starting build "af298092-fe83-4622-88f2-7ed7f0fecf92" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 7.68kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 800687449569: Pulling fs layer Step #1: 67cc84ed39bf: Pulling fs layer Step #1: 33c4464df317: Pulling fs layer Step #1: 7a3d59ffed63: Pulling fs layer Step #1: bc24bccd8f7c: Pulling fs layer Step #1: 18d20619fb8d: Pulling fs layer Step #1: 0ec212d79142: Pulling fs layer Step #1: 0d731e844f5b: Pulling fs layer Step #1: 03e6d4298870: Pulling fs layer Step #1: 9cb6c9480ffe: Pulling fs layer Step #1: 7a3d59ffed63: Waiting Step #1: 636367483a85: Pulling fs layer Step #1: ab160a08f40f: Pulling fs layer Step #1: 0d731e844f5b: Waiting Step #1: d56fb1501120: Pulling fs layer Step #1: 03e6d4298870: Waiting Step #1: bc24bccd8f7c: Waiting Step #1: 6e5ee80d4b76: Pulling fs layer Step #1: 18d20619fb8d: Waiting Step #1: 069b70ca1828: Pulling fs layer Step #1: 0ec212d79142: Waiting Step #1: d56fb1501120: Waiting Step #1: 9cb6c9480ffe: Waiting Step #1: 082a5c4ba783: Pulling fs layer Step #1: aeb889ce9374: Pulling fs layer Step #1: 082a5c4ba783: Waiting Step #1: 6e5ee80d4b76: Waiting Step #1: 636367483a85: Waiting Step #1: 069b70ca1828: Waiting Step #1: aeb889ce9374: Waiting Step #1: b3c77a307741: Pulling fs layer Step #1: 19afa95abd0d: Pulling fs layer Step #1: 3331bfca5447: Pulling fs layer Step #1: ca89507fe8d3: Pulling fs layer Step #1: 093d0a8d4813: Pulling fs layer Step #1: 562130e5e1f0: Pulling fs layer Step #1: c78d65770fdc: Pulling fs layer Step #1: d8a48a39f3bb: Pulling fs layer Step #1: d547270a8392: Pulling fs layer Step #1: cd72b15f7674: Pulling fs layer Step #1: fed123fa2f8a: Pulling fs layer Step #1: 39a8609a58c5: Pulling fs layer Step #1: ab160a08f40f: Waiting Step #1: 19afa95abd0d: Waiting Step #1: 3331bfca5447: Waiting Step #1: b3c77a307741: Waiting Step #1: 093d0a8d4813: Waiting Step #1: 562130e5e1f0: Waiting Step #1: c78d65770fdc: Waiting Step #1: d8a48a39f3bb: Waiting Step #1: d547270a8392: Waiting Step #1: ca89507fe8d3: Waiting Step #1: cd72b15f7674: Waiting Step #1: 67cc84ed39bf: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 33c4464df317: Verifying Checksum Step #1: 33c4464df317: Download complete Step #1: 7a3d59ffed63: Verifying Checksum Step #1: 7a3d59ffed63: Download complete Step #1: bc24bccd8f7c: Verifying Checksum Step #1: bc24bccd8f7c: Download complete Step #1: 0ec212d79142: Verifying Checksum Step #1: 0ec212d79142: Download complete Step #1: 0d731e844f5b: Verifying Checksum Step #1: 0d731e844f5b: Download complete Step #1: 800687449569: Verifying Checksum Step #1: 800687449569: Download complete Step #1: 9cb6c9480ffe: Verifying Checksum Step #1: 9cb6c9480ffe: Download complete Step #1: 636367483a85: Verifying Checksum Step #1: 636367483a85: Download complete Step #1: ab160a08f40f: Verifying Checksum Step #1: ab160a08f40f: Download complete Step #1: d56fb1501120: Verifying Checksum Step #1: d56fb1501120: Download complete Step #1: b549f31133a9: Pull complete Step #1: 6e5ee80d4b76: Download complete Step #1: 069b70ca1828: Verifying Checksum Step #1: 069b70ca1828: Download complete Step #1: 082a5c4ba783: Verifying Checksum Step #1: 082a5c4ba783: Download complete Step #1: aeb889ce9374: Verifying Checksum Step #1: aeb889ce9374: Download complete Step #1: b3c77a307741: Verifying Checksum Step #1: b3c77a307741: Download complete Step #1: 19afa95abd0d: Download complete Step #1: 03e6d4298870: Verifying Checksum Step #1: 03e6d4298870: Download complete Step #1: 3331bfca5447: Download complete Step #1: ca89507fe8d3: Verifying Checksum Step #1: ca89507fe8d3: Download complete Step #1: 093d0a8d4813: Verifying Checksum Step #1: 093d0a8d4813: Download complete Step #1: 562130e5e1f0: Download complete Step #1: c78d65770fdc: Verifying Checksum Step #1: c78d65770fdc: Download complete Step #1: d8a48a39f3bb: Verifying Checksum Step #1: d8a48a39f3bb: Download complete Step #1: d547270a8392: Verifying Checksum Step #1: d547270a8392: Download complete Step #1: cd72b15f7674: Download complete Step #1: fed123fa2f8a: Verifying Checksum Step #1: fed123fa2f8a: Download complete Step #1: 39a8609a58c5: Verifying Checksum Step #1: 39a8609a58c5: Download complete Step #1: 18d20619fb8d: Verifying Checksum Step #1: 18d20619fb8d: Download complete Step #1: 800687449569: Pull complete Step #1: 67cc84ed39bf: Pull complete Step #1: 33c4464df317: Pull complete Step #1: 7a3d59ffed63: Pull complete Step #1: bc24bccd8f7c: Pull complete Step #1: 18d20619fb8d: Pull complete Step #1: 0ec212d79142: Pull complete Step #1: 0d731e844f5b: Pull complete Step #1: 03e6d4298870: Pull complete Step #1: 9cb6c9480ffe: Pull complete Step #1: 636367483a85: Pull complete Step #1: ab160a08f40f: Pull complete Step #1: d56fb1501120: Pull complete Step #1: 6e5ee80d4b76: Pull complete Step #1: 069b70ca1828: Pull complete Step #1: 082a5c4ba783: Pull complete Step #1: aeb889ce9374: Pull complete Step #1: b3c77a307741: Pull complete Step #1: 19afa95abd0d: Pull complete Step #1: 3331bfca5447: Pull complete Step #1: ca89507fe8d3: Pull complete Step #1: 093d0a8d4813: Pull complete Step #1: 562130e5e1f0: Pull complete Step #1: c78d65770fdc: Pull complete Step #1: d8a48a39f3bb: Pull complete Step #1: d547270a8392: Pull complete Step #1: cd72b15f7674: Pull complete Step #1: fed123fa2f8a: Pull complete Step #1: 39a8609a58c5: Pull complete Step #1: Digest: sha256:e8550ff2b57077cb14770e2ec5a77bdcd040c602412df65fe7355825f55ed250 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> d548bd1f3608 Step #1: Step 2/7 : RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libxml2-utils libxml2-dev xsltproc libprotobuf-dev protobuf-compiler libdbus-1-dev libdbus-glib-1-dev libgio2.0-cil-dev libgcrypt20-dev libpolkit-gobject-1-dev libseccomp-dev libcap-ng-dev Step #1: ---> Running in b8b59d18aefb Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (111 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev binfmt-support ca-certificates-mono cli-common dbus file Step #1: gir1.2-glib-2.0 gir1.2-polkit-1.0 icu-devtools libapparmor1 libblkid-dev Step #1: libdbus-1-3 libdbus-glib-1-2 libdbus-glib-1-dev-bin libelf1 libffi-dev Step #1: libgio-cil libgirepository-1.0-1 libglib2.0-0 libglib2.0-bin libglib2.0-cil Step #1: libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libgpg-error-dev Step #1: libicu-dev libicu66 libltdl-dev libltdl7 libmagic-mgc libmagic1 Step #1: libmono-btls-interface4.0-cil libmono-corlib4.5-cil libmono-i18n-west4.0-cil Step #1: libmono-i18n4.0-cil libmono-security4.0-cil Step #1: libmono-system-configuration4.0-cil libmono-system-core4.0-cil Step #1: libmono-system-numerics4.0-cil libmono-system-security4.0-cil Step #1: libmono-system-xml4.0-cil libmono-system4.0-cil libmount-dev libmpdec2 Step #1: libpcre16-3 libpcre2-16-0 libpcre2-32-0 libpcre2-dev libpcre2-posix2 Step #1: libpcre3-dev libpcre32-3 libpcrecpp0v5 libpipeline1 libpolkit-agent-1-0 Step #1: libpolkit-gobject-1-0 libprotobuf-lite17 libprotobuf17 libprotoc17 Step #1: libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib libselinux1-dev Step #1: libsepol1-dev libsigsegv2 libxml2 libxslt1.1 m4 mime-support mono-4.0-gac Step #1: mono-gac mono-runtime mono-runtime-common mono-runtime-sgen python3 Step #1: python3-distutils python3-lib2to3 python3-minimal python3.8 Step #1: python3.8-minimal shared-mime-info uuid-dev xdg-user-dirs zlib1g-dev Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext default-dbus-session-bus Step #1: | dbus-session-bus libgcrypt20-doc monodoc-gtk2.0-manual Step #1: libgirepository1.0-dev libglib2.0-doc libgdk-pixbuf2.0-bin Step #1: | libgdk-pixbuf2.0-dev icu-doc libtool-doc libmono-i18n4.0-all libasound2 Step #1: libgamin0 seccomp gfortran | fortran95-compiler gcj-jdk m4-doc xdg-utils Step #1: | libgnome2-0 | konqueror python3-doc python3-tk python3-venv python3.8-venv Step #1: python3.8-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev binfmt-support ca-certificates-mono Step #1: cli-common dbus file gir1.2-glib-2.0 gir1.2-polkit-1.0 icu-devtools Step #1: libapparmor1 libblkid-dev libcap-ng-dev libdbus-1-3 libdbus-1-dev Step #1: libdbus-glib-1-2 libdbus-glib-1-dev libdbus-glib-1-dev-bin libelf1 Step #1: libffi-dev libgcrypt20-dev libgio-cil libgio2.0-cil-dev Step #1: libgirepository-1.0-1 libglib2.0-0 libglib2.0-bin libglib2.0-cil Step #1: libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libgpg-error-dev Step #1: libicu-dev libicu66 libltdl-dev libltdl7 libmagic-mgc libmagic1 Step #1: libmono-btls-interface4.0-cil libmono-corlib4.5-cil libmono-i18n-west4.0-cil Step #1: libmono-i18n4.0-cil libmono-security4.0-cil Step #1: libmono-system-configuration4.0-cil libmono-system-core4.0-cil Step #1: libmono-system-numerics4.0-cil libmono-system-security4.0-cil Step #1: libmono-system-xml4.0-cil libmono-system4.0-cil libmount-dev libmpdec2 Step #1: libpcre16-3 libpcre2-16-0 libpcre2-32-0 libpcre2-dev libpcre2-posix2 Step #1: libpcre3-dev libpcre32-3 libpcrecpp0v5 libpipeline1 libpolkit-agent-1-0 Step #1: libpolkit-gobject-1-0 libpolkit-gobject-1-dev libprotobuf-dev Step #1: libprotobuf-lite17 libprotobuf17 libprotoc17 libpython3-stdlib Step #1: libpython3.8-minimal libpython3.8-stdlib libseccomp-dev libselinux1-dev Step #1: libsepol1-dev libsigsegv2 libtool libxml2 libxml2-dev libxml2-utils Step #1: libxslt1.1 m4 mime-support mono-4.0-gac mono-gac mono-runtime Step #1: mono-runtime-common mono-runtime-sgen pkg-config protobuf-compiler python3 Step #1: python3-distutils python3-lib2to3 python3-minimal python3.8 Step #1: python3.8-minimal shared-mime-info uuid-dev xdg-user-dirs xsltproc Step #1: zlib1g-dev Step #1: 0 upgraded, 99 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 44.5 MB of archives. Step #1: After this operation, 202 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.9 [718 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.9 [1890 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.9 [1674 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.9 [387 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-runtime-sgen amd64 6.8.0.105+dfsg-2 [1663 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-runtime amd64 6.8.0.105+dfsg-2 [14.8 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-corlib4.5-cil all 6.8.0.105+dfsg-2 [1256 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-core4.0-cil all 6.8.0.105+dfsg-2 [302 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-numerics4.0-cil all 6.8.0.105+dfsg-2 [48.6 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-xml4.0-cil all 6.8.0.105+dfsg-2 [816 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-security4.0-cil all 6.8.0.105+dfsg-2 [114 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system-configuration4.0-cil all 6.8.0.105+dfsg-2 [54.9 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-system4.0-cil all 6.8.0.105+dfsg-2 [802 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-security4.0-cil all 6.8.0.105+dfsg-2 [95.3 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-4.0-gac all 6.8.0.105+dfsg-2 [153 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-gac all 6.8.0.105+dfsg-2 [18.7 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/universe amd64 mono-runtime-common amd64 6.8.0.105+dfsg-2 [1154 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/universe amd64 ca-certificates-mono all 6.8.0.105+dfsg-2 [18.0 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libapparmor1 amd64 2.13.3-7ubuntu5.3 [35.4 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libdbus-1-3 amd64 1.12.16-2ubuntu2.3 [179 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 dbus amd64 1.12.16-2ubuntu2.3 [151 kB] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libgirepository-1.0-1 amd64 1.64.1-1~ubuntu20.04.1 [85.7 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 gir1.2-glib-2.0 amd64 1.64.1-1~ubuntu20.04.1 [134 kB] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libelf1 amd64 0.176-1.1ubuntu0.1 [44.2 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.6 [6032 B] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:39 http://archive.ubuntu.com/ubuntu focal/main amd64 libpipeline1 amd64 1.5.2-2build1 [27.7 kB] Step #1: Get:40 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpolkit-gobject-1-0 amd64 0.105-26ubuntu1.3 [39.2 kB] Step #1: Get:41 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:42 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:43 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:44 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:45 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:46 http://archive.ubuntu.com/ubuntu focal/universe amd64 binfmt-support amd64 2.2.0-2 [58.2 kB] Step #1: Get:47 http://archive.ubuntu.com/ubuntu focal/universe amd64 cli-common all 0.10 [171 kB] Step #1: Get:48 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpolkit-agent-1-0 amd64 0.105-26ubuntu1.3 [15.2 kB] Step #1: Get:49 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 gir1.2-polkit-1.0 amd64 0.105-26ubuntu1.3 [7344 B] Step #1: Get:50 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 icu-devtools amd64 66.1-2ubuntu2.1 [189 kB] Step #1: Get:51 http://archive.ubuntu.com/ubuntu focal/main amd64 libcap-ng-dev amd64 0.7.9-2.1build1 [22.1 kB] Step #1: Get:52 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: Get:53 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libdbus-1-dev amd64 1.12.16-2ubuntu2.3 [167 kB] Step #1: Get:54 http://archive.ubuntu.com/ubuntu focal/main amd64 libdbus-glib-1-2 amd64 0.110-5fakssync1 [59.1 kB] Step #1: Get:55 http://archive.ubuntu.com/ubuntu focal/main amd64 libdbus-glib-1-dev-bin amd64 0.110-5fakssync1 [39.5 kB] Step #1: Get:56 http://archive.ubuntu.com/ubuntu focal/main amd64 libffi-dev amd64 3.3-4 [57.0 kB] Step #1: Get:57 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-bin amd64 2.64.6-1~ubuntu20.04.6 [72.9 kB] Step #1: Get:58 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-lib2to3 all 3.8.10-0ubuntu1~20.04 [76.3 kB] Step #1: Get:59 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-distutils all 3.8.10-0ubuntu1~20.04 [141 kB] Step #1: Get:60 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-dev-bin amd64 2.64.6-1~ubuntu20.04.6 [109 kB] Step #1: Get:61 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 uuid-dev amd64 2.34-0.1ubuntu9.4 [33.6 kB] Step #1: Get:62 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libblkid-dev amd64 2.34-0.1ubuntu9.4 [167 kB] Step #1: Get:63 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libmount-dev amd64 2.34-0.1ubuntu9.4 [177 kB] Step #1: Get:64 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre16-3 amd64 2:8.39-12ubuntu0.1 [150 kB] Step #1: Get:65 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre32-3 amd64 2:8.39-12ubuntu0.1 [140 kB] Step #1: Get:66 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcrecpp0v5 amd64 2:8.39-12ubuntu0.1 [15.5 kB] Step #1: Get:67 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre3-dev amd64 2:8.39-12ubuntu0.1 [540 kB] Step #1: Get:68 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsepol1-dev amd64 3.0-1ubuntu0.1 [325 kB] Step #1: Get:69 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-16-0 amd64 10.34-7ubuntu0.1 [181 kB] Step #1: Get:70 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-32-0 amd64 10.34-7ubuntu0.1 [170 kB] Step #1: Get:71 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-posix2 amd64 10.34-7ubuntu0.1 [5988 B] Step #1: Get:72 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-dev amd64 10.34-7ubuntu0.1 [672 kB] Step #1: Get:73 http://archive.ubuntu.com/ubuntu focal/main amd64 libselinux1-dev amd64 3.0-1build2 [151 kB] Step #1: Get:74 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: Get:75 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-dev amd64 2.64.6-1~ubuntu20.04.6 [1507 kB] Step #1: Get:76 http://archive.ubuntu.com/ubuntu focal/main amd64 libdbus-glib-1-dev amd64 0.110-5fakssync1 [69.2 kB] Step #1: Get:77 http://archive.ubuntu.com/ubuntu focal/main amd64 libgpg-error-dev amd64 1.37-1 [109 kB] Step #1: Get:78 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libgcrypt20-dev amd64 1.8.5-5ubuntu1.1 [471 kB] Step #1: Get:79 http://archive.ubuntu.com/ubuntu focal/universe amd64 libglib2.0-cil amd64 2.12.40-3 [43.7 kB] Step #1: Get:80 http://archive.ubuntu.com/ubuntu focal/universe amd64 libgio-cil all 2.22.3-3 [51.9 kB] Step #1: Get:81 http://archive.ubuntu.com/ubuntu focal/universe amd64 libgio2.0-cil-dev all 2.22.3-3 [20.6 kB] Step #1: Get:82 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu-dev amd64 66.1-2ubuntu2.1 [9451 kB] Step #1: Get:83 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:84 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:85 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-btls-interface4.0-cil amd64 6.8.0.105+dfsg-2 [26.7 kB] Step #1: Get:86 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-i18n4.0-cil all 6.8.0.105+dfsg-2 [22.9 kB] Step #1: Get:87 http://archive.ubuntu.com/ubuntu focal/universe amd64 libmono-i18n-west4.0-cil all 6.8.0.105+dfsg-2 [25.9 kB] Step #1: Get:88 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpolkit-gobject-1-dev amd64 0.105-26ubuntu1.3 [59.9 kB] Step #1: Get:89 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf-lite17 amd64 3.6.1.3-2ubuntu5.2 [132 kB] Step #1: Get:90 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf17 amd64 3.6.1.3-2ubuntu5.2 [798 kB] Step #1: Get:91 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotoc17 amd64 3.6.1.3-2ubuntu5.2 [646 kB] Step #1: Get:92 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:93 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:94 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2-dev amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [735 kB] Step #1: Get:95 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2-utils amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [37.0 kB] Step #1: Get:96 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxslt1.1 amd64 1.1.34-4ubuntu0.20.04.1 [151 kB] Step #1: Get:97 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 xsltproc amd64 1.1.34-4ubuntu0.20.04.1 [14.3 kB] Step #1: Get:98 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf-dev amd64 3.6.1.3-2ubuntu5.2 [1156 kB] Step #1: Get:99 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 protobuf-compiler amd64 3.6.1.3-2ubuntu5.2 [27.6 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 44.5 MB in 12s (3792 kB/s) Step #1: Selecting previously unselected package libpython3.8-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17382 files and directories currently installed.) Step #1: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package python3.8-minimal. Step #1: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package python3-minimal. