pcap-usb-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./pcap-netfilter-linux.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./fad-getad.c Step #3 - "compile-libfuzzer-coverage-x86_64": bison -y -p pcap_ -o grammar.c -d grammar.y Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./pcap.c Step #3 - "compile-libfuzzer-coverage-x86_64": flex -P pcap_ --header-file=scanner.h --nounput -o scanner.c scanner.l Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:4.1-12: warning: POSIX Yacc does not support %pure-parser [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 4 | %pure-parser Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:4.1-12: warning: deprecated directive: '%pure-parser', use '%define api.pure' [-Wdeprecated] Step #3 - "compile-libfuzzer-coverage-x86_64": 4 | %pure-parser Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": | %define api.pure Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./optimize.c Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:349.13-14: warning: POSIX yacc reserves %type to nonterminals [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 349 | %type ID EID AID Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~ Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:349.16-18: warning: POSIX yacc reserves %type to nonterminals [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 349 | %type ID EID AID Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~~ Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:349.20-22: warning: POSIX yacc reserves %type to nonterminals [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 349 | %type ID EID AID Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~~ Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:350.13-15: warning: POSIX yacc reserves %type to nonterminals [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 350 | %type HID HID6 Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~~ Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:350.17-20: warning: POSIX yacc reserves %type to nonterminals [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 350 | %type HID HID6 Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./nametoaddr.c Step #3 - "compile-libfuzzer-coverage-x86_64": ~~ Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y:351.13-15: warning: POSIX yacc reserves %type to nonterminals [-Wyacc] Step #3 - "compile-libfuzzer-coverage-x86_64": 351 | %type NUM action reason type subtype type_subtype dir Step #3 - "compile-libfuzzer-coverage-x86_64": | ^~~ Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./etherent.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./fmtutils.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./savefile.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./sf-pcap.c Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y: warning: 38 shift/reduce conflicts [-Wconflicts-sr] Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./sf-pcapng.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./pcap-common.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./bpf_image.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./bpf_filter.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o strlcat.o -c ./missing/strlcat.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./bpf_dump.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o strlcpy.o -c ./missing/strlcpy.c Step #3 - "compile-libfuzzer-coverage-x86_64": ./config.status --file=libpcap.pc.tmp:./libpcap.pc.in Step #3 - "compile-libfuzzer-coverage-x86_64": ./config.status --file=pcap-config.tmp:./pcap-config.in Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libpcap.pc.tmp Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pcap-config.tmp Step #3 - "compile-libfuzzer-coverage-x86_64": mv libpcap.pc.tmp libpcap.pc Step #3 - "compile-libfuzzer-coverage-x86_64": mv pcap-config.tmp pcap-config Step #3 - "compile-libfuzzer-coverage-x86_64": chmod a+x libpcap.pc Step #3 - "compile-libfuzzer-coverage-x86_64": chmod a+x pcap-config Step #3 - "compile-libfuzzer-coverage-x86_64": grammar.y: warning: fix-its can be applied. Rerun with option '--update'. [-Wother] Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c grammar.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ./gencode.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -fvisibility=hidden -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fpic -I. -I/usr/local/include -DBUILDING_PCAP -Dpcap_EXPORTS -DHAVE_CONFIG_H -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c scanner.c Step #3 - "compile-libfuzzer-coverage-x86_64": ar rc libpcap.a pcap-linux.o pcap-usb-linux.o pcap-netfilter-linux.o fad-getad.o pcap.o gencode.o optimize.o nametoaddr.o etherent.o fmtutils.o savefile.o sf-pcap.o sf-pcapng.o pcap-common.o bpf_image.o bpf_filter.o bpf_dump.o scanner.o grammar.o strlcat.o strlcpy.o Step #3 - "compile-libfuzzer-coverage-x86_64": ranlib libpcap.a Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": # Step #3 - "compile-libfuzzer-coverage-x86_64": # Most platforms have separate suffixes for shared and Step #3 - "compile-libfuzzer-coverage-x86_64": # archive libraries, so we install both. Step #3 - "compile-libfuzzer-coverage-x86_64": # Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/lib ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/lib; chmod 755 /usr/local/lib) Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 libpcap.a /usr/local/lib/libpcap.a Step #3 - "compile-libfuzzer-coverage-x86_64": ranlib /usr/local/lib/libpcap.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/lib ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/lib; chmod 755 /usr/local/lib) Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/include ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/include; chmod 755 /usr/local/include) Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/include/pcap ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/include/pcap; chmod 755 /usr/local/include/pcap) Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/share/man/man1 ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/share/man/man1; chmod 755 /usr/local/share/man/man1) Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/share/man/man3 ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/share/man/man3; chmod 755 /usr/local/share/man/man3) Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/share/man/man5 ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/share/man/man5; chmod 755 /usr/local/share/man/man5) Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/share/man/man7 ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/share/man/man7; chmod 755 /usr/local/share/man/man7) Step #3 - "compile-libfuzzer-coverage-x86_64": for i in pcap.h pcap-bpf.h pcap-namedb.h pcap/bpf.h pcap/bluetooth.h pcap/can_socketcan.h pcap/compiler-tests.h pcap/dlt.h pcap/funcattrs.h pcap/pcap-inttypes.h pcap/ipnet.h pcap/namedb.h pcap/nflog.h pcap/pcap.h pcap/sll.h pcap/socket.h pcap/vlan.h pcap/usb.h; do \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ./$i \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include/$i; done Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/bin ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/bin; chmod 755 /usr/local/bin) Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c pcap-config /usr/local/bin/pcap-config Step #3 - "compile-libfuzzer-coverage-x86_64": [ -d /usr/local/lib/pkgconfig ] || \ Step #3 - "compile-libfuzzer-coverage-x86_64": (mkdir -p /usr/local/lib/pkgconfig; chmod 755 /usr/local/lib/pkgconfig) Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 libpcap.pc /usr/local/lib/pkgconfig/libpcap.pc Step #3 - "compile-libfuzzer-coverage-x86_64": for i in pcap-config.1; do \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ./$i \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/man/man1/$i; done Step #3 - "compile-libfuzzer-coverage-x86_64": for i in pcap_activate.3pcap pcap_breakloop.3pcap pcap_can_set_rfmon.3pcap pcap_close.3pcap pcap_create.3pcap pcap_datalink_name_to_val.3pcap pcap_datalink_val_to_name.3pcap pcap_dump.3pcap pcap_dump_close.3pcap pcap_dump_file.3pcap pcap_dump_flush.3pcap pcap_dump_ftell.3pcap pcap_file.3pcap pcap_fileno.3pcap pcap_findalldevs.3pcap pcap_freecode.3pcap pcap_get_required_select_timeout.3pcap pcap_get_selectable_fd.3pcap pcap_geterr.3pcap pcap_inject.3pcap pcap_is_swapped.3pcap pcap_lib_version.3pcap pcap_lookupdev.3pcap pcap_lookupnet.3pcap pcap_loop.3pcap pcap_major_version.3pcap pcap_next_ex.3pcap pcap_offline_filter.3pcap pcap_open_live.3pcap pcap_set_buffer_size.3pcap pcap_set_datalink.3pcap pcap_set_promisc.3pcap pcap_set_protocol_linux.3pcap pcap_set_rfmon.3pcap pcap_set_snaplen.3pcap pcap_set_timeout.3pcap pcap_setdirection.3pcap pcap_setfilter.3pcap pcap_setnonblock.3pcap pcap_snapshot.3pcap pcap_stats.3pcap pcap_statustostr.3pcap pcap_strerror.3pcap pcap_tstamp_type_name_to_val.3pcap pcap_tstamp_type_val_to_name.3pcap; do \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ./$i \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/man/man3/$i; done Step #3 - "compile-libfuzzer-coverage-x86_64": for i in pcap.3pcap pcap_compile.3pcap pcap_datalink.3pcap pcap_dump_open.3pcap pcap_get_tstamp_precision.3pcap pcap_list_datalinks.3pcap pcap_list_tstamp_types.3pcap pcap_open_dead.3pcap pcap_open_offline.3pcap pcap_set_immediate_mode.3pcap pcap_set_tstamp_precision.3pcap pcap_set_tstamp_type.3pcap; do \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 $i \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/man/man3/$i; done Step #3 - "compile-libfuzzer-coverage-x86_64": (cd /usr/local/share/man/man3 && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_datalink_val_to_description.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_datalink_val_to_name.3pcap \ Step #3 - "compile-libfuzzer-coverage-x86_64": pcap_datalink_val_to_description.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_datalink_val_to_description_or_dlt.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_datalink_val_to_name.3pcap \ Step #3 - "compile-libfuzzer-coverage-x86_64": pcap_datalink_val_to_description_or_dlt.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_dump_fopen.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_dump_open.3pcap pcap_dump_fopen.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_freealldevs.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_findalldevs.3pcap pcap_freealldevs.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_perror.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_geterr.3pcap pcap_perror.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_sendpacket.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_inject.3pcap pcap_sendpacket.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_free_datalinks.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_list_datalinks.3pcap pcap_free_datalinks.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_free_tstamp_types.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_list_tstamp_types.3pcap pcap_free_tstamp_types.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_dispatch.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_loop.3pcap pcap_dispatch.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_minor_version.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_major_version.3pcap pcap_minor_version.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_next.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_next_ex.3pcap pcap_next.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_open_dead_with_tstamp_precision.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_open_dead.3pcap \ Step #3 - "compile-libfuzzer-coverage-x86_64": pcap_open_dead_with_tstamp_precision.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_open_offline_with_tstamp_precision.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_open_offline.3pcap pcap_open_offline_with_tstamp_precision.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_fopen_offline.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_open_offline.3pcap pcap_fopen_offline.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_fopen_offline_with_tstamp_precision.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_open_offline.3pcap pcap_fopen_offline_with_tstamp_precision.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_tstamp_type_val_to_description.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_tstamp_type_val_to_name.3pcap pcap_tstamp_type_val_to_description.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f pcap_getnonblock.3pcap && \ Step #3 - "compile-libfuzzer-coverage-x86_64": ln -s pcap_setnonblock.3pcap pcap_getnonblock.3pcap) Step #3 - "compile-libfuzzer-coverage-x86_64": for i in pcap-savefile.manfile.in; do \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 `echo $i | sed 's/.manfile.in/.manfile/'` \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/man/man5/`echo $i | sed 's/.manfile.in/.5/'`; done Step #3 - "compile-libfuzzer-coverage-x86_64": for i in pcap-filter.manmisc.in pcap-linktype.manmisc.in pcap-tstamp.manmisc.in; do \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 `echo $i | sed 's/.manmisc.in/.manmisc/'` \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/man/man7/`echo $i | sed 's/.manmisc.in/.7/'`; done Step #3 - "compile-libfuzzer-coverage-x86_64": + cd .. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzzpcap Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd build Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake .. Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Deprecation Warning at CMakeLists.txt:1 (cmake_minimum_required): Step #3 - "compile-libfuzzer-coverage-x86_64": Compatibility with CMake < 3.5 will be removed from a future version of Step #3 - "compile-libfuzzer-coverage-x86_64": CMake. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Update the VERSION argument value or use a ... suffix to tell Step #3 - "compile-libfuzzer-coverage-x86_64": CMake that the project does not need compatibility with older versions. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (0.2s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/fuzzpcap/build Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object CMakeFiles/fuzzpcap.dir/fuzz_pcap.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Linking C static library libfuzzpcap.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Built target fuzzpcap Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building C object CMakeFiles/fpc_bin.dir/main.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable fpc_bin Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fpc_bin Step #3 - "compile-libfuzzer-coverage-x86_64": Install the project... Step #3 - "compile-libfuzzer-coverage-x86_64": -- Install configuration: "" Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/local/lib/libfuzzpcap.a Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/local/include/fuzz_pcap.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/local/bin/fpc_bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../.. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd libyaml Step #3 - "compile-libfuzzer-coverage-x86_64": + ./bootstrap Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Entering directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: not using Gettext Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: aclocal --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: tracing Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: creating directory config Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: libtoolize --copy --force Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'config'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'config/ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: Consider adding 'AC_CONFIG_MACRO_DIRS([m4])' to configure.ac, Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: and rerunning libtoolize and aclocal. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: Consider adding '-I m4' to ACLOCAL_AMFLAGS in Makefile.am. Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoconf --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoheader --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: automake --add-missing --copy --force-missing Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:51: installing 'config/compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:56: installing 'config/config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:56: installing 'config/config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:30: installing 'config/install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:30: installing 'config/missing' Step #3 - "compile-libfuzzer-coverage-x86_64": src/Makefile.am: installing 'config/depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing 'config/test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Leaving directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --disable-shared Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for doxygen... false Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for an ANSI C-conforming const... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating yaml-0.1.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tests/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in include Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml/src' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT api.lo -MD -MP -MF .deps/api.Tpo -c -o api.lo api.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT reader.lo -MD -MP -MF .deps/reader.Tpo -c -o reader.lo reader.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT scanner.lo -MD -MP -MF .deps/scanner.Tpo -c -o scanner.lo scanner.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT parser.lo -MD -MP -MF .deps/parser.Tpo -c -o parser.lo parser.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT loader.lo -MD -MP -MF .deps/loader.Tpo -c -o loader.lo loader.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT writer.lo -MD -MP -MF .deps/writer.Tpo -c -o writer.lo writer.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT emitter.lo -MD -MP -MF .deps/emitter.Tpo -c -o emitter.lo emitter.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT dumper.lo -MD -MP -MF .deps/dumper.Tpo -c -o dumper.lo dumper.c Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT scanner.lo -MD -MP -MF .deps/scanner.Tpo -c scanner.c -o scanner.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT loader.lo -MD -MP -MF .deps/loader.Tpo -c loader.c -o loader.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT parser.lo -MD -MP -MF .deps/parser.Tpo -c parser.c -o parser.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT dumper.lo -MD -MP -MF .deps/dumper.Tpo -c dumper.c -o dumper.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT reader.lo -MD -MP -MF .deps/reader.Tpo -c reader.c -o reader.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT api.lo -MD -MP -MF .deps/api.Tpo -c api.c -o api.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT writer.lo -MD -MP -MF .deps/writer.Tpo -c writer.c -o writer.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT emitter.lo -MD -MP -MF .deps/emitter.Tpo -c emitter.c -o emitter.o Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/writer.Tpo .deps/writer.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/dumper.Tpo .deps/dumper.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/reader.Tpo .deps/reader.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/loader.Tpo .deps/loader.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/parser.Tpo .deps/parser.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/api.Tpo .deps/api.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/emitter.Tpo .deps/emitter.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/scanner.Tpo .deps/scanner.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -no-undefined -release 0 -version-info 2:9:0 -o libyaml.la -rpath /usr/local/lib api.lo reader.lo scanner.lo parser.lo loader.lo writer.lo emitter.lo dumper.lo Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/libyaml.a api.o reader.o scanner.o parser.o loader.o writer.o emitter.o dumper.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/libyaml.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libyaml.la" && ln -s "../libyaml.la" "libyaml.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in . Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in tests Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-scanner.o -MD -MP -MF .deps/run-scanner.Tpo -c -o run-scanner.o run-scanner.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-parser.o -MD -MP -MF .deps/run-parser.Tpo -c -o run-parser.o run-parser.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-loader.o -MD -MP -MF .deps/run-loader.Tpo -c -o run-loader.o run-loader.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-emitter.o -MD -MP -MF .deps/run-emitter.Tpo -c -o run-emitter.o run-emitter.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-dumper.o -MD -MP -MF .deps/run-dumper.Tpo -c -o run-dumper.o run-dumper.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT example-reformatter.o -MD -MP -MF .deps/example-reformatter.Tpo -c -o example-reformatter.o example-reformatter.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT example-reformatter-alt.o -MD -MP -MF .deps/example-reformatter-alt.Tpo -c -o example-reformatter-alt.o example-reformatter-alt.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT example-deconstructor.o -MD -MP -MF .deps/example-deconstructor.Tpo -c -o example-deconstructor.o example-deconstructor.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT example-deconstructor-alt.o -MD -MP -MF .deps/example-deconstructor-alt.Tpo -c -o example-deconstructor-alt.o example-deconstructor-alt.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-parser-test-suite.o -MD -MP -MF .deps/run-parser-test-suite.Tpo -c -o run-parser-test-suite.o run-parser-test-suite.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I../include -I../include -Wall -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT run-emitter-test-suite.o -MD -MP -MF .deps/run-emitter-test-suite.Tpo -c -o run-emitter-test-suite.o run-emitter-test-suite.c Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-scanner.Tpo .deps/run-scanner.Po Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-loader.Tpo .deps/run-loader.Po Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-parser.Tpo .deps/run-parser.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-scanner run-scanner.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-loader run-loader.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-parser run-parser.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/example-reformatter.Tpo .deps/example-reformatter.Po Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/example-reformatter-alt.Tpo .deps/example-reformatter-alt.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-reformatter example-reformatter.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-reformatter-alt example-reformatter-alt.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-parser-test-suite.Tpo .deps/run-parser-test-suite.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-parser-test-suite run-parser-test-suite.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-emitter-test-suite.Tpo .deps/run-emitter-test-suite.Po Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-emitter.Tpo .deps/run-emitter.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-emitter-test-suite run-emitter-test-suite.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/run-dumper.Tpo .deps/run-dumper.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-emitter run-emitter.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-dumper run-dumper.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-scanner run-scanner.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-loader run-loader.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-parser run-parser.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-reformatter example-reformatter.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-reformatter-alt example-reformatter-alt.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-parser-test-suite run-parser-test-suite.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/example-deconstructor-alt.Tpo .deps/example-deconstructor-alt.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-deconstructor-alt example-deconstructor-alt.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/example-deconstructor.Tpo .deps/example-deconstructor.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-deconstructor example-deconstructor.o ../src/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-emitter-test-suite run-emitter-test-suite.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-emitter run-emitter.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o run-dumper run-dumper.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-deconstructor-alt example-deconstructor-alt.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o example-deconstructor example-deconstructor.o ../src/.libs/libyaml.a -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in include Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 yaml.h '/usr/local/include/.' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libyaml/src' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --mode=install /usr/bin/install -c libyaml.la '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libyaml.lai /usr/local/lib/libyaml.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libyaml.a /usr/local/lib/libyaml.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libyaml.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /usr/local/lib/libyaml.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/rust/bin:/sbin" ldconfig -n /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libyaml/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in . Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libyaml' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 yaml-0.1.pc '/usr/local/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libyaml' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in tests Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libyaml/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libyaml/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libyaml/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libyaml/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd .. Step #3 - "compile-libfuzzer-coverage-x86_64": + export CARGO_BUILD_TARGET=x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": + CARGO_BUILD_TARGET=x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": + export MSAN_OPTIONS=strict_memcmp=false Step #3 - "compile-libfuzzer-coverage-x86_64": + MSAN_OPTIONS=strict_memcmp=false Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = address ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzz_branches=("") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage != \m\e\m\o\r\y ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ ! -v CIFUZZ ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzz_branches+=("7") Step #3 - "compile-libfuzzer-coverage-x86_64": ++ shuf -i 0-9 -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 -eq 0 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + for branch in "${fuzz_branches[@]}" Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r libhtp suricata/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd suricata Step #3 - "compile-libfuzzer-coverage-x86_64": + sh autogen.sh Step #3 - "compile-libfuzzer-coverage-x86_64": Found libtoolize Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: 'AC_PROG_RANLIB' is rendered obsolete by 'LT_INIT' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Entering directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: not using Gettext Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: aclocal --force -I m4 Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: tracing Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: adding subdirectory libhtp to autoreconf Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Entering directory `libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: libtoolize --copy --force Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoconf --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoheader --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: automake --add-missing --copy --force-missing Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:86: installing './compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:89: installing './config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:89: installing './config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:7: installing './install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:7: installing './missing' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am: installing './INSTALL' Step #3 - "compile-libfuzzer-coverage-x86_64": htp/Makefile.am: installing './depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing './test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Leaving directory `libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: 'AC_PROG_RANLIB' is rendered obsolete by 'LT_INIT' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:6: installing './install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:6: installing './missing' Step #3 - "compile-libfuzzer-coverage-x86_64": doc/userguide/Makefile.am:48: warning: SPHINX_BUILD was already defined in condition TRUE, which includes condition SPHINX_BUILD ... Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:2093: ... 'SPHINX_BUILD' previously defined here Step #3 - "compile-libfuzzer-coverage-x86_64": examples/lib/simple/Makefile.am: installing './depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Leaving directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": You can now run "./configure" and then "make". Step #3 - "compile-libfuzzer-coverage-x86_64": + ./src/tests/fuzz/oss-fuzz-configure.sh Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether UID '0' is supported by ustar format... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether GID '0' is supported by ustar format... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to create a ustar tar archive... gnutar Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking pkg-config is at least version 0.9.0... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether GCC or Clang is our compiler... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... (cached) mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... (cached) ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... (cached) /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for cygpath... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking for python3... /usr/local/bin/python3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for wget... /usr/bin/wget Step #3 - "compile-libfuzzer-coverage-x86_64": checking stddef.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stddef.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stddef.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for arpa/inet.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking assert.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking assert.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for assert.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking ctype.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking ctype.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ctype.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking errno.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking errno.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for errno.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fcntl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking getopt.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking getopt.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getopt.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netdb.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netinet/in.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netinet/in.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/in.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking poll.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking poll.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for poll.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sched.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sched.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sched.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking signal.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking signal.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for signal.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdarg.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdarg.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdarg.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdio.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdio.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdio.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdbool.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdbool.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdbool.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioctl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioctl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/ioctl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking math.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking math.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for math.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking syslog.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking syslog.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for syslog.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/prctl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/prctl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/prctl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/socket.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/socket.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/socket.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/syscall.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/syscall.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/syscall.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/param.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/param.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/param.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/ioctl.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/if_ether.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/if_ether.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/if_ether.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/if_packet.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/if_packet.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/if_packet.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/filter.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/filter.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/filter.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/ethtool.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/ethtool.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/ethtool.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/sockios.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/sockios.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/sockios.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking glob.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking glob.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for glob.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking locale.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking locale.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for locale.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking grp.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking grp.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grp.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking pwd.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking pwd.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pwd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dirent.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dirent.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dirent.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fnmatch.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fnmatch.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fnmatch.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/resource.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/resource.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/resource.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/un.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/un.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/un.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/random.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/random.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/random.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking utime.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking utime.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for utime.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking libgen.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking libgen.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libgen.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking mach/mach.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking mach/mach.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mach/mach.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdatomic.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdatomic.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdatomic.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/queue.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/queue.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/queue.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/socket.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/if.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/mman.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/if_arp.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for windows.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for winsock2.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ws2tcpip.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for w32api/wtypes.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for w32api/winbase.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for wincrypt.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inline... inline Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C/C++ restrict keyword... __restrict Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pid_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mode_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ssize_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int8_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int16_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int32_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int64_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint8_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint16_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint32_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint64_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for u_int... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for u_short... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for u_long... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for u_char... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether struct tm is in sys/time.h or time.h... time.h Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct tm.tm_zone... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ptrdiff_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdbool.h that conforms to C99... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _Bool... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for GNU libc compatible malloc... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for GNU libc compatible realloc... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking vfork.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking vfork.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vfork.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fork... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vfork... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working fork... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working vfork... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether time.h and sys/time.h may both be included... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/time.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/param.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for alarm... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working mktime... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getpagesize... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working mmap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working strtod... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memmem... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memset... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memchr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memrchr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memmove... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strcasecmp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strchr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strrchr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strdup... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strndup... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strncasecmp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strtol... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strtoul... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strstr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strpbrk... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strtoull... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strtoumax... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strerror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gethostname... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inet_ntoa... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uname... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gettimeofday... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clock_gettime... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for utime... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strptime... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for tzset... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for localtime_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for socket... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for setenv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for select... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for putenv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dup2... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for endgrent... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for endpwent... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for atexit... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for munmap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for setrlimit... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for setvbuf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fwrite_unlocked... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether getrandom is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether _popcnt64 is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking malloc.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking malloc.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for malloc.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether malloc_trim is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcpy... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcat... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for special C compiler options needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking host os... installation for x86_64-pc-linux-gnu OS... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for c11 support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for -Wl... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for thread local storage gnu __thread support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/landlock.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/landlock.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/landlock.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for plugin support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for spatch... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking zlib.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking zlib.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for zlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inflate in -lz... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcre2_compile_8 in -lpcre2-8... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PCRE2 JIT support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libhs... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking hs.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking hs.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for hs.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking yaml.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking yaml.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for yaml.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for yaml_parser_initialize in -lyaml... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_create in -lpthread... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_spin_unlock... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking jansson.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking jansson.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for jansson.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for json_dump_callback in -ljansson... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether OS_WIN32 is declared... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libnet.h version 1.1.x... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap/pcap.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap/bpf.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap_open_dead in -lpcap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PCAP... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap-config... /usr/local/bin/pcap-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pcap_set_buffer_size in -lpcap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether TPACKET_V2 is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether PACKET_FANOUT_QM is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether TPACKET_V3 is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether SOF_TIMESTAMPING_RAW_HARDWARE is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for elf_begin in -lelf... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bpf_xdp_query_id... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking iconv.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking iconv.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for iconv.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libiconv_close in -liconv... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking cap-ng.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking cap-ng.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for cap-ng.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": WARNING! libcap-ng library not found, go get it Step #3 - "compile-libfuzzer-coverage-x86_64": from http://people.redhat.com/sgrubb/libcap-ng/ Step #3 - "compile-libfuzzer-coverage-x86_64": or your distribution: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Ubuntu: apt-get install libcap-ng-dev Step #3 - "compile-libfuzzer-coverage-x86_64": Fedora: dnf install libcap-ng-devel Step #3 - "compile-libfuzzer-coverage-x86_64": CentOS/RHEL: yum install libcap-ng-devel Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Suricata will be built without support for dropping privs. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unw_backtrace in -lunwind... no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": libunwind library and development headers not found Step #3 - "compile-libfuzzer-coverage-x86_64": stacktrace on unexpected termination due to signal not possible Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": checking magic.