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17665 files and directories currently installed.) Step #1: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libmpdec2:amd64. Step #1: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #1: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #1: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #1: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package python3.8. Step #1: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package libpython3-stdlib:amd64. Step #1: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18067 files and directories currently installed.) Step #1: Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mono-runtime-sgen. Step #1: Preparing to unpack .../01-mono-runtime-sgen_6.8.0.105+dfsg-2_amd64.deb ... Step #1: Unpacking mono-runtime-sgen (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package mono-runtime. Step #1: Preparing to unpack .../02-mono-runtime_6.8.0.105+dfsg-2_amd64.deb ... Step #1: Unpacking mono-runtime (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-corlib4.5-cil. Step #1: Preparing to unpack .../03-libmono-corlib4.5-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-corlib4.5-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-system-core4.0-cil. Step #1: Preparing to unpack .../04-libmono-system-core4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-system-core4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-system-numerics4.0-cil. Step #1: Preparing to unpack .../05-libmono-system-numerics4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-system-numerics4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-system-xml4.0-cil. Step #1: Preparing to unpack .../06-libmono-system-xml4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-system-xml4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-system-security4.0-cil. Step #1: Preparing to unpack .../07-libmono-system-security4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-system-security4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-system-configuration4.0-cil. Step #1: Preparing to unpack .../08-libmono-system-configuration4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-system-configuration4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-system4.0-cil. Step #1: Preparing to unpack .../09-libmono-system4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-system4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-security4.0-cil. Step #1: Preparing to unpack .../10-libmono-security4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-security4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package mono-4.0-gac. Step #1: Preparing to unpack .../11-mono-4.0-gac_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking mono-4.0-gac (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package mono-gac. Step #1: Preparing to unpack .../12-mono-gac_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking mono-gac (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package mono-runtime-common. Step #1: Preparing to unpack .../13-mono-runtime-common_6.8.0.105+dfsg-2_amd64.deb ... Step #1: Unpacking mono-runtime-common (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-security4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up mono-runtime-sgen (6.8.0.105+dfsg-2) ... Step #1: Setting up mono-runtime (6.8.0.105+dfsg-2) ... Step #1: update-alternatives: using /usr/bin/mono to provide /usr/bin/cli (cli) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/cli.1.gz because associated file /usr/share/man/man1/mono.1.gz (of link group cli) doesn't exist Step #1: Setting up libmono-corlib4.5-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-system-numerics4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-system-configuration4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-system-xml4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-system-core4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-system4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmono-system-security4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up mono-4.0-gac (6.8.0.105+dfsg-2) ... Step #1: Setting up mono-gac (6.8.0.105+dfsg-2) ... Step #1: update-alternatives: using /usr/bin/gacutil to provide /usr/bin/cli-gacutil (global-assembly-cache-tool) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/cli-gacutil.1.gz because associated file /usr/share/man/man1/gacutil.1.gz (of link group global-assembly-cache-tool) doesn't exist Step #1: Setting up mono-runtime-common (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package ca-certificates-mono. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18235 files and directories currently installed.) Step #1: Preparing to unpack .../00-ca-certificates-mono_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking ca-certificates-mono (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libapparmor1:amd64. Step #1: Preparing to unpack .../01-libapparmor1_2.13.3-7ubuntu5.3_amd64.deb ... Step #1: Unpacking libapparmor1:amd64 (2.13.3-7ubuntu5.3) ... Step #1: Selecting previously unselected package libdbus-1-3:amd64. Step #1: Preparing to unpack .../02-libdbus-1-3_1.12.16-2ubuntu2.3_amd64.deb ... Step #1: Unpacking libdbus-1-3:amd64 (1.12.16-2ubuntu2.3) ... Step #1: Selecting previously unselected package dbus. Step #1: Preparing to unpack .../03-dbus_1.12.16-2ubuntu2.3_amd64.deb ... Step #1: Unpacking dbus (1.12.16-2ubuntu2.3) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../04-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../05-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../06-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../07-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libgirepository-1.0-1:amd64. Step #1: Preparing to unpack .../08-libgirepository-1.0-1_1.64.1-1~ubuntu20.04.1_amd64.deb ... Step #1: Unpacking libgirepository-1.0-1:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #1: Selecting previously unselected package gir1.2-glib-2.0:amd64. Step #1: Preparing to unpack .../09-gir1.2-glib-2.0_1.64.1-1~ubuntu20.04.1_amd64.deb ... Step #1: Unpacking gir1.2-glib-2.0:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #1: Selecting previously unselected package libelf1:amd64. Step #1: Preparing to unpack .../10-libelf1_0.176-1.1ubuntu0.1_amd64.deb ... Step #1: Unpacking libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../11-libglib2.0-data_2.64.6-1~ubuntu20.04.6_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../12-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../13-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../14-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../15-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package libpipeline1:amd64. Step #1: Preparing to unpack .../16-libpipeline1_1.5.2-2build1_amd64.deb ... Step #1: Unpacking libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Selecting previously unselected package libpolkit-gobject-1-0:amd64. Step #1: Preparing to unpack .../17-libpolkit-gobject-1-0_0.105-26ubuntu1.3_amd64.deb ... Step #1: Unpacking libpolkit-gobject-1-0:amd64 (0.105-26ubuntu1.3) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../18-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../19-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../20-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../21-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../22-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package binfmt-support. Step #1: Preparing to unpack .../23-binfmt-support_2.2.0-2_amd64.deb ... Step #1: Unpacking binfmt-support (2.2.0-2) ... Step #1: Selecting previously unselected package cli-common. Step #1: Preparing to unpack .../24-cli-common_0.10_all.deb ... Step #1: Unpacking cli-common (0.10) ... Step #1: Selecting previously unselected package libpolkit-agent-1-0:amd64. Step #1: Preparing to unpack .../25-libpolkit-agent-1-0_0.105-26ubuntu1.3_amd64.deb ... Step #1: Unpacking libpolkit-agent-1-0:amd64 (0.105-26ubuntu1.3) ... Step #1: Selecting previously unselected package gir1.2-polkit-1.0. Step #1: Preparing to unpack .../26-gir1.2-polkit-1.0_0.105-26ubuntu1.3_amd64.deb ... Step #1: Unpacking gir1.2-polkit-1.0 (0.105-26ubuntu1.3) ... Step #1: Selecting previously unselected package icu-devtools. Step #1: Preparing to unpack .../27-icu-devtools_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking icu-devtools (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libcap-ng-dev. Step #1: Preparing to unpack .../28-libcap-ng-dev_0.7.9-2.1build1_amd64.deb ... Step #1: Unpacking libcap-ng-dev (0.7.9-2.1build1) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../29-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Selecting previously unselected package libdbus-1-dev:amd64. Step #1: Preparing to unpack .../30-libdbus-1-dev_1.12.16-2ubuntu2.3_amd64.deb ... Step #1: Unpacking libdbus-1-dev:amd64 (1.12.16-2ubuntu2.3) ... Step #1: Selecting previously unselected package libdbus-glib-1-2:amd64. Step #1: Preparing to unpack .../31-libdbus-glib-1-2_0.110-5fakssync1_amd64.deb ... Step #1: Unpacking libdbus-glib-1-2:amd64 (0.110-5fakssync1) ... Step #1: Selecting previously unselected package libdbus-glib-1-dev-bin. Step #1: Preparing to unpack .../32-libdbus-glib-1-dev-bin_0.110-5fakssync1_amd64.deb ... Step #1: Unpacking libdbus-glib-1-dev-bin (0.110-5fakssync1) ... Step #1: Selecting previously unselected package libffi-dev:amd64. Step #1: Preparing to unpack .../33-libffi-dev_3.3-4_amd64.deb ... Step #1: Unpacking libffi-dev:amd64 (3.3-4) ... Step #1: Selecting previously unselected package libglib2.0-bin. Step #1: Preparing to unpack .../34-libglib2.0-bin_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-bin (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package python3-lib2to3. Step #1: Preparing to unpack .../35-python3-lib2to3_3.8.10-0ubuntu1~20.04_all.deb ... Step #1: Unpacking python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #1: Selecting previously unselected package python3-distutils. Step #1: Preparing to unpack .../36-python3-distutils_3.8.10-0ubuntu1~20.04_all.deb ... Step #1: Unpacking python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #1: Selecting previously unselected package libglib2.0-dev-bin. Step #1: Preparing to unpack .../37-libglib2.0-dev-bin_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-dev-bin (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package uuid-dev:amd64. Step #1: Preparing to unpack .../38-uuid-dev_2.34-0.1ubuntu9.4_amd64.deb ... Step #1: Unpacking uuid-dev:amd64 (2.34-0.1ubuntu9.4) ... Step #1: Selecting previously unselected package libblkid-dev:amd64. Step #1: Preparing to unpack .../39-libblkid-dev_2.34-0.1ubuntu9.4_amd64.deb ... Step #1: Unpacking libblkid-dev:amd64 (2.34-0.1ubuntu9.4) ... Step #1: Selecting previously unselected package libmount-dev:amd64. Step #1: Preparing to unpack .../40-libmount-dev_2.34-0.1ubuntu9.4_amd64.deb ... Step #1: Unpacking libmount-dev:amd64 (2.34-0.1ubuntu9.4) ... Step #1: Selecting previously unselected package libpcre16-3:amd64. Step #1: Preparing to unpack .../41-libpcre16-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre32-3:amd64. Step #1: Preparing to unpack .../42-libpcre32-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcrecpp0v5:amd64. Step #1: Preparing to unpack .../43-libpcrecpp0v5_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre3-dev:amd64. Step #1: Preparing to unpack .../44-libpcre3-dev_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libsepol1-dev:amd64. Step #1: Preparing to unpack .../45-libsepol1-dev_3.0-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libsepol1-dev:amd64 (3.0-1ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-16-0:amd64. Step #1: Preparing to unpack .../46-libpcre2-16-0_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-16-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-32-0:amd64. Step #1: Preparing to unpack .../47-libpcre2-32-0_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-32-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-posix2:amd64. Step #1: Preparing to unpack .../48-libpcre2-posix2_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-posix2:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-dev:amd64. Step #1: Preparing to unpack .../49-libpcre2-dev_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-dev:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libselinux1-dev:amd64. Step #1: Preparing to unpack .../50-libselinux1-dev_3.0-1build2_amd64.deb ... Step #1: Unpacking libselinux1-dev:amd64 (3.0-1build2) ... Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: Preparing to unpack .../51-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Selecting previously unselected package libglib2.0-dev:amd64. Step #1: Preparing to unpack .../52-libglib2.0-dev_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-dev:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libdbus-glib-1-dev:amd64. Step #1: Preparing to unpack .../53-libdbus-glib-1-dev_0.110-5fakssync1_amd64.deb ... Step #1: Unpacking libdbus-glib-1-dev:amd64 (0.110-5fakssync1) ... Step #1: Selecting previously unselected package libgpg-error-dev. Step #1: Preparing to unpack .../54-libgpg-error-dev_1.37-1_amd64.deb ... Step #1: Unpacking libgpg-error-dev (1.37-1) ... Step #1: Selecting previously unselected package libgcrypt20-dev. Step #1: Preparing to unpack .../55-libgcrypt20-dev_1.8.5-5ubuntu1.1_amd64.deb ... Step #1: Unpacking libgcrypt20-dev (1.8.5-5ubuntu1.1) ... Step #1: Selecting previously unselected package libglib2.0-cil. Step #1: Preparing to unpack .../56-libglib2.0-cil_2.12.40-3_amd64.deb ... Step #1: Unpacking libglib2.0-cil (2.12.40-3) ... Step #1: Selecting previously unselected package libgio-cil. Step #1: Preparing to unpack .../57-libgio-cil_2.22.3-3_all.deb ... Step #1: Unpacking libgio-cil (2.22.3-3) ... Step #1: Selecting previously unselected package libgio2.0-cil-dev. Step #1: Preparing to unpack .../58-libgio2.0-cil-dev_2.22.3-3_all.deb ... Step #1: Unpacking libgio2.0-cil-dev (2.22.3-3) ... Step #1: Selecting previously unselected package libicu-dev:amd64. Step #1: Preparing to unpack .../59-libicu-dev_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu-dev:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../60-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../61-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libmono-btls-interface4.0-cil. Step #1: Preparing to unpack .../62-libmono-btls-interface4.0-cil_6.8.0.105+dfsg-2_amd64.deb ... Step #1: Unpacking libmono-btls-interface4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-i18n4.0-cil. Step #1: Preparing to unpack .../63-libmono-i18n4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-i18n4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libmono-i18n-west4.0-cil. Step #1: Preparing to unpack .../64-libmono-i18n-west4.0-cil_6.8.0.105+dfsg-2_all.deb ... Step #1: Unpacking libmono-i18n-west4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Selecting previously unselected package libpolkit-gobject-1-dev. Step #1: Preparing to unpack .../65-libpolkit-gobject-1-dev_0.105-26ubuntu1.3_amd64.deb ... Step #1: Unpacking libpolkit-gobject-1-dev (0.105-26ubuntu1.3) ... Step #1: Selecting previously unselected package libprotobuf-lite17:amd64. Step #1: Preparing to unpack .../66-libprotobuf-lite17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking libprotobuf-lite17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Selecting previously unselected package libprotobuf17:amd64. Step #1: Preparing to unpack .../67-libprotobuf17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Selecting previously unselected package libprotoc17:amd64. Step #1: Preparing to unpack .../68-libprotoc17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../69-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../70-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package libxml2-dev:amd64. Step #1: Preparing to unpack .../71-libxml2-dev_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2-dev:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package libxml2-utils. Step #1: Preparing to unpack .../72-libxml2-utils_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2-utils (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package libxslt1.1:amd64. Step #1: Preparing to unpack .../73-libxslt1.1_1.1.34-4ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking libxslt1.1:amd64 (1.1.34-4ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package xsltproc. Step #1: Preparing to unpack .../74-xsltproc_1.1.34-4ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking xsltproc (1.1.34-4ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libprotobuf-dev:amd64. Step #1: Preparing to unpack .../75-libprotobuf-dev_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking libprotobuf-dev:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Selecting previously unselected package protobuf-compiler. Step #1: Preparing to unpack .../76-protobuf-compiler_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking protobuf-compiler (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Setting up libmono-btls-interface4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up libapparmor1:amd64 (2.13.3-7ubuntu5.3) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up ca-certificates-mono (6.8.0.105+dfsg-2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libprotobuf-lite17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libmono-i18n4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up libsepol1-dev:amd64 (3.0-1ubuntu0.1) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up libffi-dev:amd64 (3.3-4) ... Step #1: Setting up libpcre2-16-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libpcre2-32-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up libgpg-error-dev (1.37-1) ... Step #1: Setting up cli-common (0.10) ... Step #1: Setting up uuid-dev:amd64 (2.34-0.1ubuntu9.4) ... Step #1: Setting up libmono-i18n-west4.0-cil (6.8.0.105+dfsg-2) ... Step #1: Setting up libdbus-1-3:amd64 (1.12.16-2ubuntu2.3) ... Step #1: Setting up dbus (1.12.16-2ubuntu2.3) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up binfmt-support (2.2.0-2) ... Step #1: invoke-rc.d: could not determine current runlevel Step #1: invoke-rc.d: policy-rc.d denied execution of start. Step #1: Setting up icu-devtools (66.1-2ubuntu2.1) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libpcre2-posix2:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libcap-ng-dev (0.7.9-2.1build1) ... Step #1: Setting up libgirepository-1.0-1:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #1: Setting up libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #1: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up python3.8 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Setting up libicu-dev:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up libpolkit-gobject-1-0:amd64 (0.105-26ubuntu1.3) ... Step #1: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up libblkid-dev:amd64 (2.34-0.1ubuntu9.4) ... Step #1: Setting up libglib2.0-cil (2.12.40-3) ... Step #1: * Installing 1 assembly from libglib2.0-cil into Mono Step #1: Setting up libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libpcre2-dev:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up protobuf-compiler (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up libselinux1-dev:amd64 (3.0-1build2) ... Step #1: Setting up libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libglib2.0-bin (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up python3 (3.8.2-0ubuntu2) ... Step #1: Setting up libprotobuf-dev:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libxml2-dev:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up libgcrypt20-dev (1.8.5-5ubuntu1.1) ... Step #1: Setting up libdbus-1-dev:amd64 (1.12.16-2ubuntu2.3) ... Step #1: Setting up libdbus-glib-1-2:amd64 (0.110-5fakssync1) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up gir1.2-glib-2.0:amd64 (1.64.1-1~ubuntu20.04.1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up libgio-cil (2.22.3-3) ... Step #1: Setting up libxslt1.1:amd64 (1.1.34-4ubuntu0.20.04.1) ... Step #1: Setting up libpolkit-agent-1-0:amd64 (0.105-26ubuntu1.3) ... Step #1: Setting up libxml2-utils (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #1: Setting up libmount-dev:amd64 (2.34-0.1ubuntu9.4) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #1: Setting up libglib2.0-dev-bin (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up xsltproc (1.1.34-4ubuntu0.20.04.1) ... Step #1: Setting up libdbus-glib-1-dev-bin (0.110-5fakssync1) ... Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Setting up libglib2.0-dev:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up libgio2.0-cil-dev (2.22.3-3) ... Step #1: Setting up gir1.2-polkit-1.0 (0.105-26ubuntu1.3) ... Step #1: Setting up libdbus-glib-1-dev:amd64 (0.110-5fakssync1) ... Step #1: Setting up libpolkit-gobject-1-dev (0.105-26ubuntu1.3) ... Step #1: Processing triggers for ca-certificates (20230311ubuntu0.20.04.1) ... Step #1: Updating certificates in /etc/ssl/certs... Step #1: 0 added, 0 removed; done. Step #1: Running hooks in /etc/ca-certificates/update.d... Step #1: Updating Mono key store Step #1: Mono Certificate Store Sync - version 6.8.0.105 Step #1: Populate Mono certificate store from a concatenated list of certificates. Step #1: Copyright 2002, 2003 Motus Technologies. Copyright 2004-2008 Novell. BSD licensed. Step #1: Step #1: Importing into legacy system store: Step #1: I already trust 0, your new list has 137 Step #1: Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Step #1: Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Step #1: Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Step #1: Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Step #1: Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Step #1: Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Step #1: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #1: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #1: Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Step #1: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Step #1: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Step #1: Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Step #1: Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Step #1: Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Step #1: Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Step #1: Certificate added: C=FR, O=Dhimyotis, CN=Certigna Step #1: Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Step #1: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Step #1: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Step #1: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Step #1: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Step #1: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Step #1: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Step #1: Certificate added: C=TR, L=Ankara, O=E-Tu?ra EBG Bili?im Teknolojileri ve Hizmetleri A.?., OU=E-Tugra Sertifikasyon Merkezi, CN=E-Tugra Certification Authority Step #1: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA ECC v3 Step #1: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA RSA v3 Step #1: Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2015 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G4 Step #1: Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Step #1: Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Step #1: Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Step #1: Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Step #1: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Step #1: Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Step #1: Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Step #1: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Step #1: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Step #1: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Step #1: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Step #1: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Step #1: Certificate added: C=HK, O=Hongkong Post, CN=Hongkong Post Root CA 1 Step #1: Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Step #1: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Step #1: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Step #1: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Step #1: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Step #1: Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Step #1: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Step #1: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Step #1: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Step #1: Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Step #1: Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tan?s?tv?nykiad?k (Certification Services), CN=NetLock Arany (Class Gold) F?tan?s?tv?ny Step #1: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Step #1: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Step #1: Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Step #1: Certificate added: C=JP, O="Japan Certification Services, Inc.", CN=SecureSign RootCA11 Step #1: Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Step #1: Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Step #1: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Step #1: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Step #1: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication RootCA3 Step #1: Certificate added: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1 Step #1: Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Step #1: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Step #1: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Step #1: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Step #1: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Step #1: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Step #1: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Step #1: Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Step #1: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Step #1: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Step #1: Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Step #1: Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Step #1: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Step #1: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Step #1: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Step #1: Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Step #1: Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Step #1: Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Step #1: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Step #1: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Step #1: Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Step #1: Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Step #1: Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Step #1: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Step #1: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Step #1: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Step #1: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Step #1: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Step #1: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Step #1: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Step #1: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA Step #1: 137 new root certificates were added to your trust store. Step #1: Import process completed. Step #1: Step #1: Importing into BTLS system store: Step #1: I already trust 0, your new list has 137 Step #1: Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Step #1: Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Step #1: Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Step #1: Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Step #1: Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Step #1: Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Step #1: Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Step #1: Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Step #1: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #1: Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Step #1: Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Step #1: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Step #1: Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Step #1: Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Step #1: Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Step #1: Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Step #1: Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Step #1: Certificate added: C=FR, O=Dhimyotis, CN=Certigna Step #1: Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Step #1: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Step #1: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Step #1: Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Step #1: Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Step #1: Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Step #1: Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Step #1: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Step #1: Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Step #1: Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Step #1: Certificate added: C=TR, L=Ankara, O=E-Tu?ra EBG Bili?im Teknolojileri ve Hizmetleri A.?., OU=E-Tugra Sertifikasyon Merkezi, CN=E-Tugra Certification Authority Step #1: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA ECC v3 Step #1: Certificate added: C=TR, L=Ankara, O=E-Tugra EBG A.S., OU=E-Tugra Trust Center, CN=E-Tugra Global Root CA RSA v3 Step #1: Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Step #1: Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2015 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G4 Step #1: Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Step #1: Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Step #1: Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Step #1: Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Step #1: Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Step #1: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Step #1: Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Step #1: Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Step #1: Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Step #1: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Step #1: Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Step #1: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Step #1: Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Step #1: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Step #1: Certificate added: C=HK, O=Hongkong Post, CN=Hongkong Post Root CA 1 Step #1: Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Step #1: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Step #1: Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Step #1: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Step #1: Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Step #1: Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Step #1: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Step #1: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Step #1: Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Step #1: Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Step #1: Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tan?s?tv?nykiad?k (Certification Services), CN=NetLock Arany (Class Gold) F?tan?s?tv?ny Step #1: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Step #1: Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Step #1: Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Step #1: Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Step #1: Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Step #1: Certificate added: C=JP, O="Japan Certification Services, Inc.", CN=SecureSign RootCA11 Step #1: Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Step #1: Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Step #1: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Step #1: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Step #1: Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication RootCA3 Step #1: Certificate added: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1 Step #1: Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Step #1: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Step #1: Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Step #1: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Step #1: Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Step #1: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Step #1: Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Step #1: Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Step #1: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Step #1: Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Step #1: Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Step #1: Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Step #1: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Step #1: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Step #1: Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Step #1: Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Step #1: Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Step #1: Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Step #1: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Step #1: Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Step #1: Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Step #1: Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Step #1: Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Step #1: Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Step #1: Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Step #1: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Step #1: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Step #1: Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Step #1: Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Step #1: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Step #1: Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA Step #1: 137 new root certificates were added to your trust store. Step #1: Import process completed. Step #1: Done Step #1: done. Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.12) ... Step #1: Removing intermediate container b8b59d18aefb Step #1: ---> 7c2b455b414b Step #1: Step 3/7 : RUN git clone https://github.com/ClusterLabs/libqb && cd libqb && ./autogen.sh && ./configure && make && make install Step #1: ---> Running in f034ffcca57c Step #1: Cloning into 'libqb'... Step #1: autoreconf: Entering directory `.' Step #1: autoreconf: configure.ac: not using Gettext Step #1: autoreconf: running: aclocal --force -I m4 Step #1: autoreconf: configure.ac: tracing Step #1: autoreconf: running: libtoolize --copy --force Step #1: libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'. Step #1: libtoolize: copying file 'build-aux/ltmain.sh' Step #1: libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #1: libtoolize: copying file 'm4/libtool.m4' Step #1: libtoolize: copying file 'm4/ltoptions.m4' Step #1: libtoolize: copying file 'm4/ltsugar.m4' Step #1: libtoolize: copying file 'm4/ltversion.m4' Step #1: libtoolize: copying file 'm4/lt~obsolete.m4' Step #1: autoreconf: running: /usr/bin/autoconf --force Step #1: autoreconf: running: /usr/bin/autoheader --force Step #1: autoreconf: running: automake --add-missing --copy --force-missing Step #1: configure.ac:20: installing 'build-aux/compile' Step #1: configure.ac:38: installing 'build-aux/config.guess' Step #1: configure.ac:38: installing 'build-aux/config.sub' Step #1: configure.ac:22: installing 'build-aux/install-sh' Step #1: configure.ac:22: installing 'build-aux/missing' Step #1: doxygen2man/Makefile.am: installing 'build-aux/depcomp' Step #1: parallel-tests: installing 'build-aux/test-driver' Step #1: autoreconf: Leaving directory `.' Step #1: : About to consume a checked out tree (dedicated for maintenance!)... Step #1: : Now run ./configure && make Step #1: checking for gcc... clang Step #1: checking whether the C compiler works... yes Step #1: checking for C compiler default output file name... a.out Step #1: checking for suffix of executables... Step #1: checking whether we are cross compiling... no Step #1: checking for suffix of object files... o Step #1: checking whether we are using the GNU C compiler... yes Step #1: checking whether clang accepts -g... yes Step #1: checking for clang option to accept ISO C89... none needed Step #1: checking whether clang understands -c and -o together... yes Step #1: checking how to run the C preprocessor... clang -E Step #1: checking for grep that handles long lines and -e... /usr/bin/grep Step #1: checking for egrep... /usr/bin/grep -E Step #1: checking for ANSI C header files... yes Step #1: checking for sys/types.h... yes Step #1: checking for sys/stat.h... yes Step #1: checking for stdlib.h... yes Step #1: checking for string.h... yes Step #1: checking for memory.h... yes Step #1: checking for strings.h... yes Step #1: checking for inttypes.h... yes Step #1: checking for stdint.h... yes Step #1: checking for unistd.h... yes Step #1: checking minix/config.h usability... no Step #1: checking minix/config.h presence... no Step #1: checking for minix/config.h... no Step #1: checking whether it is safe to define __EXTENSIONS__... yes Step #1: checking for a BSD-compatible install... /usr/bin/install -c Step #1: checking whether build environment is sane... yes Step #1: checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #1: checking for gawk... no Step #1: checking for mawk... mawk Step #1: checking whether make sets $(MAKE)... yes Step #1: checking whether make supports the include directive... yes (GNU style) Step #1: checking whether make supports nested variables... yes Step #1: checking dependency style of clang... gcc3 Step #1: checking whether make supports nested variables... (cached) yes Step #1: checking whether the linker accepts -Wl,--enable-new-dtags... yes Step #1: checking build system type... x86_64-pc-linux-gnu Step #1: checking host system type... x86_64-pc-linux-gnu Step #1: checking how to print strings... printf Step #1: checking for a sed that does not truncate output... /usr/bin/sed Step #1: checking for fgrep... /usr/bin/grep -F Step #1: checking for ld used by clang... /usr/bin/ld Step #1: checking if the linker (/usr/bin/ld) is GNU ld... yes Step #1: checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #1: checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #1: checking whether ln -s works... yes Step #1: checking the maximum length of command line arguments... 