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking magic.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for magic.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": WARNING! magic library not found, go get it Step #3 - "compile-libfuzzer-coverage-x86_64": from http://www.darwinsys.com/file/ or your distribution: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Ubuntu: apt-get install libmagic-dev Step #3 - "compile-libfuzzer-coverage-x86_64": Fedora: dnf install file-devel Step #3 - "compile-libfuzzer-coverage-x86_64": CentOS/RHEL: yum install file-devel Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": checking for LZ4F_createCompressionContext in -llz4... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getconf... /usr/bin/getconf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sphinx-build... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pdflatex... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for rustc... /rust/bin/rustc Step #3 - "compile-libfuzzer-coverage-x86_64": checking for cargo... /usr/local/bin/cargo Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Rust version 1.67.1 or newer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ./rust/dist/rust-bindings.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ./rust/gen/rust-bindings.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for cbindgen... /rust/bin/cbindgen Step #3 - "compile-libfuzzer-coverage-x86_64": checking for -Wunused-macros support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for -Wimplicit-int-float-conversion... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for FPC_IsFuzzPacketCapture in -lfuzzpcap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang++... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -fsanitize=fuzzer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for git... /usr/bin/git Step #3 - "compile-libfuzzer-coverage-x86_64": checking for release date... 2024-08-31 Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rust/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rust/Cargo.lock Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rust/Cargo.toml Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rust/derive/Cargo.toml Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rust/.cargo/config.toml Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating qa/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating qa/coccinelle/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rules/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/userguide/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating contrib/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating contrib/file_processor/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating contrib/file_processor/Action/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating contrib/file_processor/Processor/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating suricata.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating etc/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating etc/suricata.logrotate Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating etc/suricata.service Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating python/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating python/suricata/config/defaults.py Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating ebpf/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libsuricata-config Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/plugins/c-json-filetype/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/plugins/c-custom-loggers/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/plugins/ci-capture/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/lib/simple/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/lib/simple/Makefile.example Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating plugins/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating plugins/pfring/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/autoconf.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": === configuring in libhtp (/src/suricata/libhtp) Step #3 - "compile-libfuzzer-coverage-x86_64": configure: running /bin/bash ./configure --disable-option-checking '--prefix=/usr/local' '--enable-warnings' '--disable-shared' '--enable-fuzztargets' '--disable-gccmarch-native' '--enable-debug-validation' 'CC=clang' 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument' 'CXX=clang++' 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' 'CCC=clang++' --cache-file=/dev/null --srcdir=. Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang++... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcpy... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcat... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking zlib.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking zlib.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for zlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inflate in -lz... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking OS... Linux Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by GCC... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for shared library run path origin... done Step #3 - "compile-libfuzzer-coverage-x86_64": checking for iconv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working iconv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for iconv declaration... Step #3 - "compile-libfuzzer-coverage-x86_64": extern size_t iconv (iconv_t cd, char * *inbuf, size_t *inbytesleft, char * *outbuf, size_t *outbytesleft); Step #3 - "compile-libfuzzer-coverage-x86_64": checking for iconvctl... Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc support of -Wstrict-overflow=1... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc support of stack smashing protection... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc support of FORTIFY_SOURCE... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc support of -Wformat -Wformat-security... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc support of -fPIC... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for doxygen... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for lcov... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating htp/htp_version.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating htp.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating htp/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating htp/lzma/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating test/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating docs/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating htp_config_auto_gen.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Suricata Configuration: Step #3 - "compile-libfuzzer-coverage-x86_64": AF_PACKET support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": AF_XDP support: no Step #3 - "compile-libfuzzer-coverage-x86_64": DPDK support: no Step #3 - "compile-libfuzzer-coverage-x86_64": eBPF support: no Step #3 - "compile-libfuzzer-coverage-x86_64": XDP support: no Step #3 - "compile-libfuzzer-coverage-x86_64": PF_RING support: no Step #3 - "compile-libfuzzer-coverage-x86_64": NFQueue support: no Step #3 - "compile-libfuzzer-coverage-x86_64": NFLOG support: no Step #3 - "compile-libfuzzer-coverage-x86_64": IPFW support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Netmap support: no Step #3 - "compile-libfuzzer-coverage-x86_64": DAG enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Napatech enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": WinDivert enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Unix socket enabled: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Detection enabled: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Libmagic support: no Step #3 - "compile-libfuzzer-coverage-x86_64": libjansson support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": hiredis support: no Step #3 - "compile-libfuzzer-coverage-x86_64": hiredis async with libevent: no Step #3 - "compile-libfuzzer-coverage-x86_64": PCRE jit: yes Step #3 - "compile-libfuzzer-coverage-x86_64": GeoIP2 support: no Step #3 - "compile-libfuzzer-coverage-x86_64": JA3 support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": JA4 support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Non-bundled htp: no Step #3 - "compile-libfuzzer-coverage-x86_64": Hyperscan support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Libnet support: no Step #3 - "compile-libfuzzer-coverage-x86_64": liblz4 support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Landlock support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Systemd support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Rust support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Rust strict mode: no Step #3 - "compile-libfuzzer-coverage-x86_64": Rust compiler path: /rust/bin/rustc Step #3 - "compile-libfuzzer-coverage-x86_64": Rust compiler version: rustc 1.78.0-nightly (1a648b397 2024-02-11) Step #3 - "compile-libfuzzer-coverage-x86_64": Cargo path: /usr/local/bin/cargo Step #3 - "compile-libfuzzer-coverage-x86_64": Cargo version: cargo 1.78.0-nightly (ccc84ccec 2024-02-07) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Python support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Python path: /usr/local/bin/python3 Step #3 - "compile-libfuzzer-coverage-x86_64": Install suricatactl: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Install suricatasc: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Install suricata-update: no, not bundled Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Profiling enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Profiling locks enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Profiling rules enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Plugin support (experimental): yes Step #3 - "compile-libfuzzer-coverage-x86_64": DPDK Bond PMD: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Development settings: Step #3 - "compile-libfuzzer-coverage-x86_64": Coccinelle / spatch: no Step #3 - "compile-libfuzzer-coverage-x86_64": Unit tests enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Debug output enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Debug validation enabled: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Fuzz targets enabled: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Generic build parameters: Step #3 - "compile-libfuzzer-coverage-x86_64": Installation prefix: /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Configuration directory: /usr/local/etc/suricata/ Step #3 - "compile-libfuzzer-coverage-x86_64": Log directory: /usr/local/var/log/suricata/ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": --prefix /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": --sysconfdir /usr/local/etc Step #3 - "compile-libfuzzer-coverage-x86_64": --localstatedir /usr/local/var Step #3 - "compile-libfuzzer-coverage-x86_64": --datarootdir /usr/local/share Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Host: x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Compiler: clang (exec name) / clang++ (real) Step #3 - "compile-libfuzzer-coverage-x86_64": GCC Protect enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": GCC march native enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": GCC Profile enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Position Independent Executable enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fPIC -DOS_LINUX -std=c11 -I${srcdir}/../rust/gen -I${srcdir}/../rust/dist -I../rust/gen -Wunused-macros -Wimplicit-int-float-conversion Step #3 - "compile-libfuzzer-coverage-x86_64": PCAP_CFLAGS -I/usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": SECCFLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": To build and install run 'make' and 'make install'. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": You can run 'make install-conf' if you want to install initial configuration Step #3 - "compile-libfuzzer-coverage-x86_64": files to /usr/local/etc/suricata/. Running 'make install-full' will install configuration Step #3 - "compile-libfuzzer-coverage-x86_64": and rules and provide you a ready-to-run suricata. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": To install Suricata into /usr/bin/suricata, have the config in Step #3 - "compile-libfuzzer-coverage-x86_64": /etc/suricata and use /var/log/suricata as log dir, use: Step #3 - "compile-libfuzzer-coverage-x86_64": ./configure --prefix=/usr/ --sysconfdir=/etc/ --localstatedir=/var/ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in libhtp Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": make all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in htp Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/libhtp/htp' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in lzma Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Entering directory '/src/suricata/libhtp/htp/lzma' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../.. -O2 -I../.. -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT LzFind.lo -MD -MP -MF .deps/LzFind.Tpo -c -o LzFind.lo LzFind.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I../.. -O2 -I../.. -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT LzmaDec.lo -MD -MP -MF .deps/LzmaDec.Tpo -c -o LzmaDec.lo LzmaDec.c Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../.. -O2 -I../.. -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT LzmaDec.lo -MD -MP -MF .deps/LzmaDec.Tpo -c LzmaDec.c -o LzmaDec.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I../.. -O2 -I../.. -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT LzFind.lo -MD -MP -MF .deps/LzFind.Tpo -c LzFind.c -o LzFind.o Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/LzFind.Tpo .deps/LzFind.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/LzmaDec.Tpo .deps/LzmaDec.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../../libtool --tag=CC --mode=link clang -I../.. -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -o liblzma-c.la LzFind.lo LzmaDec.lo -lz Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/liblzma-c.a LzFind.o LzmaDec.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/liblzma-c.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "liblzma-c.la" && ln -s "../liblzma-c.la" "liblzma-c.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Leaving directory '/src/suricata/libhtp/htp/lzma' Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Entering directory '/src/suricata/libhtp/htp' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT bstr.lo -MD -MP -MF .deps/bstr.Tpo -c -o bstr.lo bstr.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT bstr_builder.lo -MD -MP -MF .deps/bstr_builder.Tpo -c -o bstr_builder.lo bstr_builder.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_base64.lo -MD -MP -MF .deps/htp_base64.Tpo -c -o htp_base64.lo htp_base64.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_config.lo -MD -MP -MF .deps/htp_config.Tpo -c -o htp_config.lo htp_config.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_connection.lo -MD -MP -MF .deps/htp_connection.Tpo -c -o htp_connection.lo htp_connection.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_connection_parser.lo -MD -MP -MF .deps/htp_connection_parser.Tpo -c -o htp_connection_parser.lo htp_connection_parser.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_content_handlers.lo -MD -MP -MF .deps/htp_content_handlers.Tpo -c -o htp_content_handlers.lo htp_content_handlers.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_cookies.lo -MD -MP -MF .deps/htp_cookies.Tpo -c -o htp_cookies.lo htp_cookies.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_decompressors.lo -MD -MP -MF .deps/htp_decompressors.Tpo -c -o htp_decompressors.lo htp_decompressors.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_hooks.lo -MD -MP -MF .deps/htp_hooks.Tpo -c -o htp_hooks.lo htp_hooks.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_list.lo -MD -MP -MF .deps/htp_list.Tpo -c -o htp_list.lo htp_list.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_multipart.lo -MD -MP -MF .deps/htp_multipart.Tpo -c -o htp_multipart.lo htp_multipart.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_parsers.lo -MD -MP -MF .deps/htp_parsers.Tpo -c -o htp_parsers.lo htp_parsers.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_php.lo -MD -MP -MF .deps/htp_php.Tpo -c -o htp_php.lo htp_php.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request.lo -MD -MP -MF .deps/htp_request.Tpo -c -o htp_request.lo htp_request.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request_apache_2_2.lo -MD -MP -MF .deps/htp_request_apache_2_2.Tpo -c -o htp_request_apache_2_2.lo htp_request_apache_2_2.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request_generic.lo -MD -MP -MF .deps/htp_request_generic.Tpo -c -o htp_request_generic.lo htp_request_generic.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request_parsers.lo -MD -MP -MF .deps/htp_request_parsers.Tpo -c -o htp_request_parsers.lo htp_request_parsers.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_response.lo -MD -MP -MF .deps/htp_response.Tpo -c -o htp_response.lo htp_response.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_response_generic.lo -MD -MP -MF .deps/htp_response_generic.Tpo -c -o htp_response_generic.lo htp_response_generic.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_table.lo -MD -MP -MF .deps/htp_table.Tpo -c -o htp_table.lo htp_table.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_transaction.lo -MD -MP -MF .deps/htp_transaction.Tpo -c -o htp_transaction.lo htp_transaction.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_transcoder.lo -MD -MP -MF .deps/htp_transcoder.Tpo -c -o htp_transcoder.lo htp_transcoder.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_urlencoded.lo -MD -MP -MF .deps/htp_urlencoded.Tpo -c -o htp_urlencoded.lo htp_urlencoded.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_util.lo -MD -MP -MF .deps/htp_util.Tpo -c -o htp_util.lo htp_util.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_utf8_decoder.lo -MD -MP -MF .deps/htp_utf8_decoder.Tpo -c -o htp_utf8_decoder.lo htp_utf8_decoder.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT strlcpy.lo -MD -MP -MF .deps/strlcpy.Tpo -c -o strlcpy.lo strlcpy.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT strlcat.lo -MD -MP -MF .deps/strlcat.Tpo -c -o strlcat.lo strlcat.c Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_php.lo -MD -MP -MF .deps/htp_php.Tpo -c htp_php.c -o htp_php.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_util.lo -MD -MP -MF .deps/htp_util.Tpo -c htp_util.c -o htp_util.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_transaction.lo -MD -MP -MF .deps/htp_transaction.Tpo -c htp_transaction.c -o htp_transaction.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_config.lo -MD -MP -MF .deps/htp_config.Tpo -c htp_config.c -o htp_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_table.lo -MD -MP -MF .deps/htp_table.Tpo -c htp_table.c -o htp_table.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_connection.lo -MD -MP -MF .deps/htp_connection.Tpo -c htp_connection.c -o htp_connection.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT bstr_builder.lo -MD -MP -MF .deps/bstr_builder.Tpo -c bstr_builder.c -o bstr_builder.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_content_handlers.lo -MD -MP -MF .deps/htp_content_handlers.Tpo -c htp_content_handlers.c -o htp_content_handlers.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_cookies.lo -MD -MP -MF .deps/htp_cookies.Tpo -c htp_cookies.c -o htp_cookies.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT bstr.lo -MD -MP -MF .deps/bstr.Tpo -c bstr.c -o bstr.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_base64.lo -MD -MP -MF .deps/htp_base64.Tpo -c htp_base64.c -o htp_base64.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_connection_parser.lo -MD -MP -MF .deps/htp_connection_parser.Tpo -c htp_connection_parser.c -o htp_connection_parser.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_hooks.lo -MD -MP -MF .deps/htp_hooks.Tpo -c htp_hooks.c -o htp_hooks.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_parsers.lo -MD -MP -MF .deps/htp_parsers.Tpo -c htp_parsers.c -o htp_parsers.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_decompressors.lo -MD -MP -MF .deps/htp_decompressors.Tpo -c htp_decompressors.c -o htp_decompressors.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_list.lo -MD -MP -MF .deps/htp_list.Tpo -c htp_list.c -o htp_list.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request.lo -MD -MP -MF .deps/htp_request.Tpo -c htp_request.c -o htp_request.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_multipart.lo -MD -MP -MF .deps/htp_multipart.Tpo -c htp_multipart.c -o htp_multipart.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_response_generic.lo -MD -MP -MF .deps/htp_response_generic.Tpo -c htp_response_generic.c -o htp_response_generic.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT strlcpy.lo -MD -MP -MF .deps/strlcpy.Tpo -c strlcpy.c -o strlcpy.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_utf8_decoder.lo -MD -MP -MF .deps/htp_utf8_decoder.Tpo -c htp_utf8_decoder.c -o htp_utf8_decoder.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request_generic.lo -MD -MP -MF .deps/htp_request_generic.Tpo -c htp_request_generic.c -o htp_request_generic.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_response.lo -MD -MP -MF .deps/htp_response.Tpo -c htp_response.c -o htp_response.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT strlcat.lo -MD -MP -MF .deps/strlcat.Tpo -c strlcat.c -o strlcat.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_transcoder.lo -MD -MP -MF .deps/htp_transcoder.Tpo -c htp_transcoder.c -o htp_transcoder.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_urlencoded.lo -MD -MP -MF .deps/htp_urlencoded.Tpo -c htp_urlencoded.c -o htp_urlencoded.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request_parsers.lo -MD -MP -MF .deps/htp_request_parsers.Tpo -c htp_request_parsers.c -o htp_request_parsers.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -O2 -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -MT htp_request_apache_2_2.lo -MD -MP -MF .deps/htp_request_apache_2_2.Tpo -c htp_request_apache_2_2.c -o htp_request_apache_2_2.o Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_base64.Tpo .deps/htp_base64.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/bstr_builder.Tpo .deps/bstr_builder.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_utf8_decoder.Tpo .deps/htp_utf8_decoder.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_php.Tpo .deps/htp_php.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_request_parsers.Tpo .deps/htp_request_parsers.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/strlcpy.Tpo .deps/strlcpy.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_request_apache_2_2.Tpo .deps/htp_request_apache_2_2.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_cookies.Tpo .deps/htp_cookies.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/strlcat.Tpo .deps/strlcat.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_connection.Tpo .deps/htp_connection.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_table.Tpo .deps/htp_table.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_content_handlers.Tpo .deps/htp_content_handlers.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_response_generic.Tpo .deps/htp_response_generic.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_transcoder.Tpo .deps/htp_transcoder.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_hooks.Tpo .deps/htp_hooks.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_list.Tpo .deps/htp_list.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_connection_parser.Tpo .deps/htp_connection_parser.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_parsers.Tpo .deps/htp_parsers.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_urlencoded.Tpo .deps/htp_urlencoded.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_decompressors.Tpo .deps/htp_decompressors.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_request_generic.Tpo .deps/htp_request_generic.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_config.Tpo .deps/htp_config.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_request.Tpo .deps/htp_request.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_response.Tpo .deps/htp_response.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_multipart.Tpo .deps/htp_multipart.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/bstr.Tpo .deps/bstr.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_transaction.Tpo .deps/htp_transaction.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/htp_util.Tpo .deps/htp_util.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -o libhtp-c.la bstr.lo bstr_builder.lo htp_base64.lo htp_config.lo htp_connection.lo htp_connection_parser.lo htp_content_handlers.lo htp_cookies.lo htp_decompressors.lo htp_hooks.lo htp_list.lo htp_multipart.lo htp_parsers.lo htp_php.lo htp_request.lo htp_request_apache_2_2.lo htp_request_generic.lo htp_request_parsers.lo htp_response.lo htp_response_generic.lo htp_table.lo htp_transaction.lo htp_transcoder.lo htp_urlencoded.lo htp_util.lo htp_utf8_decoder.lo strlcpy.lo strlcat.lo -lz Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/libhtp-c.a bstr.o bstr_builder.o htp_base64.o htp_config.o htp_connection.o htp_connection_parser.o htp_content_handlers.o htp_cookies.o htp_decompressors.o htp_hooks.o htp_list.o htp_multipart.o htp_parsers.o htp_php.o htp_request.o htp_request_apache_2_2.o htp_request_generic.o htp_request_parsers.o htp_response.o htp_response_generic.o htp_table.o htp_transaction.o htp_transcoder.o htp_urlencoded.o htp_util.o htp_utf8_decoder.o strlcpy.o strlcat.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/libhtp-c.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libhtp-c.la" && ln -s "../libhtp-c.la" "libhtp-c.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -I.. -I../htp -D_GNU_SOURCE -g -Wall -Wextra -std=gnu99 -pedantic -Wextra -Wno-missing-field-initializers -Wshadow -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wno-unused-parameter -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -O2 -Wstrict-overflow=1 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC -version-info 2:0:0 -o libhtp.la -rpath /usr/local/lib libhtp-c.la lzma/liblzma-c.la -lz Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: (cd .libs/libhtp.lax/libhtp-c.a && ar x "/src/suricata/libhtp/htp/./.libs/libhtp-c.a") Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: (cd .libs/libhtp.lax/liblzma-c.a && ar x "/src/suricata/libhtp/htp/lzma/.libs/liblzma-c.a") Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/libhtp.a .libs/libhtp.lax/libhtp-c.a/bstr.o .libs/libhtp.lax/libhtp-c.a/bstr_builder.o .libs/libhtp.lax/libhtp-c.a/htp_base64.o .libs/libhtp.lax/libhtp-c.a/htp_config.o .libs/libhtp.lax/libhtp-c.a/htp_connection.o .libs/libhtp.lax/libhtp-c.a/htp_connection_parser.o .libs/libhtp.lax/libhtp-c.a/htp_content_handlers.o .libs/libhtp.lax/libhtp-c.a/htp_cookies.o .libs/libhtp.lax/libhtp-c.a/htp_decompressors.o .libs/libhtp.lax/libhtp-c.a/htp_hooks.o .libs/libhtp.lax/libhtp-c.a/htp_list.o .libs/libhtp.lax/libhtp-c.a/htp_multipart.o .libs/libhtp.lax/libhtp-c.a/htp_parsers.o .libs/libhtp.lax/libhtp-c.a/htp_php.o .libs/libhtp.lax/libhtp-c.a/htp_request.o .libs/libhtp.lax/libhtp-c.a/htp_request_apache_2_2.o .libs/libhtp.lax/libhtp-c.a/htp_request_generic.o .libs/libhtp.lax/libhtp-c.a/htp_request_parsers.o .libs/libhtp.lax/libhtp-c.a/htp_response.o .libs/libhtp.lax/libhtp-c.a/htp_response_generic.o .libs/libhtp.lax/libhtp-c.a/htp_table.o .libs/libhtp.lax/libhtp-c.a/htp_transaction.o .libs/libhtp.lax/libhtp-c.a/htp_transcoder.o .libs/libhtp.lax/libhtp-c.a/htp_urlencoded.o .libs/libhtp.lax/libhtp-c.a/htp_utf8_decoder.o .libs/libhtp.lax/libhtp-c.a/htp_util.o .libs/libhtp.lax/libhtp-c.a/strlcat.o .libs/libhtp.lax/libhtp-c.a/strlcpy.o .libs/libhtp.lax/liblzma-c.a/LzFind.o .libs/libhtp.lax/liblzma-c.a/LzmaDec.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/libhtp.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: rm -fr .libs/libhtp.lax Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libhtp.la" && ln -s "../libhtp.la" "libhtp.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": make[4]: Leaving directory '/src/suricata/libhtp/htp' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/libhtp/htp' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in test Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/libhtp/test' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/libhtp/test' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in docs Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/libhtp/docs' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/libhtp/docs' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/libhtp' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in rust Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/rust' Step #3 - "compile-libfuzzer-coverage-x86_64": cd /src/suricata/rust && \ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTUP_HOME=/rust/rustup CARGO_HOME="/rust" \ Step #3 - "compile-libfuzzer-coverage-x86_64": CARGO_TARGET_DIR="/src/suricata/rust/target" \ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/cargo build --release \ Step #3 - "compile-libfuzzer-coverage-x86_64": --features "ja3 ja4 debug-validate" Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating git repository `https://github.com/jasonish/suricata-lua-sys` Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded alloc-no-stdlib v2.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded alloc-stdlib v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded adler v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded asn1-rs-derive v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aead v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.1.43 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sawp-flags-derive v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sawp v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded failure_derive v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded phf_generator v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded uuid v0.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded digest v0.10.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time-core v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded x509-parser v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded universal-hash v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded typenum v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v1.0.109 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time v0.3.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v2.0.59 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.153 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.6.29 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aes-gcm v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v0.15.44 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded brotli v3.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex v1.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-bigint v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom v7.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded minimal-lexical v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hkdf v0.12.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded brotli-decompressor v2.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aho-corasick v0.7.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded toml v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tls-parser v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror-impl v1.0.58 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded synstructure v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded widestring v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded version_check v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time-macros v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded synstructure v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded subtle v2.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha2 v0.10.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha1 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.197 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sawp-modbus v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustversion v1.0.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v0.4.30 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro-crate v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded powerfmt v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-rational v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-complex v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-bigint v0.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom-derive-impl v0.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded miniz_oxide v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memchr v2.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded md-5 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lzma-rs v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ldap-parser v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded kerberos-parser v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hmac v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ghash v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.2.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fs_extra v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded flate2 v1.0.28 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded failure v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded der-parser v9.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bendy v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded base64 v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded asn1-rs v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aes v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-xid v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-xid v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror v1.0.58 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded siphasher v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_core v0.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v1.0.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v0.6.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v1.0.80 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded oid-registry v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num_enum_derive v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num_enum v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ntp-parser v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded generic-array v0.14.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded displaydoc v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded deranged v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crypto-common v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc32fast v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cipher v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded snmp-parser v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sawp-flags v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded opaque-debug v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-iter v0.1.44 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-derive v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-conv v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom-derive v0.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ipsec-parser v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rusticata-macros v4.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_chacha v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ppv-lite86 v0.2.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded polyval v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded phf_shared v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded phf_codegen v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded phf v0.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lazy_static v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ctr v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded build_const v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cpufeatures v0.2.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded byteorder v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded block-buffer v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded autocfg v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded asn1-rs-impl v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded enum_primitive v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v1.0.80 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling autocfg v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memchr v2.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling version_check v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror v1.0.58 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling minimal-lexical v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.153 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling subtle v2.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.197 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ppv-lite86 v0.2.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling siphasher v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cpufeatures v0.2.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustversion v1.0.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v0.4.30 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-xid v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling failure_derive v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling opaque-debug v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-xid v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling build_const v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v0.15.44 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc32fast v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling oid-registry v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling alloc-no-stdlib v2.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fs_extra v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling adler v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-derive v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling byteorder v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling miniz_oxide v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.6.29 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time-macros v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling alloc-stdlib v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling phf_shared v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling brotli-decompressor v2.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uuid v0.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling widestring v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base64 v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling suricata-lua-sys v0.1.0-alpha.1 (https://github.com/jasonish/suricata-lua-sys#cb449d35) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling phf v0.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-bigint v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-bigint v0.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-complex v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-rational v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lzma-rs v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling flate2 v1.0.28 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom v7.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aho-corasick v0.7.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v1.0.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v0.6.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v2.0.59 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.2.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_core v0.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling brotli v3.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_chacha v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex v1.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling universal-hash v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cipher v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aead v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling polyval v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ctr v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aes v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ghash v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.1.43 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling phf_generator v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling enum_primitive v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling phf_codegen v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hmac v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling md-5 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha1 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tls-parser v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hkdf v0.12.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-iter v0.1.44 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aes-gcm v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rusticata-macros v4.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ipsec-parser v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling toml v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sawp v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling synstructure v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling synstructure v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror-impl v1.0.58 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling asn1-rs-impl v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling asn1-rs-derive v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling displaydoc v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom-derive-impl v0.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling failure v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bendy v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro-crate v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling asn1-rs v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom-derive v0.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sawp-flags-derive v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num_enum_derive v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling suricata-derive v8.0.0-dev (/src/suricata/rust/derive) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ntp-parser v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sawp-flags v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling der-parser v9.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ldap-parser v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling snmp-parser v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling x509-parser v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling kerberos-parser v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num_enum v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sawp-modbus v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling suricata v8.0.0-dev (/src/suricata/rust) Step #3 - "compile-libfuzzer-coverage-x86_64":  Finished release [optimized + debuginfo] target(s) in 38.44s Step #3 - "compile-libfuzzer-coverage-x86_64": if test -e ../rust/target/x86_64-unknown-linux-gnu/release/suricata.lib; then \ Step #3 - "compile-libfuzzer-coverage-x86_64": cp -a ../rust/target/x86_64-unknown-linux-gnu/release/suricata.lib \ Step #3 - "compile-libfuzzer-coverage-x86_64": ../rust/target/x86_64-unknown-linux-gnu/release/libsuricata_rust.a; \ Step #3 - "compile-libfuzzer-coverage-x86_64": fi Step #3 - "compile-libfuzzer-coverage-x86_64": if test -e ../rust/target/x86_64-unknown-linux-gnu/release/libsuricata.a; then \ Step #3 - "compile-libfuzzer-coverage-x86_64": cp -a ../rust/target/x86_64-unknown-linux-gnu/release/libsuricata.a \ Step #3 - "compile-libfuzzer-coverage-x86_64": ../rust/target/x86_64-unknown-linux-gnu/release/libsuricata_rust.a; \ Step #3 - "compile-libfuzzer-coverage-x86_64": fi Step #3 - "compile-libfuzzer-coverage-x86_64": make gen/rust-bindings.h Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/rust' Step #3 - "compile-libfuzzer-coverage-x86_64": cd /src/suricata/rust && \ Step #3 - "compile-libfuzzer-coverage-x86_64": cbindgen --config /src/suricata/rust/cbindgen.toml \ Step #3 - "compile-libfuzzer-coverage-x86_64": --quiet --verify --output /src/suricata/rust/gen/rust-bindings.h || true Step #3 - "compile-libfuzzer-coverage-x86_64": ERROR: Bindings changed: /src/suricata/rust/gen/rust-bindings.h Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/rust' Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir -p /src/suricata/rust/gen Step #3 - "compile-libfuzzer-coverage-x86_64": cp -a ../rust/target/x86_64-unknown-linux-gnu/release/build/suricata-lua-sys-*/out/lua/*.h \ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/suricata/rust/gen/ Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/rust' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/src' Step #3 - "compile-libfuzzer-coverage-x86_64": CC main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC alert-debuglog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC alert-fastlog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC alert-syslog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-detect-proto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-dnp3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-dnp3-objects.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-events.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-expectation.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-ftp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-frames.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp-body.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp-libhtp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp-mem.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp-range.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-htp-xff.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-http2.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-ike.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-modbus.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-nfs-tcp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-nfs-udp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-parser.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-protos.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-register.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-smtp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-smb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-ssl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-ssh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-tftp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC app-layer-imap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC conf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC conf-yaml-loader.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC counters.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC datasets.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC datasets-ipv4.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC datasets-ipv6.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC datasets-md5.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC datasets-sha256.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC datasets-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-arp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-chdlc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-erspan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-esp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-ethernet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-events.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-geneve.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-gre.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-icmpv4.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-icmpv6.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-ipv4.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-ipv6.