1572864 Step #1: checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #1: checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #1: checking for /usr/bin/ld option to reload object files... -r Step #1: checking for objdump... objdump Step #1: checking how to recognize dependent libraries... pass_all Step #1: checking for dlltool... no Step #1: checking how to associate runtime and link libraries... printf %s\n Step #1: checking for ar... ar Step #1: checking for archiver @FILE support... @ Step #1: checking for strip... strip Step #1: checking for ranlib... ranlib Step #1: checking command to parse /usr/bin/nm -B output from clang object... ok Step #1: checking for sysroot... no Step #1: checking for a working dd... /usr/bin/dd Step #1: checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #1: checking for mt... no Step #1: checking if : is a manifest tool... no Step #1: checking for dlfcn.h... yes Step #1: checking for objdir... .libs Step #1: checking if clang supports -fno-rtti -fno-exceptions... yes Step #1: checking for clang option to produce PIC... -fPIC -DPIC Step #1: checking if clang PIC flag -fPIC -DPIC works... yes Step #1: checking if clang static flag -static works... yes Step #1: checking if clang supports -c -o file.o... yes Step #1: checking if clang supports -c -o file.o... (cached) yes Step #1: checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #1: checking whether -lc should be explicitly linked in... no Step #1: checking dynamic linker characteristics... GNU/Linux ld.so Step #1: checking how to hardcode library paths into programs... immediate Step #1: checking whether stripping libraries is possible... yes Step #1: checking if libtool supports shared libraries... yes Step #1: checking whether to build shared libraries... yes Step #1: checking whether to build static libraries... yes Step #1: configure: building in place srcdir:. Step #1: checking whether we are using the GNU C++ compiler... yes Step #1: checking whether clang++ accepts -g... yes Step #1: checking dependency style of clang++... gcc3 Step #1: checking how to run the C++ preprocessor... clang++ -E Step #1: checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #1: checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #1: checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #1: checking for clang++ option to produce PIC... -fPIC -DPIC Step #1: checking if clang++ PIC flag -fPIC -DPIC works... yes Step #1: checking if clang++ static flag -static works... yes Step #1: checking if clang++ supports -c -o file.o... yes Step #1: checking if clang++ supports -c -o file.o... (cached) yes Step #1: checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #1: checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #1: checking how to hardcode library paths into programs... immediate Step #1: checking for gawk... (cached) mawk Step #1: checking for gcc... (cached) clang Step #1: checking whether we are using the GNU C compiler... (cached) yes Step #1: checking whether clang accepts -g... (cached) yes Step #1: checking for clang option to accept ISO C89... (cached) none needed Step #1: checking whether clang understands -c and -o together... (cached) yes Step #1: checking how to run the C preprocessor... clang -E Step #1: checking for clang option to accept ISO C99... none needed Step #1: checking whether ln -s works... yes Step #1: checking whether make sets $(MAKE)... (cached) yes Step #1: checking for pkg-config... pkg-config Step #1: checking for doxygen... no Step #1: checking for eu-readelf... no Step #1: checking for readelf... readelf Step #1: checking for a Python interpreter with version >= 2.6... python Step #1: checking for python... /usr/bin/python Step #1: checking for python version... 3.8 Step #1: checking for python platform... linux Step #1: checking for python script directory... ${prefix}/lib/python3.8/site-packages Step #1: checking for python extension module directory... ${exec_prefix}/lib/python3.8/site-packages Step #1: configure: Sanitizing prefix: /usr Step #1: configure: Sanitizing exec_prefix: NONE Step #1: checking whether clang is Clang... yes Step #1: checking whether pthreads work with "-pthread" and "-lpthread"... yes Step #1: checking whether Clang needs flag to prevent "argument unused" warning when linking with -pthread... no Step #1: checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #1: checking whether more special flags are required for pthreads... no Step #1: checking for PTHREAD_PRIO_INHERIT... yes Step #1: checking for library containing dlopen... -ldl Step #1: checking for library containing socket... none required Step #1: checking for library containing gethostbyname... none required Step #1: checking for library containing clock_gettime... none required Step #1: checking for pkg-config... /usr/bin/pkg-config Step #1: checking pkg-config is at least version 0.9.0... yes Step #1: checking for SYSTEMD... no Step #1: checking for CHECK... no Step #1: checking for GLIB... yes Step #1: checking for libxml... yes Step #1: checking for sys/wait.h that is POSIX.1 compatible... yes Step #1: checking arpa/inet.h usability... yes Step #1: checking arpa/inet.h presence... yes Step #1: checking for arpa/inet.h... yes Step #1: checking link.h usability... yes Step #1: checking link.h presence... yes Step #1: checking for link.h... yes Step #1: checking fcntl.h usability... yes Step #1: checking fcntl.h presence... yes Step #1: checking for fcntl.h... yes Step #1: checking for inttypes.h... (cached) yes Step #1: checking limits.h usability... yes Step #1: checking limits.h presence... yes Step #1: checking for limits.h... yes Step #1: checking netinet/in.h usability... yes Step #1: checking netinet/in.h presence... yes Step #1: checking for netinet/in.h... yes Step #1: checking for stdint.h... (cached) yes Step #1: checking stddef.h usability... yes Step #1: checking stddef.h presence... yes Step #1: checking for stddef.h... yes Step #1: checking for stdlib.h... (cached) yes Step #1: checking for string.h... (cached) yes Step #1: checking for strings.h... (cached) yes Step #1: checking for dlfcn.h... (cached) yes Step #1: checking time.h usability... yes Step #1: checking time.h presence... yes Step #1: checking for time.h... yes Step #1: checking sys/time.h usability... yes Step #1: checking sys/time.h presence... yes Step #1: checking for sys/time.h... yes Step #1: checking for sys/types.h... (cached) yes Step #1: checking for sys/stat.h... (cached) yes Step #1: checking sys/param.h usability... yes Step #1: checking sys/param.h presence... yes Step #1: checking for sys/param.h... yes Step #1: checking sys/socket.h usability... yes Step #1: checking sys/socket.h presence... yes Step #1: checking for sys/socket.h... yes Step #1: checking for sys/time.h... (cached) yes Step #1: checking sys/poll.h usability... yes Step #1: checking sys/poll.h presence... yes Step #1: checking for sys/poll.h... yes Step #1: checking sys/epoll.h usability... yes Step #1: checking sys/epoll.h presence... yes Step #1: checking for sys/epoll.h... yes Step #1: checking sys/uio.h usability... yes Step #1: checking sys/uio.h presence... yes Step #1: checking for sys/uio.h... yes Step #1: checking sys/event.h usability... no Step #1: checking sys/event.h presence... no Step #1: checking for sys/event.h... no Step #1: checking sys/sockio.h usability... no Step #1: checking sys/sockio.h presence... no Step #1: checking for sys/sockio.h... no Step #1: checking sys/un.h usability... yes Step #1: checking sys/un.h presence... yes Step #1: checking for sys/un.h... yes Step #1: checking sys/resource.h usability... yes Step #1: checking sys/resource.h presence... yes Step #1: checking for sys/resource.h... yes Step #1: checking syslog.h usability... yes Step #1: checking syslog.h presence... yes Step #1: checking for syslog.h... yes Step #1: checking errno.h usability... yes Step #1: checking errno.h presence... yes Step #1: checking for errno.h... yes Step #1: checking for unistd.h... (cached) yes Step #1: checking sys/mman.h usability... yes Step #1: checking sys/mman.h presence... yes Step #1: checking for sys/mman.h... yes Step #1: checking sys/sem.h usability... yes Step #1: checking sys/sem.h presence... yes Step #1: checking for sys/sem.h... yes Step #1: checking sys/ipc.h usability... yes Step #1: checking sys/ipc.h presence... yes Step #1: checking for sys/ipc.h... yes Step #1: checking sys/msg.h usability... yes Step #1: checking sys/msg.h presence... yes Step #1: checking for sys/msg.h... yes Step #1: checking netdb.h usability... yes Step #1: checking netdb.h presence... yes Step #1: checking for netdb.h... yes Step #1: checking for uid_t in sys/types.h... yes Step #1: checking for inline... inline Step #1: checking for int32_t... yes Step #1: checking for int64_t... yes Step #1: checking for int8_t... yes Step #1: checking for mode_t... yes Step #1: checking for pid_t... yes Step #1: checking for size_t... yes Step #1: checking for ssize_t... yes Step #1: checking for uint64_t... yes Step #1: checking for uint32_t... yes Step #1: checking for uint16_t... yes Step #1: checking for uint8_t... yes Step #1: checking for struct sockaddr_un.sun_len... no Step #1: checking looking for union semun in sys/sem.h... no Step #1: checking for clock_gettime... yes Step #1: checking for unistd.h... (cached) yes Step #1: checking for working chown... yes Step #1: checking vfork.h usability... no Step #1: checking vfork.h presence... no Step #1: checking for vfork.h... no Step #1: checking for fork... yes Step #1: checking for vfork... yes Step #1: checking for working fork... yes Step #1: checking for working vfork... (cached) yes Step #1: checking for stdlib.h... (cached) yes Step #1: checking for unistd.h... (cached) yes Step #1: checking for sys/param.h... (cached) yes Step #1: checking for getpagesize... yes Step #1: checking for working mmap... yes Step #1: checking whether strerror_r is declared... yes Step #1: checking for strerror_r... yes Step #1: checking whether strerror_r returns char *... yes Step #1: checking for alarm... yes Step #1: checking for fsync... yes Step #1: checking for fdatasync... yes Step #1: checking for ftruncate... yes Step #1: checking for posix_fallocate... yes Step #1: checking for gettimeofday... yes Step #1: checking for localtime... yes Step #1: checking for localtime_r... yes Step #1: checking for memset... yes Step #1: checking for munmap... yes Step #1: checking for socket... yes Step #1: checking for strchr... yes Step #1: checking for strrchr... yes Step #1: checking for strdup... yes Step #1: checking for strstr... yes Step #1: checking for strcasecmp... yes Step #1: checking for poll... yes Step #1: checking for epoll_create... yes Step #1: checking for epoll_create1... yes Step #1: checking for kqueue... no Step #1: checking for random... yes Step #1: checking for rand... yes Step #1: checking for getrlimit... yes Step #1: checking for sysconf... yes Step #1: checking for getpeerucred... no Step #1: checking for getpeereid... no Step #1: checking for openat... yes Step #1: checking for unlinkat... yes Step #1: checking for pthread_spin_lock... yes Step #1: checking for pthread_setschedparam... yes Step #1: checking for pthread_mutexattr_setpshared... yes Step #1: checking for pthread_condattr_setpshared... yes Step #1: checking for sem_timedwait... yes Step #1: checking for semtimedop... yes Step #1: checking for MSG_NOSIGNAL... yes Step #1: checking for SO_NOSIGPIPE ... no Step #1: checking for RTLD_NEXT... yes Step #1: checking for strlcpy... no Step #1: checking for strlcat... no Step #1: checking for strchrnul... yes Step #1: checking for architecture in x86_64... x86_64 Step #1: checking for os in linux-gnu... Linux Step #1: checking whether GCC supports builtin sync intrinsics... yes Step #1: checking whether GCC supports builtin atomic intrinsics... yes Step #1: checking whether atomics need memory barrier... yes Step #1: checking whether clang supports "-Wall"... yes Step #1: checking whether clang supports "-Wextra"... yes Step #1: checking whether clang supports "-Wunused"... yes Step #1: checking whether clang supports "-Wshadow"... yes Step #1: checking whether clang supports "-Wmissing-prototypes"... yes Step #1: checking whether clang supports "-Wmissing-declarations"... yes Step #1: checking whether clang supports "-Wsuggest-attribute=noreturn"... no Step #1: checking whether clang supports "-Wsuggest-attribute=format"... no Step #1: checking whether clang supports "-Wproperty-attribute-mismatch"... yes Step #1: checking whether clang supports "-Wstrict-prototypes"... yes Step #1: checking whether clang supports "-Wpointer-arith"... yes Step #1: checking whether clang supports "-Wwrite-strings"... yes Step #1: checking whether clang supports "-Wcast-align"... yes Step #1: checking whether clang supports "-Wbad-function-cast"... yes Step #1: checking whether clang supports "-Wmissing-format-attribute"... yes Step #1: checking whether clang supports "-Wfloat-equal"... yes Step #1: checking whether clang supports "-Wformat=2"... yes Step #1: checking whether clang supports "-Wformat-signedness"... no Step #1: checking whether clang supports "-Wshift-overflow"... yes Step #1: checking whether clang supports "-Wshift-overflow=2"... no Step #1: checking whether clang supports "-Woverlength-strings"... yes Step #1: checking whether clang supports "-Wredundent-decls"... no Step #1: checking whether clang supports "-Winit-self"... yes Step #1: checking whether clang supports "-Wuninitialized"... yes Step #1: checking whether clang supports "-Wunknown-pragmas"... yes Step #1: checking whether clang supports "-Wno-unused-parameter"... yes Step #1: checking whether clang supports "-Wunused-const-variable"... yes Step #1: checking whether clang supports "-Wno-format-nonliteral"... yes Step #1: checking whether clang supports "-Wno-format-truncation"... no Step #1: checking whether clang supports "-Wno-sign-compare"... yes Step #1: checking whether clang supports "-Wmissing-format-attribute"... yes Step #1: checking whether clang supports "-Wsuggest-attribute=format"... no Step #1: configure: Enabling inter-library dependencies: Step #1: checking for GNU date... yes Step #1: checking for BSD date... no Step #1: checking for date type... gnu Step #1: checking whether GNU date supports --date... yes Step #1: checking whether GNU date supports --utc... yes Step #1: configure: trying to determine source epoch Step #1: checking for source epoch in $SOURCE_EPOCH... no Step #1: checking for source epoch in source_epoch file... no Step #1: checking for source epoch baked in by gitattributes export-subst... no Step #1: checking for source epoch in $SOURCE_DATE_EPOCH... no Step #1: checking whether git log can provide a source epoch... yes Step #1: configure: using source epoch 2023-11-20 12:15:21 UTC Step #1: checking that generated files are newer than configure... done Step #1: configure: creating ./config.status Step #1: config.status: creating Makefile Step #1: config.status: creating include/Makefile Step #1: config.status: creating include/qb/Makefile Step #1: config.status: creating lib/Makefile Step #1: config.status: creating lib/libqb.pc Step #1: config.status: creating tools/Makefile Step #1: config.status: creating tests/Makefile Step #1: config.status: creating tests/test.conf Step #1: config.status: creating examples/Makefile Step #1: config.status: creating doxygen2man/Makefile Step #1: config.status: creating docs/Makefile Step #1: config.status: creating docs/man.dox Step #1: config.status: creating lib/qblog_script.la Step #1: config.status: creating include/config.h Step #1: config.status: creating include/qb/qbconfig.h Step #1: config.status: executing depfiles commands Step #1: config.status: executing libtool commands Step #1: Step #1: libqb configuration: Step #1: Version = 2.0.8.3-c752 Step #1: Prefix = /usr Step #1: Executables = ${exec_prefix}/sbin Step #1: Man pages = ${datarootdir}/man Step #1: Doc dir = ${datarootdir}/doc/${PACKAGE_TARNAME} Step #1: Libraries = /usr/lib64 Step #1: Header files = ${prefix}/include Step #1: Arch-independent files = ${datarootdir} Step #1: State information = /var Step #1: System configuration = /etc Step #1: SOCKETDIR = /var/run Step #1: Features = epoll gcc__sync Step #1: Use systemd journal = no Step #1: Step #1: libqb build info: Step #1: Optimization = Step #1: Debug options = Step #1: Extra compiler warnings = Step #1: Env. defined CFLAG = -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #1: Env. defined CPPFLAGS = Step #1: Env. defined LDFLAGS = Step #1: ANSI defined CPPFLAGS = Step #1: Coverage CFLAGS = Step #1: Coverage LDFLAGS = Step #1: Fatal War. CFLAGS = Step #1: Final CFLAGS = -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -Wextra -Wunused -Wshadow -Wmissing-prototypes -Wmissing-declarations -Wproperty-attribute-mismatch -Wstrict-prototypes -Wpointer-arith -Wwrite-strings -Wcast-align -Wbad-function-cast -Wmissing-format-attribute -Wfloat-equal -Wformat=2 -Wshift-overflow -Woverlength-strings -Winit-self -Wuninitialized -Wunknown-pragmas -Wno-unused-parameter -Wunused-const-variable -Wno-format-nonliteral -Wno-sign-compare Step #1: Final CPPFLAGS = Step #1: Final LDFLAGS = Step #1: echo 2.0.8.3-c752 > .version-t && mv .version-t .version Step #1: make all-recursive Step #1: make[1]: Entering directory '/src/libqb' Step #1: Making all in include Step #1: make[2]: Entering directory '/src/libqb/include' Step #1: make all-recursive Step #1: make[3]: Entering directory '/src/libqb/include' Step #1: Making all in qb Step #1: make[4]: Entering directory '/src/libqb/include/qb' Step #1: make all-am Step #1: make[5]: Entering directory '/src/libqb/include/qb' Step #1: make[5]: Leaving directory '/src/libqb/include/qb' Step #1: make[4]: Leaving directory '/src/libqb/include/qb' Step #1: make[4]: Entering directory '/src/libqb/include' Step #1: make[4]: Leaving directory '/src/libqb/include' Step #1: make[3]: Leaving directory '/src/libqb/include' Step #1: make[2]: Leaving directory '/src/libqb/include' Step #1: Making all in lib Step #1: make[2]: Entering directory '/src/libqb/lib' Step #1: CC libqb_la-util.lo Step #1: CC libqb_la-hdb.lo Step #1: CC libqb_la-ringbuffer.lo Step #1: CC libqb_la-ringbuffer_helper.lo Step #1: CC libqb_la-array.lo Step #1: CC libqb_la-loop.lo Step #1: loop.c:40:9: warning: cast from 'char *' to 'struct qb_loop_item *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: job = qb_list_first_entry(&level->job_head, struct qb_loop_item, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #1:  qb_list_entry((ptr)->next, type, member) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 1 warning generated. Step #1:  CC libqb_la-loop_poll.lo Step #1: loop_poll.c:564:10: warning: cast from 'char *' to 'struct qb_loop_item *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: item = qb_list_entry(list, struct qb_loop_item, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:593:10: warning: cast from 'char *' to 'struct qb_loop_item *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: item = qb_list_entry(list, struct