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-mpls.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-nsh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-null.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-ppp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-pppoe.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-raw.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-sctp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-sll.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-tcp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-template.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-teredo.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-udp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-vlan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-vntag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode-vxlan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC defrag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC defrag-config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC defrag-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC defrag-stack.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC defrag-timeout.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-app-layer-event.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-app-layer-protocol.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-asn1.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-base64-data.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-base64-decode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-bsize.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-bypass.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-byte.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-byte-extract.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-bytejump.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-bytemath.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-bytetest.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-classtype.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-content.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-csum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-datarep.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dataset.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dce-iface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dce-opnum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dce-stub-data.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-depth.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-detection-filter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-distance.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dnp3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dns-answer-name.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dns-opcode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dns-rcode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dns-rrtype.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dns-query.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dns-query-name.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-dsize.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-address.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-address-ipv4.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-address-ipv6.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-alert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-analyzer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-build.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-content-inspection.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-dcepayload.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-event.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-frame.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-helper.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-iponly.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-loader.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-mpm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-payload.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-port.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-prefilter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-prefilter-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-profile.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-proto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-register.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-siggroup.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-sigorder.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-tag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-threshold.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-engine-uint.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-fast-pattern.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-file-data.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-file-hash-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filemagic.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filemd5.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filename.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filesha1.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filesha256.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filesize.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-filestore.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-flowbits.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-flow.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-flow-age.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-flow-pkts.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-flowint.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-flowvar.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-fragbits.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-fragoffset.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-frame.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ftpbounce.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ftpdata.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-geoip.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-gid.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-hostbits.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http2.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-accept.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-accept-enc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-accept-lang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-client-body.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-connection.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-content-len.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-content-type.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-cookie.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-header.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-header-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-header-names.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-headers.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-host.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-location.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-method.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-protocol.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-raw-header.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-referer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-request-line.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-response-line.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-server-body.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-start.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-server.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-stat-code.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-stat-msg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-ua.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-http-uri.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-icmp-id.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-icmp-seq.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-icmpv4hdr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-icmpv6hdr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-icmpv6-mtu.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-icode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-id.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-exch-type.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-spi.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-vendor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-chosen-sa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-key-exchange-payload-length.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-nonce-payload-length.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-nonce-payload.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ike-key-exchange-payload.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ipaddr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ipopts.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-iprep.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ipproto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ipv4hdr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ipv6hdr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-isdataat.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-itype.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ja4-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-krb5-cname.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-krb5-errcode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-krb5-msgtype.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-krb5-sname.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-krb5-ticket-encryption.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-l3proto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-lua.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-lua-extensions.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-mark.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-metadata.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-modbus.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-quic-sni.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-quic-ua.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-quic-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-quic-cyu-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-quic-cyu-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-msg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-nfs-procedure.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-nfs-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-noalert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-nocase.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-offset.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-parse.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-pcre.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-pkt-data.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-pktvar.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-prefilter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-priority.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-rawbytes.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-reference.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-replace.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-rev.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-requires.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-rpc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sameip.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sid.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-method.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-protocol.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-request-line.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-response-line.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-stat-code.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-stat-msg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-sip-uri.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-smb-ntlmssp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-smb-share.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-smb-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-hassh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-hassh-server.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-hassh-server-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-hassh-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-proto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-proto-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-software.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssh-software-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssl-state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ssl-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-stream_size.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-target.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tcp-ack.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tcp-flags.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tcphdr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tcpmss.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tcp-seq.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tcp-window.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-template.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-template-rust-buffer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-template2.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-threshold.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-alpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-cert-fingerprint.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-cert-issuer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-certs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-cert-serial.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-cert-subject.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-cert-validity.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-subjectaltname.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-ja3-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-ja3s-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-ja3s-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-ja3-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-sni.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-version.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tls-random.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-tos.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-base64.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-casechange.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-compress-whitespace.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-dotprefix.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-header-lowercase.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-md5.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-pcrexform.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-sha1.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-sha256.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-strip-pseudo-headers.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-strip-whitespace.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-urldecode.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-transform-xor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-ttl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-udphdr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-uricontent.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-urilen.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-within.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC detect-xbits.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC device-storage.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-bit.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC feature.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-bypass.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": detect-transform-base64.c:48:9: warning: macro is not used [-Wunused-macros] Step #3 - "compile-libfuzzer-coverage-x86_64": 48 | #define DETECT_TRANSFORM_FROM_BASE64_MODE_DEFAULT (uint8_t) Base64ModeRFC4648 Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  CC flow-manager.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-queue.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-spare-pool.o Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-storage.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-timeout.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-var.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC flow-worker.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC host-bit.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC host.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC host-queue.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC host-storage.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC host-timeout.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ippair-bit.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ippair.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ippair-queue.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ippair-storage.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ippair-timeout.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-cf-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-httplog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-pcap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-stats.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-tcp-data.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-tlslog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC log-tlsstore.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-eve-stream.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-filedata.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-filestore.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-flow.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-alert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-anomaly.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-arp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-dcerpc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-dhcp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-dnp3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-dnp3-objects.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-dns.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-drop.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-email-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-flow.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-frame.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-ftp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-http.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-ike.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-metadata.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-mqtt.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-netflow.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-nfs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-pgsql.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-smb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-smtp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-stats.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-json-tls.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-eve.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-eve-syslog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-eve-null.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-lua.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-stats.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-streaming.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC output-tx.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC packet-queue.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pkt-var.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC reputation.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC respond-reject.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC respond-reject-libnet11.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-af-packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-dpdk.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-af-xdp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-erf-dag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-erf-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-ipfw.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-napatech.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-netmap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-nflog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-nfq.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-pcap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-pcap-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmodes.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-unittests.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-unix-socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC runmode-windivert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC rust-context.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-af-packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-af-xdp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-dpdk.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-erf-dag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-erf-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-ipfw.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-napatech.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-netmap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-nflog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-nfq.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-pcap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-pcap-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-pcap-file-directory-helper.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-pcap-file-helper.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC source-windivert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp-cache.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp-inline.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp-list.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp-reassemble.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp-sack.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC stream-tcp-util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC suricata.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC threads.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tm-modules.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tmqh-flow.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tmqh-packetpool.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tmqh-simple.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tm-queuehandlers.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tm-queues.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tm-threads.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC unix-manager.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-action.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-affinity.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-atomic.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-base64.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-bpf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-buffer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-byte.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-checksum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-cidr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-classification-config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-conf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-coredump-config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-cpu.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-daemon.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-datalink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-debug-filters.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-detect.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-device.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-dpdk.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-dpdk-i40e.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-dpdk-ice.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-dpdk-ixgbe.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-dpdk-bonding.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-ebpf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-enum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-error.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-exception-policy.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-file.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-file-decompression.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-file-swf-decompression.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-fix_checksum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-fmemopen.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-hashlist.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-hash-lookup3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-hash-string.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-host-info.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-host-os-info.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-hugepages.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-hyperscan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-ioctl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-ip.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-ja3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-landlock.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-logopenfile.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-log-redis.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-dnp3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-dnp3-objects.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-dns.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-hassh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-http.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-ja3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-sandbox.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-smtp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-ssh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-lua-tls.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-macset.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-magic.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-mem.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-memcmp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-memrchr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-misc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-mpm-ac.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-mpm-ac-ks.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-mpm-ac-ks-small.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-mpm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-mpm-hs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-napatech.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-pages.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-path.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-pidfile.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-plugin.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-pool.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-pool-thread.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-prefilter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-print.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-privs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-profiling.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-profiling-keywords.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-profiling-locks.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-profiling-prefilter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-profiling-rulegroups.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-profiling-rules.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-proto-name.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-radix-tree.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-random.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-reference-config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-rohash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-rule-vars.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-runmodes.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-running-modes.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-signal.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-spm-bm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-spm-bs2bm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-spm-bs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-spm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-spm-hs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-storage.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-streaming-buffer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-strlcatu.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-strlcpyu.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-strptime.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-syslog.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-sysfs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-systemd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-thash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-threshold-config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-time.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-unittest.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-unittest-helper.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-var.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-var-name.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC util-port-interval-tree.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC win32-misc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC win32-service.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC win32-syscall.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/confyaml.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_applayerprotodetectgetproto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_applayerparserparse.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_siginit.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_confyamlloadstring.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_decodepcapfile.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_sigpcap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_sigpcap_aware.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_mimedecparseline.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_decodebase64.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tests/fuzz/fuzz_predefpcap_aware.o Step #3 - "compile-libfuzzer-coverage-x86_64": AR libsuricata_c.a Step #3 - "compile-libfuzzer-coverage-x86_64": ar: `u' modifier ignored since `D' is the default (see `U') Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD suricata Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_applayerprotodetectgetproto Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_applayerparserparse Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_siginit Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_decodepcapfile Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_confyamlloadstring Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_sigpcap Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_mimedecparseline Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_decodebase64 Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_sigpcap_aware Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz_predefpcap_aware Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in plugins Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/plugins' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/plugins' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/plugins' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/plugins' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in qa Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/qa' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in coccinelle Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/qa/coccinelle' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/qa/coccinelle' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/qa' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/qa' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/qa' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in rules Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/rules' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/rules' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in userguide Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/doc/userguide' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/doc/userguide' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in contrib Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/contrib' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in file_processor Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/contrib/file_processor' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in Action Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/contrib/file_processor/Action' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/contrib/file_processor/Action' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in Processor Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/contrib/file_processor/Processor' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/contrib/file_processor/Processor' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/suricata/contrib/file_processor' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/suricata/contrib/file_processor' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/contrib/file_processor' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/suricata/contrib' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/suricata/contrib' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/contrib' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in etc Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/etc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/etc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in python Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/python' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/python' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in ebpf Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata/ebpf' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata/ebpf' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/suricata' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/suricata' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./src/suricata --list-app-layer-protos Step #3 - "compile-libfuzzer-coverage-x86_64": + tail -n +2 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": Error: conf-yaml-loader: failed to open file: /usr/local/etc/suricata//suricata.yaml: No such file or directory [ConfYamlLoadFile:conf-yaml-loader.c:499] Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_http Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_ftp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_smtp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_tls Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_ssh Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_imap Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_smb Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_dcerpc Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_dns Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_modbus Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_enip Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_dnp3 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_nfs Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_ntp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_ftp-data Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_tftp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_ike Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_krb5 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_quic Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_dhcp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_snmp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_sip Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_rfb Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_mqtt Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_pgsql Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_telnet Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_websocket Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_ldap Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_doh2 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_rdp Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_http2 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_bittorrent-dht Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp src/fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse_pop3 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cd src Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + ls fuzz_applayerparserparse fuzz_applayerprotodetectgetproto fuzz_confyamlloadstring fuzz_decodebase64 fuzz_decodepcapfile fuzz_mimedecparseline fuzz_predefpcap_aware fuzz_siginit fuzz_sigpcap fuzz_sigpcap_aware Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_applayerparserparse /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerparserparse Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_applayerprotodetectgetproto /workspace/out/libfuzzer-coverage-x86_64/fuzz_applayerprotodetectgetproto Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_confyamlloadstring /workspace/out/libfuzzer-coverage-x86_64/fuzz_confyamlloadstring Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_decodebase64 /workspace/out/libfuzzer-coverage-x86_64/fuzz_decodebase64 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_decodepcapfile /workspace/out/libfuzzer-coverage-x86_64/fuzz_decodepcapfile Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_mimedecparseline /workspace/out/libfuzzer-coverage-x86_64/fuzz_mimedecparseline Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_predefpcap_aware /workspace/out/libfuzzer-coverage-x86_64/fuzz_predefpcap_aware Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_siginit /workspace/out/libfuzzer-coverage-x86_64/fuzz_siginit Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_sigpcap /workspace/out/libfuzzer-coverage-x86_64/fuzz_sigpcap Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_sigpcap_aware /workspace/out/libfuzzer-coverage-x86_64/fuzz_sigpcap_aware Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + ./src/suricata --list-keywords Step #3 - "compile-libfuzzer-coverage-x86_64": + grep '\- ' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed 's/- //' Step #3 - "compile-libfuzzer-coverage-x86_64": + awk '{print "\""$0"\""}' Step #3 - "compile-libfuzzer-coverage-x86_64": + echo '"SMB"' Step #3 - "compile-libfuzzer-coverage-x86_64": + echo '"FPC0"' Step #3 - "compile-libfuzzer-coverage-x86_64": + echo '"FPC0"' Step #3 - "compile-libfuzzer-coverage-x86_64": + git grep tag rust Step #3 - "compile-libfuzzer-coverage-x86_64": + grep '"' Step #3 - "compile-libfuzzer-coverage-x86_64": + cut -d '"' -f2 Step #3 - "compile-libfuzzer-coverage-x86_64": + sort Step #3 - "compile-libfuzzer-coverage-x86_64": + uniq Step #3 - "compile-libfuzzer-coverage-x86_64": + awk 'length($0) > 2' Step #3 - "compile-libfuzzer-coverage-x86_64": + awk '{print "\""$0"\""}' Step #3 - "compile-libfuzzer-coverage-x86_64": + grep -v '\\' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat generic.dict Step #3 - "compile-libfuzzer-coverage-x86_64": + cat generic.dict Step #3 - "compile-libfuzzer-coverage-x86_64": + cat generic.dict Step #3 - "compile-libfuzzer-coverage-x86_64": + cat generic.dict Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_confyamlloadstring_seed_corpus.zip suricata.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": adding: suricata.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip ../emerging.rules.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: ../emerging.rules.zip Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/3coresec.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/BSD-License.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/botcc.portgrouped.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/botcc.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/ciarmy.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/classification.config Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/compromised-ips.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/compromised.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/drop.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/dshield.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-activex.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-adware_pup.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-attack_response.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-chat.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-coinminer.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-current_events.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-deleted.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-dns.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-dos.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-exploit.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-exploit_kit.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-ftp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-games.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-hunting.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-icmp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-icmp_info.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-imap.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-inappropriate.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-info.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-ja3.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-malware.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-misc.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-mobile_malware.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-netbios.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-p2p.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-phishing.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-policy.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-pop3.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-rpc.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-scada.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-scan.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-shellcode.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-smtp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-snmp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-sql.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-telnet.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-tftp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-user_agents.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-voip.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-web_client.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-web_server.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-web_specific_apps.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-worm.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/gpl-2.0.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/sid-msg.map Step #3 - "compile-libfuzzer-coverage-x86_64": extracting: rules/suricata-5.0-enhanced-open.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/threatview_CS_c2.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/tor.rules Step #3 - "compile-libfuzzer-coverage-x86_64": + cd rules Step #3 - "compile-libfuzzer-coverage-x86_64": + cat 3coresec.rules app-layer-events.rules botcc.portgrouped.rules botcc.rules ciarmy.rules compromised.rules decoder-events.rules dhcp-events.rules dnp3-events.rules dns-events.rules drop.rules dshield.rules emerging-activex.rules emerging-adware_pup.rules emerging-attack_response.rules emerging-chat.rules emerging-coinminer.rules emerging-current_events.rules emerging-deleted.rules emerging-dns.rules emerging-dos.rules emerging-exploit.rules emerging-exploit_kit.rules emerging-ftp.rules emerging-games.rules emerging-hunting.rules emerging-icmp.rules emerging-icmp_info.rules emerging-imap.rules emerging-inappropriate.rules emerging-info.rules emerging-ja3.rules emerging-malware.rules emerging-misc.rules emerging-mobile_malware.rules emerging-netbios.rules emerging-p2p.rules emerging-phishing.rules emerging-policy.rules emerging-pop3.rules emerging-rpc.rules emerging-scada.rules emerging-scan.rules emerging-shellcode.rules emerging-smtp.rules emerging-snmp.rules emerging-sql.rules emerging-telnet.rules emerging-tftp.rules emerging-user_agents.rules emerging-voip.rules emerging-web_client.rules emerging-web_server.rules emerging-web_specific_apps.rules emerging-worm.rules enip-events.rules files.rules ftp-events.rules http-events.rules http2-events.rules ipsec-events.rules kerberos-events.rules modbus-events.rules mqtt-events.rules nfs-events.rules ntp-events.rules quic-events.rules rfb-events.rules smb-events.rules smtp-events.rules ssh-events.rules stream-events.rules threatview_CS_c2.rules tls-events.rules tor.rules websocket-events.rules Step #3 - "compile-libfuzzer-coverage-x86_64": + i=0 Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + set +x Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -q -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_siginit_seed_corpus.zip corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../suricata-verify Step #3 - "compile-libfuzzer-coverage-x86_64": + find . -name '*.pcap' Step #3 - "compile-libfuzzer-coverage-x86_64": + xargs zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_decodepcapfile_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb3-03-midstream/input.pcap (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-header-multi/input.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5633-gre-02/gre-sample.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-hdr-keyword-02/input.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/linktype-228/flow-test-01.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-unknown-1/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03-ips/temp6.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-sdp/sdp.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-04/20171220_smb_at_schedule.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-udp-scapy/input.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-many/input.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dce-gap-handling/input.pcap (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-3109/input.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-01/20171220_smb_psexec_mimikatz_ticket_dump-s2.pcap (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/zerologon/input.pcap (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-02/input.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02-ips/temp1.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-extended/ldap.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/telnet/telnet-01/telnet.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-header/input.pcap (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-write/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01/temp6.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-02/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-814/input.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4376/syn_retransmit_with_ts.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bittorrent-dht/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-06-tcp-data-leading-gap/tcp-leading-gap.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemd5/target.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-parser/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-request-frag-log/krb5-frag.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-05/20171220_smb_mimikatz_copy_to_host.