qb_loop_item, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:632:3: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &s->sig_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:632:3: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &s->sig_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:747:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[sig->p].wait_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:747:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[sig->p].wait_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:760:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[sig->p].job_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_poll.c:760:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[sig->p].job_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 8 warnings generated. Step #1:  CC libqb_la-loop_job.lo Step #1: loop_job.c:37:28: warning: cast from 'char *' to 'struct qb_loop_job *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: struct qb_loop_job *job = qb_list_entry(item, struct qb_loop_job, item); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_job.c:142:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[p].wait_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_job.c:142:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[p].wait_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_job.c:153:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(item, &l->level[p].job_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: loop_job.c:153:2: warning: cast from 'char *' to 'typeof (*item) *' (aka 'struct qb_loop_item *') increases required alignment from 1 to 8 [-Wcast-align] Step #1:  qb_list_for_each_entry(item, &l->level[p].job_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 5 warnings generated. Step #1:  CC libqb_la-loop_timerlist.lo Step #1: CC libqb_la-ipcc.lo Step #1: CC libqb_la-ipcs.lo Step #1: ipcs.c:196:7: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: c = qb_list_entry(pos, struct qb_ipcs_connection, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ipcs.c:243:7: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: c = qb_list_entry(pos, struct qb_ipcs_connection, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ipcs.c:484:6: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: c = qb_list_first_entry(&s->connections, struct qb_ipcs_connection, Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #1:  qb_list_entry((ptr)->next, type, member) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ipcs.c:502:6: warning: cast from 'char *' to 'struct qb_ipcs_connection *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: c = qb_list_first_entry(¤t->list, struct qb_ipcs_connection, Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #1: qb_list_entry((ptr)->next, type, member) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 4 warnings generated. Step #1:  CC libqb_la-ipc_shm.lo Step #1: CC libqb_la-ipc_setup.lo Step #1: CC libqb_la-ipc_socket.lo Step #1: CC libqb_la-log.lo Step #1: log.c:354:11: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: flt = qb_list_entry(f_item, struct qb_log_filter, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:362:11: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: flt = qb_list_entry(f_item, struct qb_log_filter, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:481:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:481:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:508:3: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(flt, &t->filter_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:508:3: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(flt, &t->filter_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:514:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(flt, &tags_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:514:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(flt, &tags_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:542:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:542:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1:  qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:558:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(flt, list_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1:  for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:558:2: warning: cast from 'char *' to 'typeof (*flt) *' (aka 'struct qb_log_filter *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(flt, list_head, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:645:10: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: flt = qb_list_entry(iter, struct qb_log_filter, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:659:10: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: flt = qb_list_entry(iter, struct qb_log_filter, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:770:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:770:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:791:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:242:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: for (pos = qb_list_entry((head)->next, typeof(*pos), member); \ Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:791:2: warning: cast from 'char *' to 'typeof (*sect) *' (aka 'struct callsite_section *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry(sect, &callsite_sections, list) { Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:244:13: note: expanded from macro 'qb_list_for_each_entry' Step #1: pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:886:10: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: flt = qb_list_entry(iter2, struct qb_log_filter, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:894:7: warning: cast from 'char *' to 'struct callsite_section *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: s = qb_list_entry(iter, struct callsite_section, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log.c:899:9: warning: cast from 'char *' to 'struct qb_log_filter *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: flt = qb_list_entry(iter, struct qb_log_filter, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 21 warnings generated. Step #1:  CC libqb_la-log_thread.lo Step #1: log_thread.c:89:7: warning: cast from 'char *' to 'struct qb_log_record *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_first_entry(&logt_print_finished_records, Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #1: qb_list_entry((ptr)->next, type, member) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: log_thread.c:285:10: warning: cast from 'char *' to 'struct qb_log_record *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: rec = qb_list_first_entry(&logt_print_finished_records, Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #1: qb_list_entry((ptr)->next, type, member) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 2 warnings generated. Step #1:  CC libqb_la-log_blackbox.lo Step #1: CC libqb_la-log_file.lo Step #1: CC libqb_la-log_syslog.lo Step #1: CC libqb_la-log_dcs.lo Step #1: CC libqb_la-log_format.lo Step #1: CC libqb_la-map.lo Step #1: CC libqb_la-skiplist.lo Step #1: skiplist.c:206:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: skiplist.c:216:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: skiplist.c:244:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(pos, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: skiplist.c:285:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: f = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: skiplist.c:342:7: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: f = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 5 warnings generated. Step #1:  CC libqb_la-hashtable.lo Step #1: hashtable.c:100:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: hash_node = qb_list_entry(list, struct hash_node, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:132:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(pos, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:164:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: hash_node = qb_list_entry(list, struct hash_node, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:198:14: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: node_try = qb_list_entry(list, struct hash_node, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:246:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:254:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:296:7: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: f = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:353:7: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: f = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:415:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: hash_node = qb_list_first_entry(ln, struct hash_node, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:207:2: note: expanded from macro 'qb_list_first_entry' Step #1:  qb_list_entry((ptr)->next, type, member) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:416:3: warning: cast from 'char *' to 'typeof (*hash_node) *' (aka 'struct hash_node *') increases required alignment from 1 to 8 [-Wcast-align] Step #1: qb_list_for_each_entry_from(hash_node, Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:291:13: note: expanded from macro 'qb_list_for_each_entry_from' Step #1:  pos = qb_list_entry(pos->member.next, typeof(*pos), member)) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:458:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(pos, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: hashtable.c:476:15: warning: cast from 'char *' to 'struct hash_node *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: hash_node = qb_list_entry(pos, struct hash_node, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 12 warnings generated. Step #1:  CC libqb_la-trie.lo Step #1: trie.c:600:9: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: tn = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: trie.c:642:8: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: f = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: trie.c:704:31: warning: cast from 'char *' to 'struct qb_map_notifier *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: struct qb_map_notifier *f = qb_list_entry(list, struct qb_map_notifier, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 3 warnings generated. Step #1:  CC libqb_la-unix.lo Step #1: CC libqb_la-loop_poll_epoll.lo Step #1: CC strlcpy.lo Step #1: CC strlcat.lo Step #1: GEN qblog_script.ld Step #1: CCLD libqb.la Step #1: make[2]: Leaving directory '/src/libqb/lib' Step #1: Making all in doxygen2man Step #1: make[2]: Entering directory '/src/libqb/doxygen2man' Step #1: CC doxygen2man-doxygen2man.o Step #1: doxygen2man.c:160:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:640:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:661:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:815:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:856:9: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:871:9: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:924:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:968:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1: ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: doxygen2man.c:974:8: warning: cast from 'char *' to 'struct param_info *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: pi = qb_list_entry(iter, struct param_info, list); Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: ../include/qb/qblist.h:198:3: note: expanded from macro 'qb_list_entry' Step #1:  ((type *)((char*)ptr - offsetof(type, member))); }) Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 9 warnings generated. Step #1:  CC doxygen2man-cstring.o Step #1: cstring.c:31:30: warning: cast from 'char *' to 'struct cstring_header *' increases required alignment from 1 to 8 [-Wcast-align] Step #1: struct cstring_header *h = (struct cstring_header *)cstring; Step #1: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #1: 1 warning generated. Step #1:  CCLD doxygen2man Step #1: make[2]: Leaving directory '/src/libqb/doxygen2man' Step #1: Making all in docs Step #1: make[2]: Entering directory '/src/libqb/docs' Step #1: make[2]: Nothing to be done for 'all'. Step #1: make[2]: Leaving directory '/src/libqb/docs' Step #1: Making all in tools Step #1: make[2]: Entering directory '/src/libqb/tools' Step #1: CC qb_blackbox-qb_blackbox.o Step #1: CCLD qb-blackbox Step #1: make[2]: Leaving directory '/src/libqb/tools' Step #1: Making all in examples Step #1: make[2]: Entering directory '/src/libqb/examples' Step #1: CC mapnotify-mapnotify.o Step #1: CCLD mapnotify Step #1: CC simplelog-simplelog.o Step #1: CCLD simplelog Step #1: CC tcpclient-tcpclient.o Step #1: CCLD tcpclient Step #1: CC tcpserver-tcpserver.o Step #1: CCLD tcpserver Step #1: CC ipcclient-ipcclient.o Step #1: CCLD ipcclient Step #1: CC ipcserver-ipcserver.o Step #1: CCLD ipcserver Step #1: make[2]: Leaving directory '/src/libqb/examples' Step #1: Making all in tests Step #1: make[2]: Entering directory '/src/libqb/tests' Step #1: CC bmc.o Step #1: CCLD bmc Step #1: CC bmcpt-bmcpt.o Step #1: CCLD bmcpt Step #1: CC bms-bms.o Step #1: CCLD bms Step #1: CC rbreader.o Step #1: CCLD rbreader Step #1: CC rbwriter.o Step #1: CCLD rbwriter Step #1: CC bench-log.o Step #1: CCLD bench-log Step #1: CC format_compare_speed.o Step #1: CCLD format_compare_speed Step #1: CC loop.o Step #1: CCLD loop Step #1: CC print_ver.o Step #1: print_ver.c:42:1: warning: "2.0.8.3-c752" parsed as: "2" "." "0" "." "8" ".3-c752" [-W#pragma-messages] Step #1: _Pragma(MSG); Step #1: ^ Step #1: :151:2: note: expanded from here Step #1: message ("\"2.0.8.3-c752\" parsed as: \"2\" \".\" \"0\" \".\" \"8\" \".3-c752\"") Step #1: ^ Step #1: 1 warning generated. Step #1:  CCLD print_ver Step #1: make[2]: Leaving directory '/src/libqb/tests' Step #1: make[2]: Entering directory '/src/libqb' Step #1: make[2]: Nothing to be done for 'all-am'. Step #1: make[2]: Leaving directory '/src/libqb' Step #1: make[1]: Leaving directory '/src/libqb' Step #1: make install-recursive Step #1: make[1]: Entering directory '/src/libqb' Step #1: Making install in include Step #1: make[2]: Entering directory '/src/libqb/include' Step #1: Making install in qb Step #1: make[3]: Entering directory '/src/libqb/include/qb' Step #1: make[4]: Entering directory '/src/libqb/include/qb' Step #1: make[4]: Nothing to be done for 'install-exec-am'. Step #1: /usr/bin/mkdir -p '/usr/include/qb/' Step #1: /usr/bin/install -c -m 644 qbhdb.h qblist.h qbdefs.h qbatomic.h qbloop.h qbrb.h qbutil.h qbarray.h qbipcc.h qbipcs.h qbipc_common.h qblog.h qbconfig.h qbmap.h '/usr/include/qb/' Step #1: make[4]: Leaving directory '/src/libqb/include/qb' Step #1: make[3]: Leaving directory '/src/libqb/include/qb' Step #1: make[3]: Entering directory '/src/libqb/include' Step #1: make[4]: Entering directory '/src/libqb/include' Step #1: make[4]: Nothing to be done for 'install-exec-am'. Step #1: make[4]: Nothing to be done for 'install-data-am'. Step #1: make[4]: Leaving directory '/src/libqb/include' Step #1: make[3]: Leaving directory '/src/libqb/include' Step #1: make[2]: Leaving directory '/src/libqb/include' Step #1: Making install in lib Step #1: make[2]: Entering directory '/src/libqb/lib' Step #1: make[3]: Entering directory '/src/libqb/lib' Step #1: /usr/bin/mkdir -p '/usr/lib64' Step #1: /bin/bash ../libtool --mode=install /usr/bin/install -c libqb.la '/usr/lib64' Step #1: libtool: install: /usr/bin/install -c .libs/libqb.so.100.3.2 /usr/lib64/libqb.so.100.3.2 Step #1: libtool: install: (cd /usr/lib64 && { ln -s -f libqb.so.100.3.2 libqb.so.100 || { rm -f libqb.so.100 && ln -s libqb.so.100.3.2 libqb.so.100; }; }) Step #1: libtool: install: (cd /usr/lib64 && { ln -s -f libqb.so.100.3.2 libqb.so || { rm -f libqb.so && ln -s libqb.so.100.3.2 libqb.so; }; }) Step #1: libtool: install: /usr/bin/install -c .libs/libqb.lai /usr/lib64/libqb.la Step #1: libtool: install: /usr/bin/install -c .libs/libqb.a /usr/lib64/libqb.a Step #1: libtool: install: chmod 644 /usr/lib64/libqb.a Step #1: libtool: install: ranlib /usr/lib64/libqb.a Step #1: libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /usr/lib64 Step #1: ---------------------------------------------------------------------- Step #1: Libraries have been installed in: Step #1: /usr/lib64 Step #1: Step #1: If you ever happen to want to link against installed libraries Step #1: in a given directory, LIBDIR, you must either use libtool, and Step #1: specify the full pathname of the library, or use the '-LLIBDIR' Step #1: flag during linking and do at least one of the following: Step #1: - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #1: during execution Step #1: - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #1: during linking Step #1: - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #1: - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #1: Step #1: See any operating system documentation about shared libraries for Step #1: more information, such as the ld(1) and ld.so(8) manual pages. Step #1: ---------------------------------------------------------------------- Step #1: /usr/bin/mkdir -p '/usr/lib64/pkgconfig' Step #1: /usr/bin/install -c -m 644 libqb.pc '/usr/lib64/pkgconfig' Step #1: make[3]: Nothing to be done for 'install-data-am'. Step #1: make[3]: Leaving directory '/src/libqb/lib' Step #1: make[2]: Leaving directory '/src/libqb/lib' Step #1: Making install in doxygen2man Step #1: make[2]: Entering directory '/src/libqb/doxygen2man' Step #1: make[3]: Entering directory '/src/libqb/doxygen2man' Step #1: /usr/bin/mkdir -p '/usr/bin' Step #1: /bin/bash ../libtool --mode=install /usr/bin/install -c doxygen2man '/usr/bin' Step #1: libtool: install: /usr/bin/install -c .libs/doxygen2man /usr/bin/doxygen2man Step #1: /usr/bin/mkdir -p '/usr/share/man/man1' Step #1: /usr/bin/install -c -m 644 doxygen2man.1 '/usr/share/man/man1' Step #1: make[3]: Leaving directory '/src/libqb/doxygen2man' Step #1: make[2]: Leaving directory '/src/libqb/doxygen2man' Step #1: Making install in docs Step #1: make[2]: Entering directory '/src/libqb/docs' Step #1: make[3]: Entering directory '/src/libqb/docs' Step #1: make[3]: Nothing to be done for 'install-exec-am'. Step #1: /usr/bin/mkdir -p '/usr/share/man/man3' Step #1: /usr/bin/mkdir -p '/usr/share/man/man8' Step #1: /usr/bin/install -c -m 644 man8/qb-blackbox.8 '/usr/share/man/man8' Step #1: make[3]: Leaving directory '/src/libqb/docs' Step #1: make[2]: Leaving directory '/src/libqb/docs' Step #1: Making install in tools Step #1: make[2]: Entering directory '/src/libqb/tools' Step #1: make[3]: Entering directory '/src/libqb/tools' Step #1: /usr/bin/mkdir -p '/usr/sbin' Step #1: /bin/bash ../libtool --mode=install /usr/bin/install -c qb-blackbox '/usr/sbin' Step #1: libtool: install: /usr/bin/install -c .libs/qb-blackbox /usr/sbin/qb-blackbox Step #1: make[3]: Nothing to be done for 'install-data-am'. Step #1: make[3]: Leaving directory '/src/libqb/tools' Step #1: make[2]: Leaving directory '/src/libqb/tools' Step #1: Making install in examples Step #1: make[2]: Entering directory '/src/libqb/examples' Step #1: make[3]: Entering directory '/src/libqb/examples' Step #1: make[3]: Nothing to be done for 'install-exec-am'. Step #1: make[3]: Nothing to be done for 'install-data-am'. Step #1: make[3]: Leaving directory '/src/libqb/examples' Step #1: make[2]: Leaving directory '/src/libqb/examples' Step #1: Making install in tests Step #1: make[2]: Entering directory '/src/libqb/tests' Step #1: make[3]: Entering directory '/src/libqb/tests' Step #1: make[3]: Nothing to be done for 'install-exec-am'. Step #1: make[3]: Leaving directory '/src/libqb/tests' Step #1: make[2]: Leaving directory '/src/libqb/tests' Step #1: make[2]: Entering directory '/src/libqb' Step #1: make[3]: Entering directory '/src/libqb' Step #1: make[3]: Nothing to be done for 'install-exec-am'. Step #1: /usr/bin/mkdir -p '/usr/share/doc/libqb' Step #1: /usr/bin/install -c -m 644 COPYING INSTALL README.markdown '/usr/share/doc/libqb' Step #1: make[3]: Leaving directory '/src/libqb' Step #1: make[2]: Leaving directory '/src/libqb' Step #1: make[1]: Leaving directory '/src/libqb' Step #1: Removing intermediate container f034ffcca57c Step #1: ---> ea5da81dfcf4 Step #1: Step 4/7 : RUN git clone --recurse-submodules --depth 1 https://github.com/USBGuard/usbguard usbguard Step #1: ---> Running in 8d3d621a7f80 Step #1: Cloning into 'usbguard'... Step #1: Submodule 'src/ThirdParty/Catch' (https://github.com/philsquared/Catch) registered for path 'src/ThirdParty/Catch' Step #1: Submodule 'src/ThirdParty/PEGTL' (https://github.com/ColinH/PEGTL) registered for path 'src/ThirdParty/PEGTL' Step #1: Cloning into '/src/usbguard/src/ThirdParty/Catch'... Step #1: Cloning into '/src/usbguard/src/ThirdParty/PEGTL'... Step #1: Submodule path 'src/ThirdParty/Catch': checked out '216713a4066b79d9803d374f261ccb30c0fb451f' Step #1: Submodule path 'src/ThirdParty/PEGTL': checked out 'eeba7fa1180655bd683be620cc31be35607442ca' Step #1: Removing intermediate container 8d3d621a7f80 Step #1: ---> 3c0c829e0ebc Step #1: Step 5/7 : WORKDIR usbguard Step #1: ---> Running in be7b80464256 Step #1: Removing intermediate container be7b80464256 Step #1: ---> d8adf9466b2d Step #1: Step 6/7 : COPY build.sh $SRC Step #1: ---> c7bec14044b0 Step #1: Step 7/7 : ENV OLD_LLVMPASS 1 Step #1: ---> Running in b4041f5ef3c0 Step #1: Removing intermediate container b4041f5ef3c0 Step #1: ---> ae2b4c85c6ae Step #1: Successfully built ae2b4c85c6ae Step #1: Successfully tagged gcr.io/oss-fuzz/usbguard:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/usbguard Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filenh7wMP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/usbguard/.git Step #2 - "srcmap": + GIT_DIR=/src/usbguard Step #2 - "srcmap": + cd /src/usbguard Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/USBGuard/usbguard Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ad7a9c60b3185b6761b2a0913f00a80eb41cfc59 Step #2 - "srcmap": + jq_inplace /tmp/filenh7wMP '."