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-eve-extended-option-60/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-http/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-04/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-02/input.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-01/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-05/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-03/input.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-double/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flow-drop-iponly-02/input.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-ips/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/from_base64-02/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-05/tls_DER-incomplete-content.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-3/arp-encap.pcap (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-id-02/input.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-issue-5223/input.pcap (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-01-no-evasion/without_evasion.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bsize-values-2/input.pcap (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1401-03/80000000-037-PTP_Example_IPv4_HTTP_Session-PUBLIC-tp-01.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-fileinfo/input.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-pipelining/input.pcap (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-partial-tx/in.pcap (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream3/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rset-starttls/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-disabled/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp-epsv/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-09-trunc-file-logging/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-mosquittoprops/input.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-01/icmp_and_ssh.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01-ips/temp6.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs4-01/input.pcap (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5197/input.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4810/pppoe-session-http.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6191/input.pcap (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-userpass-auto-clientid/input.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04/temp6.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5929-02/http2_multiple_headers.pcap (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2482-01/proxyCONNECT_443.pcap (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-ietf/input.pcap (deflated 4%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unintroduced/input.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4877/input.pcap (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-id-01/input.pcap (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-78-uricontent/input.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc-smb-test-01/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6402-01/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-04/tls_DER-incomplete-header.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-event-chunk/input.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-raw-header/input.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-compression-bug/input.pcap (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-07/20171220_smb_psexec_add_user.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-nsh-type1/input.pcap (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-segmentation-random/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5867-fp-drop-01/input.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03/temp6.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1449-01/suricata_stackoverflow.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2491-02/simple_http_download.onesided.nosyn.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-protocol-nodup/input.pcap (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-async-read/input.pcap (deflated 6%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-readdirplus/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unassigned-msgtype/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/community-id-ipv6/input.pcap (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-alerts/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/protocol-change-failed-event/input.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-6053/input.pcap (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-02-linux-evasion/with_evasion_linux.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-search/ldap.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-12/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-03/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-04/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-13/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-06/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-08/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-10/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-05/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-05-gap/tcp-simple-gap2.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-v3-unauth/snmp-v3-get-bulk-unauth.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-connect-rules/mqtt5_pub_jpeg.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb1-padding/smb_bug_padding.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-08/tcp_fastopen_segmentation-s1.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4503/input.pcap (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-url-base64/smtp-url-b64.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-2/input.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-userinfo-authority/http2_userinfo_in_authority_1.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-errors/smtperr.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-16/frag-16.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-3/frag-3.pcap (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-4/denial6-4.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-35/frag-35.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-9/frag-9.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-5/denial6-5.pcap (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-6/denial6-6.pcap (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-33/frag-33.pcap (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-26/frag-26.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-15/frag-15.pcap (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-4/frag-4.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-18/frag-18.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-28/frag-28.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-11/frag-11.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-30/frag-30.pcap (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-kill-router-gateway/kill_router6.pcap (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-8/frag-8.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-6/frag-6.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-22/frag-22.pcap (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-29/frag-29.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-31/frag-31.pcap (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-17/frag-17.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-27/frag-27.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-7/frag-7.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-1/denial6-1.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-1/frag-1.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-2/frag-2.pcap (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-36/frag-36.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-covert-dstopts/covert_send6.pcap (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-atomic-fragments-toobig/toobig.pcap (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-24/frag-24.pcap (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-rsmurf/rsmurf6.pcap (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-7/denial6-7.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-12/frag-12.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-10/frag-10.pcap (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-3/denial6-3.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-25/frag-25.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-smurf/smurf6.pcap (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-32/frag-32.pcap (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-23/frag-23.pcap (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-2/denial6-2.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-qos1/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-glupteba-mb/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-random-6989/input.pcap (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-fingerprint-alert/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft14/tls13_draft14.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-client-hello-frag-01/dump_mtu300.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-certs-alert/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft22/tls13_draft22.pcap (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft18/tls13_draft18.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-issuer/tls.pcap (deflated 6%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft28/tls13_draft28.pcap (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-02/tls-client-auth.pcap (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-subjectaltname/input.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-glupteba/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-pre-1970/input.pcap (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft19/tls13_draft19.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-noissuer/tls.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-random/input.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft23/tls13_draft23.pcap (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-single-disabled/test.pcap (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-beyond-body/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-01/tcp-overlap.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/cond-log-dns-dig/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-bind/ldap.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-range-multiflows/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-reversed-tcp-1/dns.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-frames-gap-payload-logging/smb2-peter-minus-p191.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb3-01/input.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-seq/input.pcap (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-invalid-qos/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql-bug-6080-probe-test-01/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-dce_iface/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rset/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bsize-0/input.pcap (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-03/icmp_and_ssh.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3341-tcphdr-01/urgent11_cve_2019_12260.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-ends-with-negated-02/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest12/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig27/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig36/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest27/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig01/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest04/test.fpc.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig03/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig29/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest09/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest15/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig20/test.fpc.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest11/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig18/test.fpc.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig16/test.fpc.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig28/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig37/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig06/test.fpc.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig09/test.fpc.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest16/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig26/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest05/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig22/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig34/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest22/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig31/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest23/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest01/test.fpc.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig15/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest07/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig12/test.fpc.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig33/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest13/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig02/test.fpc.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig05/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig17/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig04/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig13/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig25/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig07/test.fpc.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest02/test.fpc.pcap (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig32/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest26/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest30/test.fpc.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig35/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest08/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig21/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig23/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest14/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest28/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig24/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig30/test.fpc.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig08/test.fpc.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest03/test.fpc.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig19/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest25/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest06/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig38/test.fpc.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest10/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest29/test.fpc.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest21/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig14/test.fpc.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest24/test.fpc.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-hdr-keyword/input.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-decode-5885/input.pcap (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-2/input.pcap (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-overlap/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-urldecode/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6207-2/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-03-windows-evasion/with_evasion_windows.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2736-01/23_6594.pcap (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.8/04-vnc-openwall-3.8.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-very-small-inp/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-long-filename02/input.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-long-filename01/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-odd-len/input.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-line-test01/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-line-test02/input.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-stream-depth/input.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-rem-sp/input.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-small-rem-inp/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-full-msg-test02/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-full-msg-test01/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-03/input.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-02/input.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/bug-990/input.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve-log-https-only/test.pcap (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-z-bit/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-sshfp/dns-sshfp.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ids-dns-keywords/input.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-incomplete/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-null/input.pcap (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-answer-name/dns-udp-request-with-answer.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-txt/input.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-invalid-opcode/input.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-frames/input.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-eve-log-https-only/test.pcap (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-z-bit/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-null/input.pcap (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-txt/input.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-invalid-opcode/input.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-eve/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-srv/input.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-rcode/input.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-srv/input.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-tcp-multirequest-buffer/dns-tcp-multirequest-buffer.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve-empty-format/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/bug-1158/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-5379/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bypass-udp/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-tls/input.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-01/input.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3267-tcphdr/tcphdr_http.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-multi-eve/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-ftp-data/input.pcap (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-trailing-data/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-len-invalid/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-hlen-invalid-strict/input.pcap (deflated 10%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-01/input.pcap (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-05-state/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-qos1/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-http/filecontainer-http.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-bad-script/test.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-blocked-function-1/testmyids.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-range/http2-range.pcap (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-post-data-decompression/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/vxlan-decoder-01/input.pcap (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-missing-connect/input.pcap (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-qos1/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-named-pipe-ascii/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-userpass/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-sub-userpass/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb1-02/smb1_osx.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-ends-with-negated-01/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-sub-userpass/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-flowbits/input.pcap (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flowbit-oring/input.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/app-layer-template/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2158/public-ex1_section8_Sofacy.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line/input.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-split-handshake-01-4whs/split-handshake-4whs.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-01/tfo.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-userpass/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-dotprefix-02/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-02-tcp-exact-overlap-policy-oldlinux/tcp-overlap.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2491-01/simple_http_download.onesided.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-06/input-http-ACK.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-del/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-add/ldap.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-no-3whs-established/no-3whs.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scfileinfo/filecontainer-http-slice.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-z-flag-fp/suricatafpdnsdecoder.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4623/input.pcap (deflated 5%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/security-4710-02/input.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-qos1/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.3/06-vnc-Password-3.3.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-single-request-v1/input.pcap (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream5/input.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-data-rejected/10.7.29.101_49898-178.63.41.150_25.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-del-measure/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-response-line/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5392/TPWhite-carved-out-7787-s1.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls-alpn-log-detect-02/input.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-read/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5437-01/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-over-http2/dns_over_https.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-all-headers/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6244-tcp-rst-with-data/tcp-rst-with-data.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6733-syn-packet-flow-output/input.pcap (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-not09-spaces/input.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-pattern-matching/sip.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-krb5_msg_type/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-03-tcp-exact-overlap-ips/tcp-overlap.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-5408/input.pcap (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-vlan-02/input.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/truncate-applayer-test-01/input.pcap (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/vxlan-decoder-03/vxlan.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb1-data-offset/input.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tftp-tx-handling-wrq/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-nbss-more-ffsmb/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-issue-5868/bidi-logo.pcap (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-erspan-typeI-02/input.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-chdlc-01/hdlc-http_1tx.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipopts-esec/test.pcap (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3277-nfsv2-filestore/nfsv2.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-28/input.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-6-init-errors-fatal/empty.pcap (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ips-state-1/input.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-continuation/input.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-banner-only/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-keywords/enip_cip_example.pcap (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ipv4-tcp-syn/frag-ip-tcp-syn.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ipv6-tcp/frag-ip-tcp.pcap (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-eth-vlan-ipv4-tcp-syn/frag-eth-vlan-ip-tcp-syn.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ppp-ipv6-tcp/frag-ppp-ipv6-tcp.pcap (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-eth-vlan-ipv6-tcp/frag-eth-vlan-ipv6-tcp.pcap (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6942-6887-defrag-eth-ip-gre-ppp-ip-udp-data/eth-ip-gre-ppp-max-ip-packet.pcap (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ppp-ipv4-tcp-syn/frag-ppp-ip-tcp-syn.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-empty-sack/tcp-opt.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-raw-extraction/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-async/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-esp/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-05/tfo.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-userpass/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-xor/input.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-ftp-passive-mode/ftp-passive-mode.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-pattern-matching/sip.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-unsolicited/ldap.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-method/sip.pcap (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-write/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-toclient-start/dnp3_toclient_start.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-udp/cldap.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-extract-url-schemes/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-excessiveproplen/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh-only/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-missing-protocol/input.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-08-state-ipv6/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-tftp-01/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sticky-server/http-sticky-server.pcap (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-5981/input.pcap (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2646-01/input.pcap (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5162/input.pcap (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-130/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-userpass/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-rules/00-vnc-openwall-3.7.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-fail/input.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-tls/input.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-simple/input.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-fragmented/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6207-1/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-qos2/input.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-async/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-03-rule/smb2.pcap (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-unified2/xff-extradata.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-version-keyword/input.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev2-weak-dh/IKEv2_SA_INIT_2-8-weak.pcap (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-not09-file/input.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-eve-type-filtering/test.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-dns/test.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/websocket/basic_websockets.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-ipv6/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv4-hdr-keyword/input.pcap (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-en-spon/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-ntlmssp-negotiateflags/input.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-stats/test.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-02/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-ping/input.pcap (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-02-policy-oldlinux/tcp-overlap.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-reverse-overwrite/test.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-stream-after-swap/http-start-from-response.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-multiple-disabled/multi_mac.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-protodetect-bailout/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-2/arp.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-protocol-inspect-v2/http.pcap (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-04/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-02/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-03/input.pcap (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-01/input.pcap (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-05/input.pcap (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-select-operate/input.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-modify/ldap.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-upgrade-tls/input.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-cancel-request/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-simple-query-rollback/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-5000-query-results/input.pcap (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-5579/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-pwd-output-disabled/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-ssl-rejected-md5-auth-simple-query/input.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2646-02/input.pcap (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-bounce/test.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command/ftp-too-long-command.pcap (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-response/ftp-too-long-response.pcap (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-buffered/ftp-too-long-command.pcap (deflated 93%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-first/ftp-too-long-command.pcap (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-higher-limit/ftp-too-long-command.pcap (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sslv2-tls-upgrade-01/ssl-v2-s1.pcap (deflated 8%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5881-01/input.pcap (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-defrag-01/ipv4frags.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-simple/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-rule-flow/icmp.pcap (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-05/input.pcap (deflated 5%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-authority-mismatch/authority_and_host_2.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2558-02/2008.mp4.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-04-partial-overlap/tcp-overlap2.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-09/tcp-opt-invalid-warning.pcap (deflated 6%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-andx/smbandx.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rdp-protocol/RDP-003.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sha256-drop-02/input.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-tls-quic/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-03/tfo.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-compare/ldap.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04-ips/temp6.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-not09/input.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-named-pipe-unicode/input.pcap (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datarep-01/input.pcap (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/drop-protocol-change/input.pcap (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-10-syn-data-ignore/input.pcap (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-eve-extended/input.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1-rules/ikev1-isakmp-main-mode.pcap (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-junkrequest-first/input.pcap (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-length-5786/input.pcap (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-delete/input.pcap (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.1-forced/suricata-update-pdf.pcap (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-07/tcp_fastopen_segmentation.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/imap-detection/input.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-distance-within-1/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-deflate/http2_deflate.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-qos2/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-04-http-dns/input.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream/input.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-to-comma/10.7.29.101_49898-178.63.41.150_25.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb1-03-midstream/smb1_osx-s1-midstream-modified.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-modify-dn/ldap.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-smtp/input.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-kerberoasting/kerberoast.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-multiple-cl/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-async/input.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-dsize-values/input.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-vntag-03/input.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rfc2231/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-tcp-www-google-com-v1/dns.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb1-01/smb1.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-post-file/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-hdr-keyword-01/input.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-vlan/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-line/input.pcap (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-method/sip-tcp.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-userpass-auto-clientid/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-pub-rules/mqtt5_pub_jpeg.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-qos1/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-01-tcp-exact-overlap/tcp-overlap.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-5989/input.pcap (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-03/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-02/input.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-01/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-04/input.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-split-handshake-02-5whs/split-handshake-5whs.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-06/tfo-s1.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-qos1/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-async-01/input.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-smb-01/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6875-01/fuzz.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-dotprefix-03/input.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-cyu/input.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-pcrexform/input.pcap (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-v2c-get/SNMPv2c_get_requests.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata-01-alert/80000000-037-PTP_Example_IPv4_HTTP_Session-PUBLIC-tp-01-TEST1.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-chunked/input.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-02/icmp_and_ssh-s0.pcap (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6244-tcp-rst-with-data-02/tcp-rst-with-data.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issues/issue-4759.1/tcpdns.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-dce/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2769/issue_no_icmp.pcap (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-mosquittoprops/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5929-01/1e3b98e5dad2954.pcap (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-parent-path/one-packet.pcap (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-over-http2-post/dns_over_https_POST.pcap (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-4280-iprep/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-userpass-auto-clientid/input.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-whole-body/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-encoding-gzip-uncompressed/input.pcap (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-bugfixes/input.pcap (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-ftp-active-mode/ftp-active-mode.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-sctp-01/input.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02/temp1.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3519/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-itype-prefilter/icmpv4-ping.pcap (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bypass/input.pcap (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-body-inspect/http-aptget-ids-02-s2.pcap (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-midstream-split/mqtt-midstream-split.pcap (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-dotprefix-01/input.pcap (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-01/input.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-requires/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1045/smtpsuricataflowbitsFN.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-03/input.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-06/input.pcap (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-04/input.pcap (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-05/input.pcap (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-02/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-07/input.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-01/input.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-ipopts/input.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-495/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-215/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-307/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-497/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-192/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-132/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-400/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-322/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-446/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-319/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-324/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-286/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-102/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-203/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-031/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-261/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-133/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-331/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-379/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-433/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-337/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-026/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-466/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-251/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-005/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-084/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-181/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-242/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-125/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-295/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-074/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-499/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-016/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-325/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-329/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-075/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-480/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-052/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-285/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-413/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-205/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-456/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-302/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-333/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-305/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-294/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-360/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-120/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-416/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-357/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-255/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-176/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-145/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-396/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-373/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-136/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-122/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-321/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-091/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-332/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-408/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-064/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-154/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-441/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-301/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-065/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-377/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-093/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-190/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-383/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-270/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-173/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-404/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-309/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-269/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-117/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-174/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-041/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-426/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-361/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-440/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-135/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-317/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-412/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-241/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-092/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-013/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-055/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-178/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-340/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-421/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-153/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-131/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-023/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-087/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-407/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-448/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-134/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-283/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-209/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-056/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-376/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-252/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-160/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-349/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-077/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-478/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-034/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-232/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-449/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-207/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-062/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-114/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-002/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-239/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-053/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-368/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-281/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-447/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-437/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-148/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-182/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-237/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-080/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-032/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-364/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-450/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-223/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-221/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-198/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-171/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-146/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-152/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-141/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-382/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-275/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-025/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-411/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-279/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-167/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-085/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-250/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-434/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-045/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-187/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-356/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-003/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-238/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-343/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-159/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-432/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-051/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-024/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-284/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-344/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-202/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-482/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-282/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-249/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-058/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-475/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-431/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-079/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-183/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-168/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-112/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-188/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-424/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-036/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-471/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-129/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-442/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-414/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-350/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-474/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-289/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-128/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-435/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-219/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