/src/usbguard" = { type: "git", url: "https://github.com/USBGuard/usbguard", rev: "ad7a9c60b3185b6761b2a0913f00a80eb41cfc59" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileRR8Sxb Step #2 - "srcmap": + cat /tmp/filenh7wMP Step #2 - "srcmap": + jq '."/src/usbguard" = { type: "git", url: "https://github.com/USBGuard/usbguard", rev: "ad7a9c60b3185b6761b2a0913f00a80eb41cfc59" }' Step #2 - "srcmap": + mv /tmp/fileRR8Sxb /tmp/filenh7wMP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libqb/.git Step #2 - "srcmap": + GIT_DIR=/src/libqb Step #2 - "srcmap": + cd /src/libqb Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ClusterLabs/libqb Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c7528139dc8a6999fea65d94f7b8fbb424a6bd06 Step #2 - "srcmap": + jq_inplace /tmp/filenh7wMP '."/src/libqb" = { type: "git", url: "https://github.com/ClusterLabs/libqb", rev: "c7528139dc8a6999fea65d94f7b8fbb424a6bd06" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileeObEDG Step #2 - "srcmap": + cat /tmp/filenh7wMP Step #2 - "srcmap": + jq '."/src/libqb" = { type: "git", url: "https://github.com/ClusterLabs/libqb", rev: "c7528139dc8a6999fea65d94f7b8fbb424a6bd06" }' Step #2 - "srcmap": + mv /tmp/fileeObEDG /tmp/filenh7wMP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filenh7wMP Step #2 - "srcmap": + rm /tmp/filenh7wMP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/usbguard": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/USBGuard/usbguard", Step #2 - "srcmap": "rev": "ad7a9c60b3185b6761b2a0913f00a80eb41cfc59" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/libqb": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ClusterLabs/libqb", Step #2 - "srcmap": "rev": "c7528139dc8a6999fea65d94f7b8fbb424a6bd06" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + export PKG_CONFIG_PATH=/usr/lib64/pkgconfig/ Step #3 - "compile-libfuzzer-coverage-x86_64": + PKG_CONFIG_PATH=/usr/lib64/pkgconfig/ Step #3 - "compile-libfuzzer-coverage-x86_64": + autoreconf -fi Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'config'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'config/ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:51: installing 'config/compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:139: installing 'config/config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:139: installing 'config/config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:10: installing 'config/install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:10: installing 'config/missing' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am: installing 'config/depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing 'config/test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /usr/lib64/ -name libqb.a -print -quit Step #3 - "compile-libfuzzer-coverage-x86_64": + libqb=/usr/lib64/libqb.a Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /usr/lib/ -name libprotobuf.a -print -quit Step #3 - "compile-libfuzzer-coverage-x86_64": + protobuf=/usr/lib/x86_64-linux-gnu/libprotobuf.a Step #3 - "compile-libfuzzer-coverage-x86_64": + qb_LIBS=/usr/lib64/libqb.a Step #3 - "compile-libfuzzer-coverage-x86_64": + protobuf_LIBS='-pthread /usr/lib/x86_64-linux-gnu/libprotobuf.a -pthread -lpthread' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --with-bundled-catch --with-bundled-pegtl --with-crypto-library=gcrypt --disable-shared Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to create a pax tar archive... gnutar Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wno-implicit-fallthrough... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang++... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C99... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking for __atomic_add_fetch_8 in -latomic... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for basename function... GNU Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strerror_r function... GNU Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang is Clang... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether Clang needs flag to prevent "argument unused" warning when linking with -pthread... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether more special flags are required for pthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PTHREAD_PRIO_INHERIT... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for NETLINK_KOBJECT_UEVENT definition... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking pkg-config is at least version 0.9.0... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for qb... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sodium... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libgcrypt-config... /usr/bin/libgcrypt-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking for LIBGCRYPT - version >= 1.5.0... yes (1.8.5) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for audit... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: libaudit development files not found! Linux Audit support wille be turned OFF Step #3 - "compile-libfuzzer-coverage-x86_64": checking for seccomp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libcapng... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for umockdev... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: umockdev development files not found! umockdev device manager won't be available Step #3 - "compile-libfuzzer-coverage-x86_64": checking for protobuf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for protoc... protoc Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Using bundled Catch library Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we need to link to -lstdc++fs for PEGTL explicitly... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Using bundled PEGTL library Step #3 - "compile-libfuzzer-coverage-x86_64": checking tao/pegtl.hpp usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking tao/pegtl.hpp presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for tao/pegtl.hpp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dbus... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for xmllint... xmllint Step #3 - "compile-libfuzzer-coverage-x86_64": checking for xsltproc... xsltproc Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gdbus-codegen... gdbus-codegen Step #3 - "compile-libfuzzer-coverage-x86_64": checking for polkit... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a2x... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: Unable to find documentation generator (asciidoc / a2x). Documentation will not be generated. Step #3 - "compile-libfuzzer-coverage-x86_64": checking for aspell... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: Unable to find the Aspell spell checker. The test suite will skip spell checking of documentation related files. Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working alloca.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for alloca... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for arpa/inet.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fcntl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.hi usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.hi presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.hi... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking locale.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking locale.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for locale.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netdb.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking syslog.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking syslog.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for syslog.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking wchar.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking wchar.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for wchar.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking ext/stdio_filebuf.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking ext/stdio_filebuf.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ext/stdio_filebuf.h: present but cannot be compiled Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ext/stdio_filebuf.h: check for missing prerequisite headers? Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ext/stdio_filebuf.h: see the Autoconf documentation Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ext/stdio_filebuf.h: section "Present But Cannot Be Compiled" Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ext/stdio_filebuf.h: proceeding with the compiler's result Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ## ------------------------------------ ## Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ## Report this to usbguard@usbguard.org ## Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: ## ------------------------------------ ## Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ext/stdio_filebuf.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdbool.h that conforms to C99... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _Bool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inline... inline Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int16_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int32_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int64_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for int8_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pid_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ssize_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uid_t in sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint16_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint32_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint64_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint8_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking vfork.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking vfork.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vfork.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fork... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vfork... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working fork... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working vfork... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether lstat correctly handles trailing slash... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for GNU libc compatible malloc... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for GNU libc compatible realloc... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dup2... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gettimeofday... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for localtime_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memset... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mkdir... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for regcomp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for setlocale... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strerror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strstr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BASH_COMPLETION... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libusbguard.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Tests/Fuzzers/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Tests/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/build-config.h.in Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Build Configuration Summary Step #3 - "compile-libfuzzer-coverage-x86_64": =================================== Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Run full test suite: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ## Libraries Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": libqb: system-wide; -pthread /usr/lib64/libqb.a Step #3 - "compile-libfuzzer-coverage-x86_64": crypto: system-wide; -L/usr/lib/x86_64-linux-gnu -lgcrypt Step #3 - "compile-libfuzzer-coverage-x86_64": libaudit: not found Step #3 - "compile-libfuzzer-coverage-x86_64": libldap: None; building without LDAP support Step #3 - "compile-libfuzzer-coverage-x86_64": libseccomp: system-wide; -lseccomp Step #3 - "compile-libfuzzer-coverage-x86_64": libcap-ng: system-wide; -lcap-ng Step #3 - "compile-libfuzzer-coverage-x86_64": protobuf: system-wide; -pthread -pthread /usr/lib/x86_64-linux-gnu/libprotobuf.a -pthread -lpthread Step #3 - "compile-libfuzzer-coverage-x86_64": Catch: bundled; -I$(top_srcdir)/src/ThirdParty/Catch/single_include/catch2 Step #3 - "compile-libfuzzer-coverage-x86_64": PEGTL: bundled; -I$(top_srcdir)/src/ThirdParty/PEGTL/include Step #3 - "compile-libfuzzer-coverage-x86_64": GDBus: system-wide; -pthread -I/usr/include/dbus-1.0 -I/usr/lib/x86_64-linux-gnu/dbus-1.0/include -I/usr/include/polkit-1 -I/usr/include/libmount -I/usr/include/blkid -I/usr/include/glib-2.0 -I/usr/lib/x86_64-linux-gnu/glib-2.0/include -ldbus-1 -lpolkit-gobject-1 -lgio-2.0 -lgobject-2.0 -lglib-2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": umockdev: not found Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ## Directories Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": D-Bus System Services: ${datadir}/dbus-1/system-services Step #3 - "compile-libfuzzer-coverage-x86_64": D-Bus Busconfig: ${datadir}/dbus-1/system.d Step #3 - "compile-libfuzzer-coverage-x86_64": PolicyKit Policies: ${prefix}/share/polkit-1/actions/ Step #3 - "compile-libfuzzer-coverage-x86_64": systemd unit dir: - Step #3 - "compile-libfuzzer-coverage-x86_64": Bash completion dir: ${datarootdir}/bash-completion/completions Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ## Compilation Flags Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Debug Build: no Step #3 - "compile-libfuzzer-coverage-x86_64": DEFS: -DHAVE_CONFIG_H Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS: -std=c++17 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fvisibility=hidden -pedantic -Wno-unknown-pragmas -Wall -Wextra -Wformat=2 -Wredundant-decls -Wcast-align -Wmissing-declarations -Wmissing-include-dirs -Wmissing-format-attribute -Wswitch-enum -Wswitch-default -Winvalid-pch -Wformat-nonliteral -Wno-deprecated-register -Wno-missing-field-initializers -Wno-implicit-fallthrough Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS: -std=c99 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fvisibility=hidden -pedantic -Wno-unknown-pragmas -Wall -Wextra -Wformat=2 -Wredundant-decls -Wcast-align -Wmissing-declarations -Wmissing-include-dirs -Wmissing-format-attribute -Wswitch-enum -Wswitch-default -Winvalid-pch -Wformat-nonliteral -Wno-deprecated-register -Wno-missing-field-initializers -Wno-implicit-fallthrough Step #3 - "compile-libfuzzer-coverage-x86_64": CPPFLAGS: -DHAVE_BUILD_CONFIG_H Step #3 - "compile-libfuzzer-coverage-x86_64": LDFLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": ASAN_FLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": TSAN_FLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cd src/Tests/Fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find -name 'fuzzer-*.cpp' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/^\.\/\(fuzzer-.*\)\.cpp$/\1/g' Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzers='fuzzer-uevent Step #3 - "compile-libfuzzer-coverage-x86_64": fuzzer-usb-descriptor Step #3 - "compile-libfuzzer-coverage-x86_64": fuzzer-rules' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 src/build-config.h libusbguard.la Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile:3506: warning: overriding recipe for target 'check' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile:3012: warning: ignoring old recipe for target 'check' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #3 - "compile-libfuzzer-coverage-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Message.proto" Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p ./src/Library/IPC Step #3 - "compile-libfuzzer-coverage-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Rule.proto" Step #3 - "compile-libfuzzer-coverage-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Devices.proto" Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/sed \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{localstatedir}|/usr/local/var|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{exec_prefix}|/usr/local|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{datarootdir}|/usr/local/share|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{datadir}|/usr/local/share/usbguard|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{sysconfdir}|/usr/local/etc|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{prefix}|/usr/local|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": -e "s|[$]{PACKAGE_TARNAME}|usbguard|g" \ Step #3 - "compile-libfuzzer-coverage-x86_64": src/build-config.h.in > src/build-config.h || rm -f src/build-config.h Step #3 - "compile-libfuzzer-coverage-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Exception.proto" Step #3 - "compile-libfuzzer-coverage-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Policy.proto" Step #3 - "compile-libfuzzer-coverage-x86_64": protoc --cpp_out=./src/Library/IPC --proto_path=./src/Library/IPC "src/Library/IPC/Parameter.proto" Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Common/libusbguard_la-Utility.lo Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Rule.