-288/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-119/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-257/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-029/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-226/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-378/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-468/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-263/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-485/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-069/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-458/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-313/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-230/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-060/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-158/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-022/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-001/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-402/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-021/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-477/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-067/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-367/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-268/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-277/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-098/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-308/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-392/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-246/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-047/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-253/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-211/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-216/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-278/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-072/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-395/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-214/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-116-lzma/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-415/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-386/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-106/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-240/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-451/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-048/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-170/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-086/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-492/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-498/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-206/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-081/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-151/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-179/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-422/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-097/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-175/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-108/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-233/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-457/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-479/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-011/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-365/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-180/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-107/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-291/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-201/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-410/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-464/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-351/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-006/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-165/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-363/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-139/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-262/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-401/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-166/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-338/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-227/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-127/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-346/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-210/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-070/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-137/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-484/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-427/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-130/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-476/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-169/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-341/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-445/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-345/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-004/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-370/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-063/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-335/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-362/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-483/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-199/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-019/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-453/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-172/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-347/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-038/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-059/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-044/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-244/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-229/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-140/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-204/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-033/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-455/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-296/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-118/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-259/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-273/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-256/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-328/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-444/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-366/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-030/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-353/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-054/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-008/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-399/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-189/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-109/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-372/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-144/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-096/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-318/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-039/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-200/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-191/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-452/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-101/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-156/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-027/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-500/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-358/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-465/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-470/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-315/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-489/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-138/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-359/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-193/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-310/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-355/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-050/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-088/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-384/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-473/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-406/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-418/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-348/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-066/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-254/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-147/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-197/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-089/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-300/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-419/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-488/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-369/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-115/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-212/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-014/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-037/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-380/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-303/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-460/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-094/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-494/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-143/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-083/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-297/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-164/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-467/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-430/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-035/input.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-028/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-280/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-472/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-326/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-388/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-371/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-290/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-217/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-149/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-266/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-076/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-496/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-258/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-184/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-000/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-042/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-394/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-461/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-236/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-420/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-078/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-073/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-161/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-428/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-293/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-126/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-142/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-186/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-298/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-196/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-234/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-110/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-381/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-490/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-391/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-272/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-487/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-374/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-274/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-099/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-491/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-018/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-082/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-061/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-287/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-155/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-195/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-235/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-375/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-245/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-007/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-208/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-090/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-057/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-390/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-105/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-323/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-397/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-009/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-218/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-162/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-312/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-316/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-264/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-247/input.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-438/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-095/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-385/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-409/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-339/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-243/input.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-501/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-330/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-111/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-436/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-220/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-265/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-020/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-040/input.pcap (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-068/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-459/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-320/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-015/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-398/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-454/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-194/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-267/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-150/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-327/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-049/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-439/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-113/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-352/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-403/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-462/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-387/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-228/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-222/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-493/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-100/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-405/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-017/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-292/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-299/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-463/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-306/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-046/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-271/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-157/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-469/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-486/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-389/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-213/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-071/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-425/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-429/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-163/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-124/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-121/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-123/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-311/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-443/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-481/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-334/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-103/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-276/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-342/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-248/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-336/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-010/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-393/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-177/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-354/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-314/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-417/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-012/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-231/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-304/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-185/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-043/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-224/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-423/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-225/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-260/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-104/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-frames-truncated/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2736-02/suricata.0400.pcap (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-1/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-dont/input.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-v3-encrypted/SNMPv3.pcap (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-01/smb2-peter.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/security-4710-01/input.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-pipeline-files-with-gap/input.pcap (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-nsh-type2/input.pcap (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-tcp-ts-gap/input.pcap (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-05-tcp-data-gap/tcp-simple-gap2.pcap (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/geneve-decoder/input.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2511/response_identity_identity_gzip_identity_gzip_gzip.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemagic-flowbits/pdf-dl.pcap (deflated 10%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-uri-spaces/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-not-established/input.pcap (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-userpass/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-auth-unrecognized/input.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-eve-log-query-only-v1/dns-udp-google.com-a-aaaa-mx.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-mss-keyword/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-request-flood/test.pcap (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/file-data-depth-inspection/file-data-depth-inspection.pcap (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2430/backwards.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-too-small/test.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5437-02/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-segmentation-postheader/input.pcap (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-close-headers/input.pcap (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb3-02-midstream/input.pcap (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-auth-bearer/input.pcap (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-padding/smb1_eicar_andx_write_padding2.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-opcode/dns-notify.pcap (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-eve-v2-udp-nxdomain-soa/dns-udp-nxdomain-soa.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-range-file/input.pcap (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-teredo-01/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-mime-truncated/input.pcap (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-76/input.pcap (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-04/test.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-qos2/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-newkeys/input.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh/input.pcap (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-tag-alert/input.pcap (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-quic/input.pcap (deflated 2%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-01/test-limit.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-command/input.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-urldecode-body/input.pcap (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-erspan-typeII-01/input.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-multiple100/input.pcap (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-4/input.pcap (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pop3/input.pcap (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-03/input.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-alert/enip_test1.pcap (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-async-cli/input.pcap (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-06-state-long/input.pcap (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh-incomplete/input.pcap (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-requires-off/input.pcap (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-probing/krb.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.7-stream-depth/input.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-too-many-layers/input.pcap (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-startssl/input.pcap (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-filename/input.pcap (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sticky-start/input.pcap (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata/testmyids.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4953/file76.pcap (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/community-id-ipv4/input.pcap (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-length-5770/input.pcap (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-userpass/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-eve/input.pcap (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/websocket-ping/input.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5633-gre-01/gre-udp.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/modbus/modbus.pcap (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp-port-memcap/input.pcap (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-double-request-response-v1/dns-udp-double-request-response.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connection-toclient/input.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh-reassembled/input.pcap (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sticky-location/http-sticky-location.pcap (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-delete/ldap.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ethernet-eve/test.pcap (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-01/input.pcap (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2512/sample_10.62.112.41_62227.pcap (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-attachment-md5/input.pcap (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2190/input.pcap (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-02/icmp.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-file-data-01/input.pcap (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-customauth/input.pcap (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-qos2/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-packet/test.pcap (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-frames-gap-payload-logging-02/smb2-peter-minus-p191-p192.pcap (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-invalid/input.pcap (deflated 89%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords2/input.pcap (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-reversed-udp-1/input.pcap (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-qos2/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/byte-extract-01/input.pcap (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-03-ips/tcp-overlap.pcap (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-04-partial-overlap/tcp-overlap2.pcap (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-11-reject-syn-data/tlpw-tcp-tfo-data-on-syn-nack.pcap (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-v2/input.pcap (deflated 8%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-packethdr/anomaly.pcap (deflated 5%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-userpass/input.pcap (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/icmp-hdr-02/input.pcap (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-hdr-keyword/input.pcap (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-06/20171220_smb_net_user.pcap (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-async-srv/input.pcap (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb/filecontainer-smb.pcap (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-ntlmssp-order/smb2.pcap (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowvarget/input.pcap (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3703/input.pcap (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-append-higher-priority/input.pcap (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-default/input.pcap (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-unsolicited-response-v1/dns-response-2x.pcap (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-body-frames/public-cloudshark-sip-s0.pcap (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-unbind/ldap.pcap (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/vxlan-decoder-02/vxlan.pcap (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-qos2/input.pcap (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": + find . -name '*.yaml' Step #3 - "compile-libfuzzer-coverage-x86_64": + xargs zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_confyamlloadstring_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": adding: etc/suricata-3.1.2.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: etc/suricata-4.0.3.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb3-03-midstream/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-header-multi/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-09-bug-6834-both-cidr/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-09-bug-6834-both-cidr/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5633-gre-02/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-hdr-keyword-02/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-3/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-3/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/linktype-228/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/feature-5976-zero-stats-02/suricata.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/feature-5976-zero-stats-02/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-unknown-1/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03-ips/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03-ips/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/stream-depth-reached-event/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-quotation-marks-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-quotation-marks-rule-1/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-sdp/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-04/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6278-1/suricata.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6278-1/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-opnum/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-udp-scapy/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-04/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-many/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dce-gap-handling/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-3109/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-01/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-03/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/zerologon/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dce-logging/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-stub-data/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-02/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dcepayload/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.6-stream-depth/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.6-stream-depth/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02-ips/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02-ips/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-unreachable-distance-1/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-extended/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/telnet/telnet-01/suricata.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/telnet/telnet-01/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-header/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-write/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-write/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-04-drop-alert/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-04-drop-alert/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/from_base64-03/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-02/suricata.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-02/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-814/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4376/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-06-bug-6834-dst/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-06-bug-6834-dst/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bittorrent-dht/test.yaml (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-06-tcp-data-leading-gap/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-06-tcp-data-leading-gap/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemd5/suricata.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemd5/test.yaml (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-parser/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-request-frag-log/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-request-frag-log/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-05/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-eve-extended-option-60/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-eve-extended-option-60/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-lua-rules/suricata.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-lua-rules/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-1m-StringSets/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-http/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-http/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-http/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-streaming/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-streaming/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.4-forced-with-meta/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.4-forced-with-meta/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.7/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.7/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-04/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-04/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-02/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-02/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-01/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-05/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-05/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-03/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-03/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-double/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-named-pipe-unicode/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flow-drop-iponly-02/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flow-drop-iponly-02/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-02/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-02/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-request-line/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-ips/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-02/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-02/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-07-bug-6834-src-cidr/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-07-bug-6834-src-cidr/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/from_base64-02/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-11-isset/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-11-isset/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3463/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-02/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-02/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-03/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-03/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-07/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-07/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-applayer-03/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-applayer-03/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-05/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-3/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-3/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-02/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-02/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-id-02/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-body-frames/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-issue-5223/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-01-no-evasion/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bsize-values-2/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1401-03/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-fileinfo/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-fileinfo/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-pipelining/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-partial-tx/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-partial-tx/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream3/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream3/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6109-reject-policy-ids/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6109-reject-policy-ids/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rset-starttls/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-01/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-01/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-disabled/test.yaml (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-frames/suricata.yaml (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-frames/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp-epsv/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcre-invalid-rule-01/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-09-trunc-file-logging/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-09-trunc-file-logging/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-simulated-flow-memcap/suricata.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-simulated-flow-memcap/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2558-01/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-mosquittoprops/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-mosquittoprops/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-05/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-05/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-01/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-01/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-01/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-01/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01-ips/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01-ips/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-range-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-range-rule-2/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs4-01/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5197/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4810/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6191/test.yaml (deflated 96%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-smb/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-smb/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-userpass-auto-clientid/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-userpass-auto-clientid/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/netflow-eve/suricata.yaml (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/netflow-eve/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-memcap-02/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5929-02/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2482-01/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-ietf/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unintroduced/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unintroduced/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4877/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4877/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemagic-01/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-id-01/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-protocol/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-78-uricontent/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc-smb-test-01/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6402-01/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-04/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-drop-flow/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-drop-flow/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-pass-flow/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-pass-flow/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-pass-flow/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-pass-flow/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-bypass/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-bypass/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-reject/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-reject/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-pass-packet/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-pass-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-drop-packet/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-drop-packet/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-pass-packet/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-pass-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-drop-flow/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-drop-flow/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-ignore/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-ignore/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-reject/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-reject/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-pass-flow/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-pass-flow/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-pass-packet/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-pass-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-drop-packet/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-drop-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-drop-packet/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-drop-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-pass-flow/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-pass-flow/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-ignore/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-ignore/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-drop-flow/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-drop-flow/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-ignore/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-ignore/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-ignore/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-ignore/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-bypass/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-bypass/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-pass-packet/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-pass-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-drop-packet/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-drop-packet/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-reject/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-reject/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-bypass/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-bypass/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-bypass/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-bypass/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-drop-flow/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-drop-flow/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-event-chunk/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-rule-1/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-raw-header/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-request-line/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-dsize-rule-3/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-dsize-rule-3/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-compression-bug/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-07/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-nsh-type1/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/requires-fail/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-segmentation-random/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_obj-alert/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_obj-alert/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-03/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5867-fp-drop-01/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5867-fp-drop-01/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ut-leakcheck/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-3/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1449-01/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2491-02/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2491-02/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-protocol-nodup/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-async-read/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-readdirplus/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unassigned-msgtype/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unassigned-msgtype/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-bug-7010/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/community-id-ipv6/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/community-id-ipv6/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-multiple/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-multiple/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-03/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-protocol/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-alerts/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-alerts/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/protocol-change-failed-event/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-6053/test.yaml (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6278-2/suricata.yaml (deflated 6%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6278-2/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-uri/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-02-linux-evasion/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-search/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-11/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-11/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-12/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-12/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-07/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-07/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-03/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-09/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-02/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-02/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-15/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-15/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-04/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-04/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-13/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-13/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-06/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-06/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-08/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-10/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-05/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-01/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-14/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-14/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-16/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-16/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-05-gap/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-05-gap/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-files/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-files/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-v3-unauth/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-connect-rules/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-connect-rules/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb1-padding/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb1-padding/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-08/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4503/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-url-base64/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-url-base64/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-2/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-userinfo-authority/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-errors/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-06/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-16/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-3/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-4/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-35/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-9/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-5/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-6/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-33/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-26/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-15/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-4/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-18/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-28/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-11/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-30/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-kill-router-gateway/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-8/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-6/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-22/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-29/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-31/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-17/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-27/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-7/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-1/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-1/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-2/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-36/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-covert-dstopts/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-atomic-fragments-toobig/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-24/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-rsmurf/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-7/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-12/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-10/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-3/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-25/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-smurf/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-32/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-23/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-2/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/show-help/test.yaml (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-qos1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-qos1/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s-requires-off/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s-requires-off/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-chain-len/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-chain-len/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-glupteba-mb/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-random-6989/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-fingerprint-alert/suricata.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-fingerprint-alert/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft14/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft14/test.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-client-hello-frag-01/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-certs-alert/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-certs-alert/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft28-frames/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft28-frames/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft22/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft22/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-subject/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft18/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft18/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-issuer/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft28/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft28/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-json-output-ids/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-json-output-ids/test.yaml (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-02/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-02/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-subjectaltname/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-glupteba/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-pre-1970/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-json-output-ips/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-json-output-ips/test.yaml (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s-requires/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s-requires/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-01/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-01/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft19/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft19/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-noissuer/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-random/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-client-cert-01/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-issuerdn/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft23/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft23/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-single-disabled/suricata.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-single-disabled/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-beyond-body/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-01/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-01/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/cond-log-dns-dig/test.yaml (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-bind/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-range-multiflows/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-reversed-tcp-1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-reversed-tcp-1/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-disabled/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-disabled/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-http-host-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-http-host-rule-2/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-frames-gap-payload-logging/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb3-01/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-seq/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-invalid-qos/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-invalid-qos/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql-bug-6080-probe-test-01/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql-bug-6080-probe-test-01/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-dce_iface/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rset/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bsize-0/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_func-alert/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_func-alert/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-03/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-03/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-range-offset-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-range-offset-rule-2/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3341-tcphdr-01/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-issue-5223-6/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-ends-with-negated-02/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest12/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig27/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig36/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest27/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig01/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest04/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig03/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig29/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest09/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest15/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig20/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest11/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig18/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig16/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig28/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig37/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig06/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig09/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest16/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig26/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest05/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig22/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig34/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest22/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig31/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest23/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest01/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig15/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest07/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig12/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig33/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest13/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig02/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig05/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig17/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig04/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig13/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig25/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig07/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest02/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig32/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest26/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest30/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig35/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest08/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig21/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig23/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest14/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest28/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig24/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig30/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig08/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest03/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig19/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest25/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest06/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig38/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest10/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest29/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest21/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig14/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest24/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-hdr-keyword/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-hostbits/detect-hostbits-03/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-hostbits/detect-hostbits-01/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-hostbits/detect-hostbits-02/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-decode-5885/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-02-load/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-2/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-2/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-overlap/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-urldecode/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-negate-fast-pattern-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-negate-fast-pattern-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6207-2/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6207-2/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-03-windows-evasion/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2736-01/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scpackettuple/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scpackettuple/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.8/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.8/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-nxdomain-soa/suricata.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-nxdomain-soa/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-2/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-2/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-02/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-very-small-inp/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-long-filename02/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-long-filename01/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-odd-len/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-line-test01/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-line-test02/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-stream-depth/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-rem-sp/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-small-rem-inp/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-full-msg-test02/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mime/mime-dec-parse-full-msg-test01/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-03/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-noalert/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-noalert/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-noalert/test.yaml (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-byte-extract-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-byte-extract-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-02/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-08-rule/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/bug-990/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve-log-https-only/suricata.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve-log-https-only/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/bug-856/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-z-bit/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-mx-only/suricata.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-mx-only/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-sshfp/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ids-dns-keywords/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-incomplete/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-unsolicited-response/suricata.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-unsolicited-response/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-null/suricata.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-null/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ids-dns-stream-rule/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-dns-ips-stream-rule/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-dig/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-double-request-response/suricata.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-double-request-response/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-query-only/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-query-only/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-aaaa-only/suricata.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-aaaa-only/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-answer-name/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-txt/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-invalid-opcode/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-rrtype/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-query-name/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-frames/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve/suricata.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/bug-990/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-eve-log-https-only/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-eve-log-https-only/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/bug-856/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-z-bit/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-mx-only/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-mx-only/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-incomplete/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-unsolicited-response/suricata.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-unsolicited-response/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-null/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-null/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-dig/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-double-request-response/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-double-request-response/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-query-only/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-query-only/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-aaaa-only/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-aaaa-only/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-txt/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-invalid-opcode/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-eve/suricata.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-eve/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-single-request/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-single-request/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-srv/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-srv/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-answer-only/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-udp-eve-log-answer-only/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-tcp-www-google-com/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-tcp-www-google-com/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-tcp-multirequest-buffer/suricata.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-tcp-multirequest-buffer/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/bug-1158/test.yaml (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ips-dns-keywords/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-single-request/suricata.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-single-request/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-rcode/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-srv/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-srv/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-answer-only/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-udp-eve-log-answer-only/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-tcp-www-google-com/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-tcp-www-google-com/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-tcp-multirequest-buffer/suricata.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-tcp-multirequest-buffer/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve-empty-format/suricata.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-eve-empty-format/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/bug-1158/test.yaml (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-5379/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bypass-udp/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-tls/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-01/suricata.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-01/test.yaml (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3267-tcphdr/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-03-set/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-multi-eve/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-multi-eve/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-quic-7.0.x-01/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-quic-7.0.x-01/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-ftp-data/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-ftp/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-trailing-data/test.yaml (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-len-invalid/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-hlen-invalid-strict/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-hlen-invalid-non-strict/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-01/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-05-state/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-relative-keyword-fast-pattern-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-relative-keyword-fast-pattern-rule-1/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-03/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-03/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-02/suricata.yaml (deflated 8%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-02/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-01/suricata.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-01/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-qos1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-qos1/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-http/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-http/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-bad-script/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-bad-script/logging.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-instruction-limit/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-blocked-function-1/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-memory-limit/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2917/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-range/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-range/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/http-header/test.yaml (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/ftpbounce/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/http_request_body/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/filemagic/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/dce_stub_data/test.yaml (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/dns_query/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/ipopts/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/dsize/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/stream_size/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/tcp-mss/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/tcp_ack/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/uricontent/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/tcp-seq-keyword/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/file_data/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/http_uri/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/content/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/flowbits/test.yaml (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-post-data-decompression/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/vxlan-decoder-01/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-missing-connect/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-missing-connect/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-qos1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-qos1/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-named-pipe-ascii/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-userpass/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-05-bug-6834-both/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-05-bug-6834-both/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-sub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-sub-userpass/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb1-02/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-ends-with-negated-01/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-sub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-sub-userpass/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-flowbits/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flowbit-oring/test.yaml (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/app-layer-template/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/app-layer-template/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-05/suricata.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-05/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3490/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-forward-overwrite/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-forward-overwrite/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2158/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/cond-log-http-testmyids/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-unsub-rules/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-unsub-rules/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-engine-proto/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-05/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5802/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5802/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-split-handshake-01-4whs/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-01/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-04/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-userpass/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-dotprefix-02/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-02-tcp-exact-overlap-policy-oldlinux/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-02-tcp-exact-overlap-policy-oldlinux/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2491-01/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-06/suricata.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-06/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-01/b.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-01/a.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-01/c.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-01/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-01/d.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-01/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-del/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-del/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-tcp-data/suricata.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-tcp-data/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-tcp-data/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-smtp/suricata.yaml (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-smtp/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-smtp/test.yaml (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-uri/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-04-multi-ring-profile/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-04-multi-ring-profile/test.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-frames-xpdu/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_data-alert/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_data-alert/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-eve/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-add/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5578-http-dsize-drop/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5578-http-dsize-drop/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-log-identity/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-log-identity/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-6/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-3/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-5/test.yaml (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-2/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-1/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-4/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5220/bug-5220-7/test.yaml (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-08-bug-6834-any-cidr/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-08-bug-6834-any-cidr/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-basic/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-basic/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-no-3whs-established/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-compress_whitespace-02/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scfileinfo/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scfileinfo/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-6-strict/suricata.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-6-strict/test.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-header/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-header/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-z-flag-fp/test.yaml (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-vntag-02/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4623/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/security-4710-02/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowtuple/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowtuple/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-qos1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-qos1/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/icmp-hdr-01/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.3/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-protocol-3.3/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata-02-pass/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream5/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream5/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-04/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-04/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-07-http-gap/suricata.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-07-http-gap/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-data-rejected/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-data-rejected/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-02-test/b.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-02-test/a.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-02-test/c.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-02-test/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-02-test/d.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-02-test/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-03/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-03/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemagic-flowbits-02/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-del-measure/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-del-measure/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-response-line/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5392/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5392/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls-alpn-log-detect-02/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-read/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-read/test.yaml (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-double-encoded-uri/suricata.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-double-encoded-uri/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5437-01/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-over-http2/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-all-headers/suricata.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-all-headers/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-02/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-03/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-03/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6244-tcp-rst-with-data/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-byte-extract/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6733-syn-packet-flow-output/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-not09-spaces/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/fileext-01/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-url-schemes-bug-5174/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-url-schemes-bug-5174/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-to_lowercase-01/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-01/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.8-stream-depth/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.8-stream-depth/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-types/test.yaml (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-to_lowercase-02/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-04/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-pattern-matching/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-06/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-06/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datarep-03-bad-reputation/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-ssn-memcap-01/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-ssn-memcap-01/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.5-both-enabled/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.5-both-enabled/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-krb5_msg_type/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-write/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-write/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-distance-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-distance-rule-2/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-03-tcp-exact-overlap-ips/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-03-tcp-exact-overlap-ips/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-5408/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-5408/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-01/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-01/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-02/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-vlan-02/suricata.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-vlan-02/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/truncate-applayer-test-01/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-02/suricata.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-02/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/vxlan-decoder-03/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb1-data-offset/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb1-data-offset/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tftp-tx-handling-wrq/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-nbss-more-ffsmb/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-issue-5868/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-issue-5868/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-erspan-typeI-02/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-chdlc-01/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipopts-esec/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipopts-esec/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3277-nfsv2-filestore/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata-04-flowvar/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-28/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-28/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-quic-7.0.x-02/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-quic-7.0.x-02/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemagic-flowbits-03/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ips-state-1/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-continuation/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filename-01/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/config-includes-array/af-packet.yaml (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/config-includes-array/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/config-includes-array/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-uncompressed-02-multi/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-uncompressed-02-multi/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-invalid-encoding/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-invalid-encoding/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-banner-only/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-offset-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-offset-rule-2/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-keywords/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-ruleparse-etopen-01/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ipv4-tcp-syn/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ipv4-tcp-syn/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ipv6-tcp/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ipv6-tcp/test.yaml (deflated 89%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-eth-vlan-ipv4-tcp-syn/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-eth-vlan-ipv4-tcp-syn/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ppp-ipv6-tcp/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ppp-ipv6-tcp/test.yaml (deflated 89%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-eth-vlan-ipv6-tcp/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-eth-vlan-ipv6-tcp/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6942-6887-defrag-eth-ip-gre-ppp-ip-udp-data/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6942-6887-defrag-eth-ip-gre-ppp-ip-udp-data/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ppp-ipv4-tcp-syn/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/defrag/bug-6887-defrag-ppp-ipv4-tcp-syn/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-empty-sack/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-04/suricata.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-04/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-02/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-ttl-ipv6/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-fail/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-fail/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-raw-extraction/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-raw-extraction/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-semicolon-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-semicolon-rule-2/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-async/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-esp/suricata.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-esp/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-02/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-05/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-userpass/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-frames/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-xor/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/classification-config-validate-01/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-07-frames/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-community/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-ftp-passive-mode/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-ftp-passive-mode/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line-03-frames-ips/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line-03-frames-ips/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-pattern-matching/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-unsolicited/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-03-multi-ring/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-03-multi-ring/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/from_base64-01/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-method/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-write/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-file-write/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-toclient-start/test.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-udp/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-extract-url-schemes/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-extract-url-schemes/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-strip_whitespace-01/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-excessiveproplen/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-excessiveproplen/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-within-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-within-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4394-pdonly-drop/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4394-pdonly-drop/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh-only/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-missing-protocol/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-7.0.x-02/suricata.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-7.0.x-02/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-applayer-02/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-applayer-02/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-08-state-ipv6/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-tftp-01/suricata.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-tftp-01/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-uncompressed-01/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-uncompressed-01/test.yaml (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/file-data-depth-inspection-alert/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sticky-server/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-5981/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-5981/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2646-01/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/streamsize-keyword-03-prefilter-pseudo/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-1/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-1/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5162/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-130/test.yaml (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-to_uppercase-01/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6859/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-userpass/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-rules/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-rules/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-fail/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-tls/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-simple/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connect/http-connect-fragmented/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6207-1/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-qos2/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-qos2/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-async/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-ttl/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/config-includes/overrides.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/config-includes/suricata.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/config-includes/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-03-rule/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls-alpn-client-log-01/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-05-tunnel/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-05-tunnel/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-7-init-errors-fatal/suricata.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-7-init-errors-fatal/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-unified2/suricata.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-unified2/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-04/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-04/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-04/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-03/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-03/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-version-keyword/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev2-weak-dh/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-not09-file/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-04-bug-6834-any/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-04-bug-6834-any/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-07-state-ip/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-eve-type-filtering/suricata.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-eve-type-filtering/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-dns/suricata.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-dns/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-itype/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-vntag-01/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-05/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3515/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-frames/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/websocket/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6617/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6617/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bsize-values-1/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-ipv6/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv4-hdr-keyword/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-en-spon/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-en-spon/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-ntlmssp-negotiateflags/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-compress_whitespace-01/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-stats/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-output-stats/test.yaml (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-02/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ut-complete/test.yaml (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-ping/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-ping/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sha256-drop/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sha256-drop/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-02-policy-oldlinux/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-02-policy-oldlinux/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-reverse-overwrite/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-reverse-overwrite/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5780-01-http2-header/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-stream-after-swap/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-content-limits-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-content-limits-1/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-7-plus/suricata.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/content-incomplete-hex-t-version-7-plus/test.yaml (deflated 1%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-multiple-disabled/suricata.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-multiple-disabled/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line-02-frames/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-DATA-line-02-frames/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/truncate-applayer-test-02/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-protodetect-bailout/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scrule-ids/suricata.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scrule-ids/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-03/suricata.