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Common/libusbguard_la-LDAPUtil.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-AllowedMatchesCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Devices.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Rule.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Message.pb.cc" Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Exception.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-ConfigFilePrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-Base64.lo Step #3 - "compile-libfuzzer-coverage-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Rule.pb.cc" Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Parameter.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-DeviceBase.lo Step #3 - "compile-libfuzzer-coverage-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Exception.pb.cc" Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Policy.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-DeviceManagerBase.lo Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Message.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": [libprotobuf WARNING google/protobuf/compiler/parser.cc:562] No syntax specified for the proto file: Rule.proto. Please use 'syntax = "proto2";' or 'syntax = "proto3";' to specify a syntax version. (Defaulted to proto2 syntax.) Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-DeviceManagerPrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-DevicePrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-FixedStateCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-Hash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-IPCClientPrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Devices.pb.cc" Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-IPCPrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Parameter.pb.cc" Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-IPCServerPrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-Init.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-KeyValueParserPrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-LocaltimeCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-RandomStateCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-RuleAppliedCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-RuleEvaluatedCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": sed -i -e '1i#ifndef __clang_analyzer__' -e '$a#endif' "src/Library/IPC/Policy.pb.cc" Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-RulePrivate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-SysFSDevice.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-UEvent.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-UEventDeviceManager.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-UEventParser.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-UMockdevDeviceManager.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-UMockdevDeviceDefinition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/libusbguard_la-Utility.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Audit.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-ConfigFile.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Device.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-DeviceManager.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-DeviceManagerHooks.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-IPCClient.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-IPCServer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-KeyValueParser.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Logger.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-MemoryRuleSet.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Policy.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Rule.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-RuleCondition.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-RuleParser.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-RuleSet.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-Typedefs.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-USB.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/public/usbguard/libusbguard_la-USBGuard.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/IPC/libusbguard_la-Message.pb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/IPC/libusbguard_la-Rule.pb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/IPC/libusbguard_la-Devices.pb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/IPC/libusbguard_la-Exception.pb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/IPC/libusbguard_la-Policy.pb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXX src/Library/IPC/libusbguard_la-Parameter.pb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD libusbguard.la Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": *** Warning: Linking the shared library libusbguard.la against the Step #3 - "compile-libfuzzer-coverage-x86_64": *** static library /usr/lib64/libqb.a is not portable! Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": *** Warning: Linking the shared library libusbguard.la against the Step #3 - "compile-libfuzzer-coverage-x86_64": *** static library /usr/lib/x86_64-linux-gnu/libprotobuf.a is not portable! Step #3 - "compile-libfuzzer-coverage-x86_64": copying selected object files to avoid basename conflicts... Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 -C src/Tests/Fuzzers fuzzer-uevent fuzzer-usb-descriptor fuzzer-rules Step #3 - "compile-libfuzzer-coverage-x86_64": make: Entering directory '/src/usbguard/src/Tests/Fuzzers' Step #3 - "compile-libfuzzer-coverage-x86_64": CXX fuzzer-uevent.o Step #3 - "compile-libfuzzer-coverage-x86_64": CXX fuzzer-usb-descriptor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CXX fuzzer-rules.o Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzzer-uevent Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzzer-rules Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzzer-usb-descriptor Step #3 - "compile-libfuzzer-coverage-x86_64": make: Leaving directory '/src/usbguard/src/Tests/Fuzzers' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd src/Tests/Fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzzer-uevent fuzzer-usb-descriptor fuzzer-rules /workspace/out/libfuzzer-coverage-x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/usbguard/src/Tests/Fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer_name in ${fuzzers} Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus_dir=fuzzer-uevent_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ ! -d fuzzer-uevent_corpus ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + zip_name=/workspace/out/libfuzzer-coverage-x86_64/fuzzer-uevent_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -f /workspace/out/libfuzzer-coverage-x86_64/fuzzer-uevent_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzzer-uevent_seed_corpus.zip fuzzer-uevent_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fuzzer-uevent_corpus/ (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fuzzer-uevent_corpus/0001.bin (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer_name in ${fuzzers} Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus_dir=fuzzer-usb-descriptor_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ ! -d fuzzer-usb-descriptor_corpus ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer_name in ${fuzzers} Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus_dir=fuzzer-rules_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ ! -d fuzzer-rules_corpus ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /work Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzer-rules Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus_dir=fuzzer-rules_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + zip_name=/workspace/out/libfuzzer-coverage-x86_64/fuzzer-rules_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ ! -d /src/usbguard/src/Tests/Fuzzers/fuzzer-rules_corpus ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -f /workspace/out/libfuzzer-coverage-x86_64/fuzzer-rules_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf fuzzer-rules_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir -p fuzzer-rules_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd fuzzer-rules_corpus Step #3 - "compile-libfuzzer-coverage-x86_64": /work/fuzzer-rules_corpus /work Step #3 - "compile-libfuzzer-coverage-x86_64": + i=1000000 Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/usbguard/src/Tests/Rules/test-rules.good /src/usbguard/src/Tests/Rules/test-rules.bad Step #3 - "compile-libfuzzer-coverage-x86_64": + echo allow Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "0,;UW~fn" id { 7Dbb:* } serial "R0Ci+jH'\''" parent-hash { "f+n`s" via-port "/^WlPN7G" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "7/G>!^p" "qV*i-WBa" "n0|g}USf" "dcQck[gN" "PQ<$8>`<" "9p#l$|Zz" } id none-of { F53A:* EE2D:f1aD 37AC:* 3F4E:64Cc Bdae:C0Fa } if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "`dcN*WO{" name "77QNHYnV" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "]:.drVPa" serial "v]s`5riB" via-port "%C`qdl9b" id all-of { fA6E:* b8aE:* } parent-hash "!dcVB5iT" if allowed-matches(name "mIba4_Mk")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "ED2+}Aq;" via-port { "40&EC96o" "R}h>w8bo" } parent-hash none-of { "O-r:.&r@" "!8q1mk`]" "~RaG}];g" } name "xk52974}"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "}ENfT*po" serial "+!5>^#.e57" "Bh:H^^]p" "iKyrj'\''pU" "@9#Y[L`b" "h<}5Bx8Q" ".`B2yV%]" "sk.KTkP?" "c0JwUOVF" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash equals { "^~{X`8%G" "l2ZG4|0;" "7KfL'\''b}G" "lt]n3L6?" "FG5k+TZ=" "Vz G3qgF" } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "G4Rs_h^K" if equals { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash ";[+iMTt8" parent-hash "<|t33w6A" serial "[IM:Uk_x" via-port { "-+

C%r2" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash ".J5^}hQb" with-interface 5F:2e:7E name { "h&" "?K[l4Aqj" "DT4mJ'\''l:" } parent-hash "+%B|QI?J" serial one-of { ";1r?7CK{" "B[{$Z9Zs" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "nK1,uv0#" if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash none-of { "_aIEAY0#" "%T&N>rOM" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash none-of { ".g$YW/wh" } id { 68bd:* } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash none-of { "l1p^N/f|" "WT9J&<'\''o" "%9B:~Gsj" "TL,%eV^;" } id one-of { 5abc:9CF8 251b:* 3cE8:* fEA4:E9c2 eC4b:cBb2 } parent-hash equals { "X7N]j&@&" " ZC73tCY" "Mh~*pfG5" "A!IMm wH" "=mAH/N3x" "1fcf>wS4" } name "{Fm1CveV" with-interface equals-ordered { 7b:*:* CE:*:* 9d:*:* c9:86:56 } serial "v5 r!_%z" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash none-of { "ZHf7%6|N" "FA'\''+RV+9" "?>T.<>!W" "yG%'\''yESl" "z`auPzt]" "rZ /Xcz'\''" "uhW8Gx{," "mee*EO7c" } parent-hash equals-ordered { "1+oKbeQS" "$[!I+$9y" "Lfs-6a.}" "}&+<&ImA" } with-interface equals { 6F:*:* d7:3c:* f7:3D:* } serial one-of { "Mapp{$~A" "|D05t[i3" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash one-of { "Dkd!Q#=+" "CfE5nF8k" "'\''s#S9?|." } id all-of { 1F7E:* c071:6f21 802e:* 597f:D40D D7DC:* 5Fb5:E9A7 } serial { ":0d&r~!K" "XM~fa90H" "D 6TPPY%" } name "J>'\''#e%a9" with-interface CC:*:* parent-hash equals-ordered { "l9~!%M" "s=j,ae%{" "&%6;CGO!" } with-interface 6B:CC:aE' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash { "PPF@}b$w" "kWEdlQP]" "xf1.6KU." "[W}|d8@w" "iiegC8j'\''" "b:,Oz7b`" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "$`.V[[pp" serial all-of { "~&4>K V/" } parent-hash one-of { "lhY4P~HZ" "e=Ffoxc$" } via-port all-of { "1ojWQ6aI" "7XX!-Wl7" } with-interface { 59:*:* bD:*:* 6e:e6:1d 48:B0:* } name "/p`.VJo3" id { C08f:B236 a3C6:* c172:* 172e:* b4EC:5Abe 3fFc:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash { "XGhA|X2O" "$m1pNS?Z" "dJ^14C5G" "m_6$Ih?>" "Y8T~fQEw" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash { "Yh-b02~R" } via-port "1:,-fGHp" parent-hash "4 /Y,%7#" id 9E22:* serial equals-ordered { "Q5Pf{3,o" "Mz'\''ins,j" "8St ![=~" ",.aGjpEF" "[~2hoeW+" "Okz:luY$" } with-interface f1:B7:* if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "Ze$Y]H-}" serial { "Vf0rpbah" "OABxYWKs" "gr%EW`a8" } name { "W[X7V?5H" "4lRj=/z:" "i,xidFv?" "GFk%I*Kw" "hYw;84}>" "| Pcppq]" "{Dq:R2I[" } parent-hash "V=Tm&QNu" via-port "5pkH%vF1" with-interface one-of { 9b:DC:* bE:*:* e1:FE:8E }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow hash "}z;-h7lN" serial { "r9}TsY|a" "8 %Fm9qt" "8GN+~AhO" "4#F5/umx" "]j+B8_X " "re0J-H&g" "BTB@VR!~" } with-interface 7c:ef:9d id none-of { bDaC:93a9 c89B:E54E Aa0d:6b1F add8:* 88c4:F43c 1951:* 6bAF:* 525a:aEd5 } parent-hash none-of { "SeiB;IA2" "#5NgvMKr" "`uGLEvkc" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id { 05fe:2F6d dc7E:2D96 58b1:C3Fc Bdba:1FF9 } if equals { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id 0da4:bCa4 with-interface { 8B:A1:33 Fd:F0:* CE:88:Aa bC:b0:B6 7F:dc:* dc:a0:* 49:5C:* F5:91:c9 } parent-hash all-of { "Qzr|1q[_" "KJ[jX{xE" "Q.!1S]6L" "4$--bt$0" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id 20F6:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id 48c9:B016 name "KOGY9jPX" with-interface fe:0b:* hash "oyH8A,$!"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id { 5D3C:* 1b7A:b4Fd 8e78:* BD37:* } name { "ylD+:/QD" "Y@euy;FU" "F`^H5kN/" "XO}Lx,a|" "H6!" "DgB[7?5T" "uj.[jx!u" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id 72Af:bfba' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id 7DfA:* with-interface DD:e5:Be parent-hash "YTv7H7H%" via-port "0uqZ07UE"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id 8eC5:2C0c' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id { A3Ad:* e055:* b604:* E5Ad:F2fe } hash "ET_HeN*q" if one-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id aB52:77bF parent-hash equals-ordered { "A3v9`>/+" "p~rv^nX " "rz8?C3:Y" "3SZ`SCw{" } via-port { "VIt>_={s" "cT]4COiw" } name none-of { "aG;R`0ds" "NgG{A:@h" "eN,+x=$r" "C0;EZ+g8" "<4n=yjC4" } serial { "+$7LGe.y" "F6s-r`%@" "WO_J|n,>" } with-interface { F2:*:* } hash "P&qIs}z." if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id all-of { 451C:B71F 43bb:* DEBF:EAFA 1Dea:70a7 bd2e:D081 bf2D:0520 965b:D9b5 9Ac6:FfFb } hash "PyG; {74" via-port "dUWuEnRL" name "}gYy!+%@" parent-hash "V_/o" } serial "X|B74.!P"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id all-of { f30E:* 5958:D3b6 f011:0F3e B8ca:* 490b:* 62f5:* 83C3:03CF 4feb:8670 } name "2Qe];N4v" parent-hash "+QWdQN5a" if none-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id { B946:* 80D2:* FEac:BfD0 3c95:1Bc7 5D17:5FB5 } via-port { "~QpGvq4J" "`@*JB^v" "Q&A7Gl%r" "3ft_s>k{" } parent-hash equals-ordered { "dA&3ON]`" "O2OS|dD#" "TDYRcq1a" "a'\''kBKxjc" "]FTZ>Z=N" "]:;YJpx3" "K6W }mA~" } if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id c260:db5a name "p;_SQ#>L" hash { "Oes4J15<" "x&XKMkp&" "2V+woIfH" } serial ":/2T.nBf" with-interface { 35:18:0f e8:F9:* 17:d3:2F Ff:*:* 71:CB:A2 03:dE:C6 Ff:*:* } via-port one-of { "W9nu]BwQ" "N}_J'\''*IG" "PFrDg`6Y" "%dRgg= $" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id c76C:C376 parent-hash "1UWK2fl0" name ">]yZsrHU" with-interface Cd:D9:d7 hash "sJL'\'''\''W3r"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id c7ed:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id C8bB:dcCC name none-of { ". m'\''^RD*" "'\''zj,of#m" "-2RwM-rh" "hOH8S;`_" "Xm{CNeaN" "Ce-G@=A5" "-/y:O4Qs" } hash one-of { "/jBC#9kV" "[Dp,S=D{" "$dL:dX@a" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id Cb83:a9Be with-interface { 8d:DF:* 35:1F:09 F6:0d:* 3B:f4:* c7:DB:d0 } hash "zHD=j|a+" via-port "$H*'\''?,iB" parent-hash one-of { "N,h-'\''/f4" "$OOiB7K[" "86*X;B]1" "4C7PDxoQ" "WA?`>:]~" "6te1E5%j" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id D408:10FE' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id { E55A:ECce Dc25:AC43 E2e0:1Eeb f2bb:* EDcE:Ca4B FC5a:8E2c 05D4:* } serial all-of { "]7@n[1ne" "+'\''YRO_ `" "PX3B?e{h" "DT@~'\''zRU" } with-interface A0:Df:aE via-port { "1`&!3HwN" "@%l4H Xc" "E^rGr" } parent-hash "o'\''hfJcWM" with-interface d3:6E:5E via-port "<$'\''q;*z;" if equals-ordered { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals { eAf0:* 8c1F:BdbA A4c2:* } with-interface Fa:Ed:B5 serial { "Z$VaGc @" "dpk[]q.E" ".=]vVV7h" "u[8zh9VJ" "brrZLkLC" "PGyQyu3{" ">9ji5:GV" "s97swV4U" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals { fAfB:* } with-interface { 2A:32:* Ac:eB:* c9:c8:* B7:fA:7A 63:eb:1f } hash "&.o~[n@+" parent-hash "oZ?:o'\''W[" name "y]jIUd2~" if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals-ordered { 2Ddf:22ef } parent-hash "A!egv?S<" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals-ordered { 6c7F:* 6D6b:DdDe } via-port none-of { " h~c1*" ":M%Ui>8<" "FY1bT9D3" } name "j]t7<2v7" if one-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals-ordered { D495:* 056f:* 7FB3:* d1fF:eE79 } parent-hash { "$8LO231_" "5SP0qyB9" "~[5+nh2X" "VjuuAOQ9" "3wuU8Xz5" "ARF@0Y2>" "GnM>tIAN" "3%?K+uuA" } via-port "qEMw&;Oy"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals-ordered { ec40:* 33ae:* 0132:DEAa 3e9D:* Cae1:c797 04aF:6Da1 } hash equals { "L[!1|}Ac" "u?,^/[-|" "zph#X|D%" } with-interface Fd:*:* name all-of { ".PIxe29n" "zL9vQizi" "Vne?{?'\''Y" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id equals-ordered { EcE1:* 0240:B0AF EB5D:* 65A6:bc64 B994:E8F6 EFD6:* } with-interface equals { 8b:3C:cb dB:Bf:9d d0:*:* C6:aF:fE 62:8f:cC } parent-hash "07[`C+9u" via-port all-of { "lw&'\''GZ>p" "oKlvq+{g" "}i]Xb'\''pO" } name "9u>+Np/." hash all-of { "Hve1[Jx-" "-[7ltq:#" "DPru/Dtu" "D,7bJQ~o" "-@0F&<=&" "M'\''Bjgq?v" "5Q~Xx.{X" } serial "J,n~b9X%q" via-port { "fTptq#Q9" "~['\''/1 2L" "8c@pX7hX" "Fou=^`~S" } with-interface 5d:65:C3' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id none-of { 4B70:* } serial one-of { "6JqhX7a|" "}dV^t{gv" "!y>~auXi" "3X4,.Tls" "54n_J;Q?" } via-port "kgA81,-r" with-interface CB:*:* parent-hash { "s, X" "_PwWqo=1" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow id one-of { 874a:A0B8 } parent-hash all-of { "GMb!D3I_" "bxF4[l5N" "*tM{'\''!'\''+" ",Tco:?hg" "D?U`;=0-" "P_GfeNV%" } hash { "rOHjh;8%" "E'\''[[Fq3=" "U{3aVyHL" "[c rnTm$" "z3'\''rghe[" "8]TGNLO%" "66E[G40h" } with-interface 07:Ea:* if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow if all-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow if allowed-matches(name ":[-iqZSZ")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow if allowed-matches(name "" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name { "37p3KD0x" "5z~bz" "h ?2LMf&" "oCV{w=8h" "8qHrb,d[" "s[9kX,yz" ":!