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-03/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/proto-mismatch-http-ssh/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-2/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-2/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-protocol-inspect-v2/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-04/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-02/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-03/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-01/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcre/detect-pcre-05/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-select-operate/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-select-operate/test.yaml (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5198/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-modify/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-01/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6983-ids/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6983-ids/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-upgrade-tls/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-upgrade-tls/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-cancel-request/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-cancel-request/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6092-log-flags-and-metadata-01/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6092-log-flags-and-metadata-01/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-simple-query-rollback/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-simple-query-rollback/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6983-ips/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6983-ips/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-5000-query-results/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-5000-query-results/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6092-log-flags-and-metadata-02/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-6092-log-flags-and-metadata-02/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-5579/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-bug-5579/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-pwd-output-disabled/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-pwd-output-disabled/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-ssl-rejected-md5-auth-simple-query/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pgsql/pgsql-ssl-rejected-md5-auth-simple-query/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2646-02/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-stat-code/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-match-scrule/suricata.yaml (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-match-scrule/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-bounce/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-response/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-buffered/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-first/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-higher-limit/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp/ftp-too-long-command-higher-limit/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sslv2-tls-upgrade-01/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-reverse-extra-data/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-reverse-extra-data/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-stat-msg/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold-config-validate-02/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-09-load/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5881-01/test.yaml (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-depth-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-depth-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-defrag-01/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-defrag-01/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-simple/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-threshold-both-flow/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-threshold-both-flow/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bysrc-ipsubnet/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bysrc-ipsubnet/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-rule-flow/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-rule/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-rule/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-byeither-ipsubnet/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-byeither-ipsubnet/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bysrc-ip/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bysrc-ip/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-hostsrc/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-hostsrc/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bysrc-ipvar/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bysrc-ipvar/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-pair/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-pair/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-pair/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-pair/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-pair/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-pair/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-ippair/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-ippair/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/detection_filter-rule-hostsrc/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bydst-ipsubnet/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bydst-ipsubnet/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-flow/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-flow/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bydst-ip/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bydst-ip/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-hostdst/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-hostdst/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/detection_filter-rule-flow/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-hostdst/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-hostdst/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-rule/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-rule/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-rule-flow-backoff/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-threshold-threshold-flow/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-threshold-threshold-flow/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bydst-ipvar/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-bydst-ipvar/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-threshold-limit-flow/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-threshold-limit-flow/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-byeither-ipvar/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-byeither-ipvar/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-byeither-ip/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-suppress-byeither-ip/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-hostdst/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-hostdst/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-rule/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-rule/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-hostdst/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-reject-hostdst/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-hostsrc/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-pass-hostsrc/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-hostsrc/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-alert-hostsrc/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-rule/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-rule/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-rule-flow-backoff-single-flow/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-hostsrc/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold/threshold-config-rate-filter-drop-hostsrc/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bpf-command-line/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-05/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-authority-mismatch/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-metadata-off/suricata.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-metadata-off/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-dcerpc/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-dcerpc/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-03-bug-6834/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-03-bug-6834/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2558-02/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-02/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-02/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-reject-action-01/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-reject-action-01/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-7.0.x-01/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-7.0.x-01/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-05/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-05/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-04-partial-overlap/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-04-partial-overlap/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-metadata-defaults/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-metadata-defaults/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-09/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-andx/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rdp-protocol/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rdp-protocol/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-stat-msg/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sha256-drop-02/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sha256-drop-02/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-02-multi/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcap-log-lz4-02-multi/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-02/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-02/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-tls-quic/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-03/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-compare/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flow-drop-iponly-01/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flow-drop-iponly-01/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04-ips/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04-ips/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-not09/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/streamsize-keyword-02-prefilter/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-named-pipe-unicode/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datarep-01/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/drop-protocol-change/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-10-syn-data-ignore/suricata.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-10-syn-data-ignore/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-1/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-1/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-semicolon-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-semicolon-rule-1/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-eve-extended/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-eve-extended/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1-rules/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1-rules/test.yaml (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-offset-within-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-offset-within-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-04/suricata.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-04/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-01/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-01/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-03/suricata.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-03/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-05/suricata.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-05/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-06/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-06/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-07/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-07/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-02/suricata.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-master-switch/exception-policy-master-switch-02/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/transform-header-lowercase/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-file-data-02/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-udp-junkrequest-first/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-length-5786/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-delete/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-within-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-within-rule-2/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-04/suricata.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-04/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.1-forced/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.1-forced/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-07/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/imap-detection/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-distance-within-1/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-distance-within-1/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-01/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-01/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-deflate/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-qos2/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-qos2/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-04-http-dns/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-04/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-04/suricata.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-04/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-upgrade/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-upgrade/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-to-comma/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-metadata-enable-rule/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-metadata-enable-rule/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-07/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-07/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-rdp-01/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-rdp-01/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-stats-udp/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-stats-udp/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb1-03-midstream/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-modify-dn/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-03-drop-pass/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-03-drop-pass/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-smtp/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-kerberoasting/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-multiple-cl/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-async/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-dsize-values/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rfc2231/test.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb1-01/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tftp-tx-handling-rrq/test.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-post-file/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-hdr-keyword-01/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-vlan/suricata.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-flow-vlan/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-frames/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-frames/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-frames/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-line/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-method/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-userpass-auto-clientid/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-userpass-auto-clientid/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-pub-rules/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-pub-rules/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-qos1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-qos1/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-01-tcp-exact-overlap/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-01-tcp-exact-overlap/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-bug-5989/test.yaml (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-01/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-01/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-03/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-02/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-01/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4903/bug-4903-04/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-split-handshake-02-5whs/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-06/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-qos1/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-qos1/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-async-01/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-3/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-log-3/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/memcap-pressure/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/file-data-prefilter/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-smb-01/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-smb-01/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6875-01/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6875-01/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-dotprefix-03/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-cyu/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-pcrexform/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-78-http-uri/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-03/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-03/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-v2c-get/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata-01-alert/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-chunked/test.yaml (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-02/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-02/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6244-tcp-rst-with-data-02/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issues/issue-4759/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issues/issue-4759.1/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-dce/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2769/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-mosquittoprops/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-pub-mosquittoprops/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5929-01/test.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-absolute-allowed/suricata.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-absolute-allowed/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-absolute-path/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-absolute-path/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-deny-save/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-deny-save/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-parent-path/suricata.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets/datasets-parent-path/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-over-http2-post/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-05/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-4280-iprep/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-4280-iprep/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-userpass-auto-clientid/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-userpass-auto-clientid/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-verbose/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-alert-verbose/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-dhcp-01/suricata.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-dhcp-01/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-whole-body/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-version-keyword-invalid/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-encoding-gzip-uncompressed/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-bugfixes/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-bugfixes/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bsize-01/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold-config-validate-01/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-ftp-active-mode/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-ftp-active-mode/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-sctp-01/test.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-within-within-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-within-within-rule-1/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-01/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-01/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-alert-log/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-alert-log/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3519/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-itype-prefilter/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bypass/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-07/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-07/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-quotes-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-quotes-rule-1/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-response-line/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-strip-whitespace-01/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-body-inspect/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-alert/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-alert/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-alert/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-ends-with-negated-03/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-midstream-split/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-dotprefix-01/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-files-6/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-files-6/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-1/test.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-01/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-requires/suricata.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-requires/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1045/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-03/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-06/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-04/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-05/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-02/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-07/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/uricontent/detect-uricontent-01/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-forward-extra-data/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-xff-eve-forward-extra-data/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-ipopts/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-2/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-495/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-215/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-307/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-497/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-192/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-132/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-400/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-322/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-446/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-319/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-324/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-286/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-102/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-203/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-031/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-261/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-133/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-331/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-379/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-433/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-337/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-026/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-466/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-251/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-005/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-084/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-181/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-242/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-125/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-295/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-074/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-499/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-016/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-325/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-329/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-075/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-480/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-052/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-285/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-413/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-205/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-456/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-302/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-333/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-305/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-294/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-360/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-120/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-416/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-357/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-255/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-176/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-145/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-396/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-373/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-136/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-122/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-321/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-091/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-332/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-408/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-064/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-154/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-441/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-301/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-065/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-377/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-093/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-190/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-383/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-270/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-173/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-404/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-309/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-269/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-117/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-174/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-041/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-426/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-361/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-440/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-135/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-317/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-412/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-241/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-092/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-013/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-055/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-178/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-340/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-421/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-153/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-131/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-023/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-087/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-407/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-448/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-134/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-283/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-209/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-056/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-376/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-252/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-160/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-349/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-077/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-478/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-034/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-232/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-449/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-207/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-062/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-114/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-002/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-239/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-053/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-368/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-281/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-447/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-437/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-148/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-182/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-237/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-080/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-032/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-364/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-450/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-223/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-221/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-198/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-171/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-146/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-152/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-141/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-382/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-275/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-025/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-411/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-279/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-167/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-085/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-250/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-434/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-045/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-187/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-356/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-003/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-238/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-343/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-159/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-432/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-051/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-024/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-284/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-344/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-202/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-482/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-282/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-249/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-058/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-475/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-431/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-079/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-183/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-168/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-112/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-188/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-424/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-036/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-471/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-129/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-442/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-414/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-350/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-474/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-289/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-128/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-435/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-219/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-288/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-119/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-257/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-029/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-226/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-378/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-468/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-263/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-485/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-069/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-458/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-313/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-230/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-060/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-158/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-022/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-001/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-402/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-021/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-477/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-067/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-367/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-268/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-277/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-098/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-308/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-392/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-246/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-047/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-253/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-211/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-216/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-278/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-072/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-395/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-214/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-116-lzma/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-415/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-386/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-106/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-240/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-451/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-048/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-170/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-086/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-492/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-498/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-206/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-081/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-151/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-179/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-422/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-097/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-175/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-108/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-233/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-457/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-479/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-011/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-365/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-180/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-107/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-291/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-201/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-410/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-464/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-351/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-006/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-165/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-363/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-139/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-262/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-401/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-166/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-338/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-227/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-127/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-346/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-210/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-070/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-137/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-484/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-427/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-130/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-476/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-169/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-341/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-445/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-345/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-004/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-370/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-063/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-335/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-362/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-483/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-199/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-019/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-453/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-172/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-347/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-038/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-059/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-044/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-244/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-229/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-140/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-204/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-033/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-455/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-296/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-118/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-259/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-273/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-256/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-328/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-444/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-366/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-030/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-353/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-054/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-008/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-399/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-189/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-109/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-372/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-144/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-096/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-318/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-039/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-200/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-191/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-452/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-101/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-156/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-027/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-500/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-358/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-465/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-470/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-315/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-489/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-138/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-359/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-193/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-310/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-355/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-050/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-088/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-384/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-473/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-406/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-418/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-348/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-066/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-254/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-147/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-197/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-089/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-300/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-419/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-488/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-369/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-115/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-212/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-014/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-037/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-380/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-303/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-460/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-094/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-494/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-143/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-083/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-297/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-164/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-467/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-430/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-035/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-028/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-280/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-472/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-326/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-388/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-371/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-290/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-217/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-149/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-266/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-076/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-496/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-258/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-184/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-000/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-042/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-394/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-461/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-236/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-420/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-078/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-073/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-161/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-428/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-293/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-126/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-142/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-186/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-298/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-196/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-234/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-110/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-381/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-490/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-391/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-272/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-487/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-374/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-274/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-099/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-491/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-018/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-082/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-061/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-287/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-155/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-195/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-235/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-375/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-245/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-007/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-208/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-090/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-057/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-390/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-105/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-323/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-397/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-009/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-218/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-162/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-312/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-316/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-264/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-247/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-438/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-095/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-385/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-409/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-339/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-243/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-501/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-330/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-111/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-436/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-220/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-265/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-020/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-040/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-068/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-459/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-320/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-015/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-398/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-454/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-194/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-267/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-150/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-327/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-049/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-439/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-113/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-352/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-403/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-462/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-387/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-228/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-222/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-493/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-100/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-405/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-017/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-292/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-299/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-463/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-306/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-046/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-271/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-157/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-469/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-486/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-389/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-213/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-071/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-425/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-429/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-163/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-124/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-121/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-123/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-311/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-443/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-481/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-334/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-103/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-276/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-342/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-248/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-336/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-010/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-393/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-177/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-354/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-314/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-417/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-012/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-231/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-304/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-185/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-043/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-224/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-423/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-225/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-260/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-evader/http-evader-104/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-frames-truncated/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-frames-truncated/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.3-fserror/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.3-fserror/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-add-04/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-05/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2736-02/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-invalid/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datarep-02/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filesize-keyword/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-arp-1/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/reference-config-validate-01/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-dont/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-dont/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/snmp-v3-encrypted/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-01/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/security-4710-01/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-frames/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-frames/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-01/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-01/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-pipeline-files-with-gap/suricata.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-pipeline-files-with-gap/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-10-bug-6834-dst-cidr/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-10-bug-6834-dst-cidr/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-nsh-type2/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-tcp-ts-gap/suricata.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-tcp-ts-gap/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-05-tcp-data-gap/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-05-tcp-data-gap/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-3/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-limit-3/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/geneve-decoder/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-http-host-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-http-host-rule-1/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2511/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemagic-flowbits/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-http/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-http/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-uri-spaces/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-not-established/suricata.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-not-established/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-not-established/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-pub-userpass/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-auth-unrecognized/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-tls-7.0.x/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-03-pcap/b.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-03-pcap/a.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-03-pcap/c.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-03-pcap/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-03-pcap/d.yaml (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/multi-tenant-03-pcap/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-mss-keyword/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-02/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-request-flood/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dhcp-request-flood/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/file-data-depth-inspection/test.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2430/test.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc-smb-fail/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1401-04/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-too-small/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-strip_whitespace-02/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-simple-frames/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-simple-frames/test.yaml (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/threshold-config-byrule/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5437-02/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-segmentation-postheader/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-05/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-05/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-close-headers/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb3-02-midstream/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-state-isnotset/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-frames/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-frames/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-auth-bearer/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-applayer-01/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-applayer-01/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-offset-offset-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-offset-offset-rule-1/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-06/suricata.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-06/test.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/streamsize-keyword/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-padding/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-opcode/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-eve-v2-udp-nxdomain-soa/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-eve-v2-udp-nxdomain-soa/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-05/suricata.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-05/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-range-file/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-teredo-01/test.yaml (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-frames/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-mime-truncated/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-mime-truncated/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-76/test.yaml (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-04/suricata.yaml (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-04/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-qos2/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-unsub-qos2/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-newkeys/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-tag-alert/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-tag-alert/default.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-tag-alert/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-quic/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-response-line/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-01/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-01/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-long-command/test.yaml (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-urldecode-body/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-erspan-typeII-01/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-multiple100/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/reputation-config/reputation-config-lf/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/reputation-config/reputation-config-cr-lf/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/reputation-config/reputation-config-cr/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-4/test.yaml (deflated 86%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1401-01/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-sub-03/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pop3/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-03/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-alert/test.yaml (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-dce_opnum/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-async-cli/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-06-state-long/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh-incomplete/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-requires-off/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-probing/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-probing/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-04/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-04/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.7-stream-depth/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.7-stream-depth/test.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-too-many-layers/test.yaml (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-dsize-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-dsize-rule-2/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-startssl/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-filename/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sticky-start/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rfb-rules-8/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/fileext-02/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4953/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/community-id-ipv4/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/community-id-ipv4/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-div-01/test.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-length-5770/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-userpass/test.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-eve/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-eve/test.yaml (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/websocket-ping/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-binary-message/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-binary-message/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5633-gre-01/test.yaml (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/modbus/suricata.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/modbus/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ftp-port-memcap/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.2-forced-with-open-files/suricata.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.2-forced-with-open-files/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-4407/suppress.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-4407/suricata.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-4407/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6149-exception-policy-auto-ips/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6149-exception-policy-auto-ips/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-to_uppercase-02/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-01/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-01/test.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-06/suricata.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-stream-reassembly-memcap-06/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-01/test.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-bug-5109/test.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-stat-code/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-connection-toclient/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-sub-rules/suricata.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-sub-rules/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ssh-hassh-reassembled/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/transform-strip-pseudo-headers/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-named-pipe-ascii-frames/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-named-pipe-ascii-frames/test.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-sticky-location/test.yaml (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/feature-5976-zero-stats-01/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/feature-5976-zero-stats-01/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-03/suricata.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-03/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-delete/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-05/suricata.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-05/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-ip_proto-01/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-config-empty-rule-file/suricata.yaml (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-config-empty-rule-file/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-02-ips/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-02-ips/test.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ethernet-eve/suricata.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ethernet-eve/test.yaml (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-simple-frames-ips/suricata.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-gap-simple-frames-ips/test.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-01/test.yaml (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1-transforms/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ikev1-transforms/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2512/test.yaml (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.9-stream-depth/suricata.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.9-stream-depth/test.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-attachment-md5/test.yaml (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2190/test.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-02/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-02/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-04/suricata.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-midstream-04/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-file-data-01/test.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-customauth/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt5-sub-customauth/test.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-qos2/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt31-unsub-qos2/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-distance-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-distance-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-packet/suricata.yaml (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-packet/test.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-frames-gap-payload-logging-02/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/geoip/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/geoip/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowstats/suricata.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowstats/test.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-invalid/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords2/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords2/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-reversed-udp-1/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-reversed-udp-1/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-06/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-qos2/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-pub-qos2/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/byte-extract-01/test.yaml (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-03-ips/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-03-ips/test.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6149-exception-policy-auto-ids/suricata.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6149-exception-policy-auto-ids/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1401-02/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-flow-pkts/test.yaml (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-single/suricata.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mac-eve-single/test.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/reference-config-validate-02/test.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-04-partial-overlap/suricata.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-04-partial-overlap/test.yaml (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-erspan-typeI-01/test.yaml (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-range/test.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-11-reject-syn-data/suricata.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-11-reject-syn-data/test.yaml (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-v2/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-packethdr/suricata.yaml (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-packethdr/test.yaml (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-memcap-01/test.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-userpass/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-userpass/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-mult-04/test.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/icmp-hdr-02/test.yaml (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-hdr-keyword/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-06/test.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-async-srv/test.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/requires-ok/test.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-02/suricata.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-02/test.yaml (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-smb/test.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-keywords-suricata8/suricata.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/enip-keywords-suricata8/test.yaml (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-ntlmssp-order/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowvarget/suricata.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua-scflowvarget/test.yaml (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3703/suricata.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3703/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-append-higher-priority/suricata.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-append-higher-priority/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-default/suricata.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-default/test.yaml (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-20/suricata.yaml (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-max/alert-max-20/test.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-md5/suricata.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-md5/test.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-body-frames/test.yaml (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-16/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-16/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-13/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-13/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-5/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-5/test.yaml (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-7/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-7/test.yaml (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-19/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-19/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-6/suricata.yaml (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-6/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-2/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-2/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-3/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-3/test.yaml (deflated 89%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-11/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-11/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-15/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-15/test.yaml (deflated 84%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-18/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-18/test.yaml (deflated 10%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-8/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-8/test.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-17/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-17/test.yaml (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-1/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-1/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-14/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-14/test.yaml (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-4/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-4/test.yaml (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-10/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-10/test.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-9/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-9/test.yaml (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-12/suricata.yaml (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rule-grouping/rule-grouping-12/test.yaml (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/classification-config-validate-02/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ldap-unbind/test.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-byte-extract-rule-2/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-byte-extract-rule-2/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/vxlan-decoder-02/test.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-qos2/suricata.yaml (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt311-unsub-qos2/test.yaml (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-metadata-03-noalert/test.yaml (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-offset-distance-rule-1/suricata.yaml (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-offset-distance-rule-1/test.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": + find . -name '*.rules' Step #3 - "compile-libfuzzer-coverage-x86_64": + xargs zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_siginit_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663/test.rules (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-header-multi/test.rules (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-09-bug-6834-both-cidr/iprep.rules (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5633-gre-02/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-hdr-keyword-02/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-hex-rule-3/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-unknown-1/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03-ips/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/stream-depth-reached-event/test.rules (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-quotation-marks-rule-1/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-opnum/test.rules (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-04/test.rules (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-many/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-3109/dcerpc.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-01/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-03/test.rules (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/zerologon/test.rules (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-stub-data/test.rules (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dce-iface-02/test.rules (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc/dcerpc-dcepayload/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-v2.6-stream-depth/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-02-ips/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-unreachable-distance-1/test.rules (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/telnet/telnet-01/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-request-header/test.rules (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-04-drop-alert/test.rules (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/from_base64-03/test.rules (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-814/test.rules (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4376/test.rules (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-06-bug-6834-dst/iprep.rules (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-payload-06-tcp-data-leading-gap/test.rules (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemd5/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/krb5-request-frag-log/test.rules (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns-lua-rules/test.rules (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-1m-StringSets/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-04/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-02/test.rules (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-01/test.rules (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-05/test.rules (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/engine-state/detect-engine-state-03/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-named-pipe-unicode/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/flow-drop-iponly-02/test.rules (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-udp-flow-rule-02/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-request-line/test.rules (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-ips/input.rules (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-02/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-07-bug-6834-src-cidr/iprep.rules (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/from_base64-02/test.rules (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/iprep-11-isset/iprep.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3463/test.rules (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5464-verdict-02/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-07/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-05/tls-events.rules (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5066-iponly-cidr-ordering-02/test.rules (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-id-02/test.rules (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-body-frames/test.rules (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-issue-5223/test.rules (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-01-no-evasion/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bsize-values-2/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1401-03/1.rules (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-keywords/test.rules (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids-midstream3/test.rules (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6109-reject-policy-ids/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-01/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-disabled/test.rules (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/pcre-invalid-rule-01/test.rules (deflated 93%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-simulated-flow-memcap/test.rules (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2558-01/1.rules (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-anomaly-05/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-01/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-5466-alert-then-pass-01/test.rules (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-01-ips/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-range-rule-2/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs4-01/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5197/test.rules (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/droped-flow-applayer-event-logged-smb/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-memcap-02/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-04/test.rules (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5929-02/test.rules (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2482-01/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-ietf/test.rules (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unintroduced/test.rules (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4877/test.rules (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filemagic-01/test.rules (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-id-01/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616/input.rules (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-protocol/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-78-uricontent/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dcerpc-smb-test-01/test.rules (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6402-01/test.rules (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-04/tls-events.rules (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-drop-flow/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-pass-flow/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-pass-flow/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-bypass/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-reject/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-ignore/test.rules (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-pass-flow/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-pass-flow/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-disabled-ignore/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-ignore/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-enabled-ignore/test.rules (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ips-midstream-disabled-bypass/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5825-midstream-exception-policy/exception-policy-ids-midstream-enabled-bypass/test.rules (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-event-chunk/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-depth-rule-1/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http-raw-header/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-request-line/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-content-dsize-rule-3/test.rules (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/decode-nsh-type1/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/requires-fail/test.rules (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-file-segmentation-random/test.rules (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_obj-alert/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytejump-03/test.rules (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-5867-fp-drop-01/test.rules (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-3/test.rules (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2576-03/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1449-01/smtp-events.rules (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2491-02/async-oneside-test.rules (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-readdirplus/test.rules (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-unassigned-msgtype/test.rules (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ja4-rules-bug-7010/test.rules (deflated 10%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-03/tls-events.rules (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-protocol/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/quic-alerts/test.rules (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/protocol-change-failed-event/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/sip-tcp-uri/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-02-linux-evasion/test.rules (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-11/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-12/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-07/test.rules (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-03/test.rules (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-09/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-02/test.rules (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-15/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-04/test.rules (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-13/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-06/test.rules (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-08/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-10/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-05/test.rules (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-01/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-14/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/util-action-tests/util-action-16/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-05-gap/test.rules (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-files/test.rules (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-connect-rules/test.rules (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-fastopen-08/test.rules (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4503/test.rules (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4199-2/test.rules (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-userinfo-authority/test.rules (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-pcrexform-06/test.rules (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-16/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-3/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-4/test.rules (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-35/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-9/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-5/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-6/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-33/test.rules (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-26/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-15/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-4/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-18/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-28/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-11/test.rules (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-30/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-kill-router-gateway/test.rules (deflated 33%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-8/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-6/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-22/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-29/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-31/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-17/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-27/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-7/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-1/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-1/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-2/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-36/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-covert-dstopts/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-atomic-fragments-toobig/test.rules (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-24/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-rsmurf/test.rules (deflated 8%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-7/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-12/test.rules (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-10/test.rules (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-3/test.rules (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-25/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-smurf/test.rules (deflated 8%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-32/test.rules (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-malformed-fragments-23/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/ipv6-evasion/ipv6-dos-with-ext-headers-2/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s-requires-off/test.rules (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-chain-len/test.rules (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-glupteba-mb/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-random-6989/test.rules (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-fingerprint-alert/test.rules (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-client-hello-frag-01/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-certs-alert/test.rules (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s/test.rules (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls13-draft28-frames/test.rules (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-subject/tls.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-issuer/tls.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-02/tls.rules (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-subjectaltname/test.rules (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-glupteba/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-ja3s-requires/test.rules (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-store-01/tls.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-cert-noissuer/tls.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-random/test.rules (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-client-cert-01/tls.rules (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tls/tls-issuerdn/tls.rules (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-overlap-payload-01/tcp-overlap.rules (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/cond-log-dns-dig/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/http2-disabled/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-http-host-rule-2/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-frames-gap-payload-logging/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-icmp-seq/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/mqtt-events-invalid-qos/test.rules (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-dce_iface/test.rules (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smtp-rset/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bsize-0/test.rules (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/alert-testmyids/test.rules (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dnp3-dnp3_func-alert/test.rules (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-4663-03/test.rules (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-dsize-range-offset-rule-2/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3341-tcphdr-01/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-issue-5223-6/test.rules (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-content-ends-with-negated-02/test.rules (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest12/test.rules (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig27/test.rules (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig36/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest27/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig01/test.rules (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest04/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig03/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig29/test.rules (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest09/test.rules (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest15/test.rules (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig20/test.rules (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest11/test.rules (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig18/test.rules (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig16/test.rules (deflated 24%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig28/test.rules (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig37/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig06/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig09/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest16/test.rules (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig26/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest05/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig22/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig34/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest22/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig31/test.rules (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest23/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest01/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig15/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest07/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig12/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig33/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest13/test.rules (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig02/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig05/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig17/test.rules (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig04/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig13/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig25/test.rules (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig07/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest02/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig32/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest26/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest30/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig35/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest08/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig21/test.rules (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig23/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest14/test.rules (deflated 30%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest28/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig24/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig30/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig08/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest03/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig19/test.rules (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest25/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest06/test.rules (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig38/test.rules (deflated 13%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest10/test.rules (deflated 31%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest29/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest21/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/UriTestSig14/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-http-uri/DetectEngineHttpRawUriTest24/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-hdr-keyword/test.rules (deflated 11%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-hostbits/detect-hostbits-03/test.rules (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-hostbits/detect-hostbits-01/test.rules (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-hostbits/detect-hostbits-02/test.rules (deflated 68%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/base64-decode-5885/test.rules (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-02-load/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb-eicar-overlap/test.rules (deflated 35%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3616-urldecode/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-negate-fast-pattern-rule-1/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-6207-2/suricata.rules (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-3286-03-windows-evasion/test.rules (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2736-01/test.rules (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-1450-02/tls-events.rules (deflated 85%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-app-layer-protocol-03/test.rules (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-pcap-log-conditional-noalert/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-byte-extract-rule-1/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytetest-02/test.rules (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/smb2-08-rule/test.rules (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/bug-990/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-z-bit/dns-events.rules (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ids-dns-keywords/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-incomplete/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ids-dns-stream-rule/test.rules (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-dns-ips-stream-rule/test.rules (deflated 28%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-answer-name/test.rules (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-invalid-opcode/test.rules (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-rrtype/test.rules (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-query-name/test.rules (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-frames/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/bug-990/test.rules (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-z-bit/dns-events.rules (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-incomplete/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/v2/dns-invalid-opcode/test.rules (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/task-7018-ips-dns-keywords/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/dns/dns-rcode/test.rules (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/tcp-5379/test.rules (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bypass-udp/test.rules (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/nfs3-01/test.rules (deflated 76%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/issue-3267-tcphdr/test.rules (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-03-set/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-multi-eve/test.rules (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/output-eve-ftp-data/test.rules (deflated 64%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-trailing-data/test.rules (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-len-invalid/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-hlen-invalid-strict/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/udp-5379/udp-hlen-invalid-non-strict/test.rules (deflated 17%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-bytemath-01/test.rules (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/datasets-05-state/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test-bad-relative-keyword-fast-pattern-rule-1/test.rules (deflated 26%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/eve-tag-03/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/detect-filestore-config-02/test.rules (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/exception-policy-default-01/test.rules (deflated 44%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/filestore-filecontainer-http/test.rules (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-bad-script/test.rules (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-instruction-limit/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-blocked-function-1/test.rules (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/lua/lua-memory-limit/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/bug-2917/test.rules (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/http-header/test.rules (deflated 81%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/ftpbounce/test.rules (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/http_request_body/test.rules (deflated 15%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/filemagic/test.rules (deflated 77%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/dce_stub_data/test.rules (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/dns_query/test.rules (deflated 12%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/ipopts/test.rules (deflated 79%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/rules/dsize/test.rules (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: t