^uH[Vy" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "3D~eQFQn"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "3Z|DTZq=" with-interface 85:Ef:Cf serial "d`~6Cu=>"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "6'\''G^QN?x" id { d762:65D3 EFbd:* ed10:F7CF c396:EE28 } hash "}${i|4!o" via-port one-of { "EQb9Mzv*" "R}|/Ai_{" "VpoE,d7@" "'\''QJ`NUgS" "3T/50kAt" ",uW%p<&o" "-xZcF~$t" "#]TZfEFQ" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "9@7!n{A%" id { aEa1:* 6bfC:* 1aa8:1685 } serial "9fh47>H%" parent-hash { "zxcUD&.2" "Aw=j+-'\''i" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "cD&=*qkq" hash none-of { "/WSKm8b?" "mb++4:3I" "3UY#SZXf" "hDjN;{a_" "@U vf|4L" } parent-hash { "K_i=]Hx>" "#UZeheA@" "Na9D>'\''!v" "j/,b[ nL" "fAYN!*;N" "}M<$,h7K" } serial "KgEYoZxx"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "'\'']D0sP&M"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "/DCOH}@<"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name { "du9L16I " "RiKHm8Tn" "gE/kbws}" } parent-hash "1N^nE0-6" id 4C7F:* hash "#}u?P~Tq" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name equals { " :6#e*Q;" "6>ja^0mE" "cde=`$kf" "!Q>F2][." ":4uLy@?N" "e7qJkQ=d" "s4w#JWZn" } hash "BZ:Rs,AF" via-port { ":{bSGo0^" } serial { "#|0#fK/M" "<#Y_oIT_" } parent-hash { "q{UtS-B0" "3Af*y&SP" "6OFD!,'\'']" "ryf1'\''F,'\''" "xx!Et !_" "HQiPr:Db" ",Y =LT4u" "[T8dN:C6" } with-interface one-of { d5:F8:* 63:*:* Cc:1D:* c8:c2:09 } id one-of { aA08:* aB8B:C85a cdA4:53bE 9dAe:* B4ef:7C82 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name equals-ordered { "&],UqnDi" } hash "Db{f$[Lv" parent-hash "HHC@t4%w" serial "]*M}[r=5" via-port { "e6rPZ]t." ";=DY-Wqz" "J@q!t'\''@v" "H;-~rFd:" } with-interface bE:12:* if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name equals-ordered { "#+YB h:2" "mE=:SKc," "q{@4fsSv" } id 0f2B:* with-interface { 8E:0B:39 fA:*:* 21:58:* 9e:A6:0a } via-port "Vp#rh#m,"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "GqUY{0Ut" parent-hash "?;iHlp Z" serial "f6?,LBv}" with-interface { 83:E4:eF c2:11:* a3:4f:* a9:94:* F1:*:* Cc:*:* bA:ed:Ab fe:38:f2 } hash all-of { "%`$ec*.Y" "f4,G}6lB" "&w`Ucdcq" "MUVz'\''UI}" "D6.PaC1g" ".UA5xz3N" } id 7fAe:* via-port equals { "A<0dr.AA" "7N0iB;X}" "W!e^1G&&" "a4BHz:XOx" "W!mhO{L}" "DOdT/ 5A" } parent-hash "2$^xC7-`" serial all-of { ",I2r9;3}" "1CI_]QEu" "DTg78`Zp" "e,5`PfuZ" "|q^LpDd1" "-m3DH3'\''v" } id equals-ordered { 8dda:8BBf } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "`k?PG#J4" parent-hash one-of { "{i3{jwf`" "0!6efXQ!" "7?Uog-X;" ",roZSqx0" "o?L7H+g?" "NDYoy5s^" } serial "Wha!%Rq9" via-port equals { "Mw3s1*#g" "-Ro@q0M~" } hash "20OO7g>z"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "l+I-j+&q" hash "81_}}RUb" id { ebe7:* aDCf:* D329:e8e0 9fab:A659 f4e6:* 7Bc4:78Bd FcAb:ABe9 } via-port none-of { "ZZr$x->i" "uTW7l^JO" } parent-hash equals-ordered { "bg?j!M3O" "~iWT#~uZ" " OsS6L7m" } serial "%GVv.0P3" "8Bd%DyNg" "ORRNa!_~" "ARr!_a?h" "[e:Z-4WK" } via-port { "*|W~G;%E" "k@nh6" "Vn^WcD6" } serial "M+z$_lfi" with-interface { 6C:*:* cf:*:* 92:07:* } hash "Zb#]:;`e" via-port equals-ordered { ";q0M6N2B" } if one-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name none-of { "S3Q2/$4a" "q=~JA!0:" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name one-of { "q=-gjqt$" ">kt31^bN" "`7xQAsIr" " 2hwgFS-" ">?O+c.b]" } with-interface 63:*:* via-port "GAN{&i_Y" id { a389:CA3D 91dB:* ac8A:* DA4D:2F10 6707:5F13 5D0c:* 6FEF:* } serial equals { "tk5'\''E`5Q" "co|R-ibm" "+?awhGRs" "@iH1%wZ-" "wqu^QUv%" "jBAD]_pt" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name one-of { "}Q&-.Ak:t" id 9Fef:9460 parent-hash { "u8'\''C+%lK" " 8cH|KUz" "=[=}Lc*r" "5o+Vn[+V" } via-port ",95vqo!sC1" "lr&+jB&T" ">4f$1ayK" "5F_1d7G*" } parent-hash { "<2+,T,52" ",XYEO?P*" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "R=sdxV,Y" via-port "=d[t5h4," parent-hash all-of { "YmqYD78V" "+T5$rA>M" "_%@X>Xb]" "7~8=&uj~" "%+:ch]kG" } id all-of { 41CF:* 8CB5:B2E8 A6c8:d4FD d3Ab:6BF1 eceD:93c0 6bcB:4caB } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name ">SqzPBsW" serial "e8-9+zcm" via-port { "oD*t>I2G" "]P@Q}FE%" "zN^EB[3A" "T=gq07]%" "h +1A/#p" "E Oex~!J" } id B98f:a9eC' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "$*tE^1xL" hash "zvcmQ0rP" id { ADcf:Dad1 eCa7:* 49c7:* 8495:4fDC CfA8:* cacc:* } serial "E$,i-GG#" via-port "}XJ<" "^Oy5cxN " "j?+ul]g[" "PxfVC4?n" } if allowed-matches(name "&hGim?6C")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name { "XM<9p =]" "q:3N!abA" "@rt00mps" "2qBA[-M9" "vql-d~Ni" } parent-hash "Fc7d?/.o"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name { "~Y-7/9*'\''" "c4UzgH}Q" "TYXi#LvP" "g}ZK~$rs" } with-interface 64:d9:29 id { a1a6:08d7 A7Fa:* } hash { "$M[mDQhq" "KWFpzE4Q" "+7-{36$M" "ic8+wB[g" "tp#Q@r2}" "MS/YNz:1" "gtN$b1*." } serial { "3LZ@=P.h" "e1G]_~QV" } parent-hash { "YOJ^DlF6" "p#v>3u!6" "zJkH/<>`" "*hBtqYA}" "f'\''4E,#;o" "2}-A Ez}" "=RGciD#F" "DXxtELsu" } via-port equals { "Qn=" "j}j3uC;~" "8&b=Y_SX" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name " ,YBx6N_" with-interface none-of { 0E:*:* B5:*:* 10:*:* F5:5e:* 0d:BA:88 C6:b5:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow name "z|IB SEY" parent-hash { "+n_fFr`q" "F#$yVikY" "R%5gTF^a" } via-port "&D.%`l{N" serial "{*DrR]zU" hash { "%{7uRMfn" "bU'\'';0e$w" "arg-[ys" "M2/@&O!'\''" "_#~N!c>0" } id 6E30:* with-interface e9:*:* serial { "B:Jka`S_" "#l }5^lr" "Oxy%w|FX" "Rjsn;x#K" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "3[&-m_~;" id E28a:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash { "3&zqdh8[" "Mjv0D_MN" "jhVFba3?" } via-port { "E,67tOTO" "?@Un*TsF" ",+0C@3f7" "4^KE1n]d" ".mP1wP._" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "'\''5pDBaw<" hash "Ya|;FG'\''+" name "Og^#MkS0" with-interface F0:12:86 if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "A4=eRNin" with-interface C6:25:* serial "* 6Z~LPp" id none-of { CBBA:C1c9 D7dA:* B6E3:Dc48 8293:* 9185:* 8f4C:F9a2 } via-port equals-ordered { "n]t/5m-g" } name "+#&[9Bev" hash { "%fTl{ u*" "n4-`0DIY" "=tALKv=b" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash all-of { "D=AaAX]7" "=`S 4xFt" "ZA]c15 9" "K[z]i 1B" "|S'\''nQ,E3" "zfwpF<`T" "G@>3P'\''~N" "n5alcGz]" } serial one-of { "]njX,04R" "I7?`E=n`" "{sK]nGUP" "q3k%kk2x" "=tcG}rXP" "34c.oB$;" "?[sBK!7?" "A`X+oJ D" } hash ">jM6~J]m" name { "]?]xb=hi" } via-port { "{dZAF&>-" "%JU0{xTM" "BfYzE>+6" "h:<1[TbO" "4M+fce[?" "wOe&Y3lp" } with-interface { 3f:*:* A2:*:* b2:26:* CE:DC:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash { ".b]|+$8e" "q*]AB8ly" } hash "8%" "q*$~CQ{r" "2xq M}.r" "jZ&o8.hK" "b^lx*@oZ" "]}B[V~f4" "A4Ws$}u'\''" } with-interface 8A:44:0b hash "}Q{Z1G+I"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "dycoj6=Y" name ";^$HUw78"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash equals { "6>5oT*QC" "nC/Y{x:-" } hash "XS|2m_>%"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash equals { "6vK,de0o" "<6zj49sE" "Qsdp*CXN" "9k'\''!4k8y" "A`dDkxXc" } via-port "}Zh2*^>3" id DB7C:5cc4 name "h$eT+AGD" serial { "61wIC.n}" "}S=t/JA<" "6+zCIpB@" } hash { "`G4Q_D:," "6ns^MSHQ" "!,`?=25@-Tjue" } serial equals-ordered { "'\''WO8VRS}" "X_aq-O M" } with-interface dB:*:* id 169A:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash equals-ordered { "Dr#u7kLk" "S:Q3|PED" "g|YuJBTf" "DuKE=VIR" "'\'';gAGW#v" "zYTf:[u1" "E$H*#Tc" } hash none-of { "LdT=}aPm" "Y-X}4;N8" ">]K];" "}R#YcGAW" "xYDD-qJ_" "]d[05hdg" "jV?`Lf'\''Y" "uwwgTx>G" "*hJ6xz20" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "eqW u;t$"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "f1F`]460" via-port none-of { "1*B=r%ZC" } id one-of { E8ea:* CD3f:9022 } hash none-of { "3dC;=a7^" "HAs4PM.%" "jWC8BP^Y" "ubSo=drk" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "g1E d'\''mB" via-port "AM&o;>ja" serial { "Wjjgt<;l" "hV@a.sKQ" "$}$W7nl!" ">2'\''Rfeas" } id dd0A:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "hI<5-~BV"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "j?keU3u0" hash { "^RxX'\''9No" "0NFX870}" "VGj0ey_2" } id none-of { 0Dda:FAbc } name none-of { "LUcTt<83" } serial "P};lVbS`" with-interface { F2:*:* 10:b4:1b 81:*:* 2d:4e:6c f3:69:67 b2:*:* 0e:02:8A 29:*:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "?k05p`{P" name { "NaW&vobv" "HJ;9IJU" } via-port all-of { "f-#G^eiT" ",U8CGp6%" "U%>I4h#A" "L|gwgzt_" "_8JzwYW2" } serial { "&KO" "G`g`6Zx9" "=L@q[t/M" "Cw3fTNsU" "oT%/m{|l" "cwTq2~e:" "o:v8;mK7" "ibX2M,jX" } serial "xQY?[l}S" hash none-of { ";vD*dCVS" "Umg|w}n1" "-zR8eb$=" "&uF1!1Of" "1deUS+,V" "Pgc}}#T6" "VV*9?NYc" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash none-of { "wWAlt+a2" "$|p_HABv" "7@dF#y#Q" "i0;+qg^j" "grc wTv2" "e9/F{PmO" } with-interface cd:*:* serial "{^THpO#8" via-port one-of { "!Lw2?sbP" "C%#tO``]" "X;M=p>rz" "y=VKS?kP" "p8^`4s$<" } hash equals { "dscOOhUE" "UF4Z@LE;" "wY.*RV^2" "b'\''xY7yIs" "MGf;wg7X" } name { "-Gi3xX_b" "RdEq$oE0" "%:[X&IO!" "IVt|{0ov" "sM%P|hIf" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash one-of { "1!c sXx." "0?OSRz]'\''" "pHd2:j2C" ";+n:wE5r" } with-interface all-of { d1:*:* 96:E9:F3 Ee:ee:* 03:*:* } id 72EA:2feE serial "xWht+3z2" name "IjD9>JQL"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash { "-P5iX2'\''i" " vEpe_rn/:?3n" } hash equals { "'\''m89QdGH" "cl.oFO9<" "PIjylETk" "Co7Zw!;k" "wySgI&Km" "WvAz|4+s" "`28gOaOc" } with-interface equals { 52:ba:* BD:Ef:* c2:*:* } serial none-of { "Ns'\''PECqA" "[qSQdvr1" "MoT[zjp7" } id 2F08:a478 name all-of { "v3:g5kYZ" "noV[8ufu" " '\''|h=he7" "v nDRB@m" "'\''v20C{`*" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "zs87c%:_" name "vF#*!p=|" with-interface { BF:eb:* 6E:c5:AE } hash one-of { "w 1<;MF1" "z9Q$[,52" "UlD]a#C^" ":C~R.f~q" "xa1hxvMS" "E }TNsit" "s&rBcjA#" "@K,Ao5/c" } id 3465:* if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow parent-hash "z.,+?>;|" via-port { ":@V1!w8|" "_OiWE[N;" "!NGSs#:Y" "DC@1uv!:" "qnf$d[nl" } serial { "'\''{e*.PKQ" } hash "sk*>:>0g" id Fbc5:BCEF' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "13gwVVH5" parent-hash "^$#pYu'\''q" via-port " ;Oqn1Y-" id 34B6:05b0 hash "Gme/.b;n" name "uB69{#>*" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "#-|2VG'\''4" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { "4ZAH# [a" "_K.HiYlO" "RuH9uNPX" "JSB}mk`L" } id 38D7:C5a3 name "otYR$=X2" with-interface { Fb:bc:b8 Be:*:* DD:*:* Ac:*:* 11:49:* 00:*:* 9d:*:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "5%[xymld"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "7>lGW!SQ" id AfA2:9aAA parent-hash "Jc{r^WNm" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { "9!MA;6gh" "*E8l%9;>" "o6u'\''hRRI" "p `m@N-S" "rnmK[1M%" "//+a79&t" } via-port equals-ordered { "]/EQL?a2" "Imk7@r=E" ":,a-OO{l" "JW/|jwu3" "WDNq;;7?" "WJ;x@6@6" } parent-hash "i&mhTu/!" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial ";}!>]9]o" via-port { "nHGDZ6.Q" "U_[C!lOE" "A3hL1:Vw" "1nHsoOWB" "f/Kl}-E*" "6v %^hZ" } with-interface 3F:30:* hash { ">_,N9e>w" "[H*I6oM^" "&c4$C3]~" "'\''VH5*=1&N%" } name "j+lljhgn" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial all-of { "Q]a4D;'\''-" "w^QOYRtT" } with-interface 9E:*:* name one-of { ".cqJn~i=" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial all-of { "YZ^O^HfL" "Xc9/|?T$" "F>ab@Yq^" } name { ",ysz`6* " "xV1|i:~&" "u37WO][m" "JJnBEv89" "BM1..j!-" "2RFBXTBU" "+5&nHUe$" } with-interface 1e:*:* id { E2e3:* aE3c:Fa1d 37E3:* } hash "QH.BnmL." parent-hash "?&0>iFQw"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "ba/53DHw" hash "NB8T<0+]" name { "UFVo Ze1" } parent-hash "SXz6H$e]" with-interface { 4f:9F:Ad A1:a8:A8 } id { baA9:36BE e5a8:875f fE1d:* EFFd:* bF1f:b5C3 03bB:* d2Ce:b1Db 570A:* } via-port all-of { "aVE]qHo" "p@hwy-nI@ks" "5I8}nUXl" "8;@,13g]" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "%dyTA'\''MH" via-port { " fa:z['\''B" ".*;Kc%AT" "te~8wquE" "%/#VKyfS" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial equals-ordered { "J#Ak$o3t" "jh[n.8cd" "baM`%%3e" "&bHo-b=a" "Y'\''I5ZW4@" "|K64FHR`" "l9sPVPr4" "3i'\''`_Z.Q" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial equals-ordered { "jEKy4X&4" "IJD.><+l" } hash none-of { "A%Z$&Y;5" "q+Q7w-#7" "DOl$aKm^" "c4eKs$;2" "A5O%3?Oa" ",I#V{![0" "tU3f{ao&" } name { "S34X`%W$" "T;ePLNJG" "7x~qOD,." "Q?6d_Yd" "1rv`lev{" "`M@QqQ>." ":MN7Jh;=" "uRQ|tG[G" } with-interface 96:20:* via-port { "jvE;f2v]" "t1sH?c45" "}q{$6X.Y" "$&EDA_ez" "G@l]P#hc" } parent-hash "JRa3 TBB"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "; =[@`" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { "j[C^[]83" "g;ZB88;o" "_u5RxUr<" "bos/#6v:" "-e-'\''xp!S" } via-port { "~_nV#:Zp" "lv+8UnAo" "g/'\''*O@V]" "^uC$>d[}" "oA B;-}V" } id b569:* name "~XKeZMrl" parent-hash ">J:{MFJ$" hash "a5JEFomo" with-interface { 1E:f6:48 8B:d6:4f 0E:FC:* d0:5d:* 4a:*:* 1B:*:* } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial " Kc01#Po" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial ",MN%?.Y>" via-port ":^~;QaQq" name none-of { "3#G_;-a$" ".|mn0#_y" "tIq5=5nZ" "kBHA2_`y" "F4wUJ!-A" "=[0NEa.>" "latZgmqU" } id { 99fA:* 8fB8:* bD00:F90B eBCa:b0CC 49A3:* 495F:7F6A } parent-hash one-of { "sE0ORb:C" "ViwOg75q" ":x~,ntB%" "yKvoEhW@" "iy/,{&cf" "R~WcTWC3" "7u^SodZ1" } hash none-of { "m'\''%!b@Wy" "^v%pr|v " } with-interface { B5:*:* 3F:Cb:E3 F1:*:* FD:*:* Bc:*:* b6:F0:7e 17:c9:* } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial none-of { "3H5B@Hdm" "uA_q2`~U" "!syR`O,s" "DaX=w5%!" "}C=-=#%J" "3lp4BeIA" "@V|L#{Q*" "hf:?q'\''!Y" } via-port ".sZAu,K#" parent-hash "lR-:Z~S*"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial none-of { "7ZS>.Z_L" "^JC~{@J;" "LHIAhTY*" "t0XzZ,Aa" } with-interface aC:f9:78 if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { "nR*zOrIM" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "?Of=@o&9" id equals-ordered { b2f9:D590 9aA2:fF4a BF83:b6eC Ff1F:* 2fFF:* } parent-hash " ;ndZ.|N"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial one-of { "8JZG.Sv," } id { f38C:3FeC 3e37:* aAaB:* 9B0e:3eD3 Ec82:4a10 dAeA:916f c099:* } name "R5kbH4hm" parent-hash { "-0wkb,S5" "}:?%{mEK" "3t;L%x;:" "n_n>XID5" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial one-of { "y]ZovAW[" "LO|~3Z^c" "0S|IIQ;%" "ev,O$V1" } parent-hash "6e1>8lB#" id equals-ordered { 2ecd:62C0 } hash { "jfX=U2-l" "6D~'\''X`zd" "9Mwid$/b" "o;p@JxY>" "2{Du3+iT" "}C0aw,>D" "?EEjh8/-" "Q+ve-G!{" } name ":/Y|DfTc"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "R3!drwed" hash "La`$Iv[~" via-port none-of { "nD*y`It:" "_KI 27ER" "i3A`9]" "GC[:}B%T" "3wUV< &4" } with-interface { f2:eb:ee AC:*:* 16:36:63 85:74:* } parent-hash "6LD`eCtV" id all-of { 687C:* } if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "+{sxQai6" with-interface 9B:*:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "TB$*R1FV" name "FJsN 5G]" via-port "L&2wy`d%"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "wzv*1-?;" id 530E:* parent-hash "z~1]XEki"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "[x{r=@3?" via-port "XAqCV`lo" name " oND]_[e" id 9dB5:6eCe hash one-of { "]'\''0ySg`@" } with-interface all-of { 3d:*:* } parent-hash none-of { "L}aJXUI7" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial "Ysvz,r^=" parent-hash "pABE8HA:" via-port ".WT$UVKO" id Fc9E:7Ae4 name "$m_fy '\''." hash "'\''*'\''$p]V=" with-interface { Fa:*:* Dd:cF:* ac:5F:ce 49:EF:* 84:Ea:Ed } if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { "_Zf`R.Ow" "ZsrHlOHR" } parent-hash all-of { "*ev,d+a0" "]bk9[l/s" "6 7f66c6" "dwq|U+-{" "dV3ufcs<" "Ao$m@tW9" } with-interface none-of { 27:*:* 5d:da:* 1A:EF:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { ",zqU4:Et" "@wn77Y]6" "% =wSK'\''p" "7?xc-:P~" "@N`5h13]" "hpTi^C~q" ",I3xAfmW" "@BcWV1{~" } hash "ko%GG-j." id { 5A8c:* Fbe7:6425 C2Cc:* 7BDf:1e6d f9C1:* 4B92:79A7 } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow serial { "}Zy8#M%K" "Kk}@K-Ad" "rs=9 |@/" "z0x[[%om" "HVsG5*vk" "Yzb.i<7%" "kq0pM%4|" "%K/cN{Pe" } id one-of { 1cab:fF2A c963:* baCa:* 212D:* } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port { "0$kiH'\''b2" ":*x`tsTZ" "EDujY+cd" "s&Y@bFS~" "q QEPzk[" "zEZ+{$?j" "%ieRj@~h" "pvor/A<`" } hash one-of { "w$a#5o'\''1" "Xj{E1|HE" } serial one-of { "Md'\''Ms-W|" "1NJuuJjP" "wV6Wkc^D" "rr3go=Fa" } parent-hash "Xza{L#/X"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port { "18wAQlLj" "*{R|trH4" "&Q:M6cMj" "DJDO=$bA" } name "wqx/*A'\''C" id { 6d37:* 906F:6a5E AEDe:* Ff20:* e20d:73Dc CFcd:F3eC ea94:* bFd2:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port { "4ic+&t{-" "j;yK~HH" "m;dO6a4+" "S t|lsQ " "k5Ye/qgb" "L3H4$bok" } serial "l#[1-pdf" id 1eDf:aC95' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port all-of { "8hKR|Fu," } hash "/3ow6o*c" parent-hash "=gkx9? ?"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port all-of { "xOqZKm8O" "MWR#= Kt" "X7:T,]/O" "Zyqi><=/" } parent-hash equals-ordered { "Zt9k8aYP" "pKJK}@dx" "SE9]?aJ1" "A5^,0+ne" "1*iKy%c~" } with-interface 4D:ee:8D hash "s}QJp=EU" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "A~m~~kR@" name "3RvDO:J" "Q%$[nB`<" "?5W/1L" "W78" "7>BYqJFW" "a ,9qYS#" } with-interface 1e:CC:* parent-hash { "R]z/CO>]" "!lPQ_T/g" "F>-j2#!M" ":amy4QD^" } if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "b/&kaa& " if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "E58yEB,A" id { B2f9:beb2 } with-interface 6b:6B:DF' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port equals { "M=alL4,~" "xbe`6m-<" "}i1WqZE|" "s9R2acSQ" } id all-of { FE9D:* 8ecD:* 3836:4F1f bA4E:EFdb 16a1:* E6B4:66CA } serial { "9$77IY}." "dbKA654h" "eiZkAE=/GT[{o" "6I6@`#BR" "yitwi F%" "9yu_In4c" "vMa'\''C8>`" } name "q5'\''*2eOv" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port equals-ordered { "K^p-OhWU" "4Z3H!}U8" "cfn9R$'\''E" "lYccdk*j" "@mL<&f,<" "1d9,9.Zj" "L_%J]tR%" } if allowed-matches(name "Go|<6C~'\''")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "}Fk=2,1E" serial "`=+!$1A|" hash all-of { "B9,>T+qK" ">dOVxI`@" } name { "g_d~maU!" "`g8bJ6?." "X%&|'\''ZVQ" "O_A+/oUH" ".!wOMBvS" "[dzi@mC/" ";nCL,7TQ" "A!9*m[7U" } id equals { D5ad:51f4 33Ba:9D4b 4c1d:de75 03bF:E9D3 49eb:* B93D:7F3B 2320:9cCd cBa6:* } with-interface 7B:0a:BE parent-hash equals-ordered { ",ZTVihf," "R`n'\''%W?!" "?D~.![q&" "5H=;[FM{" "J;d,?-q]" "m*:y9DD%" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "HnEl>4*5" parent-hash none-of { "taS6,Ly&" "0bju}_,A" "GtlS[Vrf" "kZ$x#x|l" "w,iZw`<%" "c=s3!Wed" "Fu1Ep`:Z" } hash { "p%C1e &k" "XYJ#~iig" } with-interface { cB:D4:09 7F:Ad:* Fd:AB:E6 4B:DC:c8 ec:af:c6 9b:C0:* 4F:3E:00 } name "ylhT1~6m" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "'\''I3[&dV^" serial { "zKl>>$UF" "Gna5cvVv" "17=s3D-9" "[05-~_n2" "+*xe!oY|" "FV^?Qv.O" "ELmS;E[Y" "o{bMdi2P" } name { "H2Mva{T9" "Z?<$?Yu>" "s~b%?*9X" "VP5K5@}f" } hash "qyzNDvL|" id dcd7:2f35 with-interface one-of { 9D:*:* f0:EA:* D8:*:* } parent-hash equals { "|!-Qg--v" "^evR]Vg2" "8Eg*Z!IL" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "I'\''}e!NBd" name { "clgkJ/.1" "_~gKmJ6c" "uJ!{b{kf6" "X:r'\''|Ql-" "|g:vSQPo" "&J6*wr'\''u" "bcN{k4'\''7" "%%k.R;`V" "3Pf;hL[," } with-interface { df:fD:* 0A:4F:* } name equals { "6CRf.#D^" "4$;M@PtL" "zODT&~k@" "vP iDjHgdl%D" with-interface equals-ordered { 4d:*:* 14:fc:* } serial "u1@4;qy@" hash "C+?T.}L+" id all-of { A2ec:* } parent-hash "9wkrTo}/"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "jKG$9?]y" name "^#*REo%gV|*%7gd" ";==4qGOg" "$~vN-g&C" } with-interface c6:CF:* parent-hash equals { "LyAJ`.0R" "s^{1LRq~" ">EMk=l9^" "FP=|?&[d" "v.V[` T!" "JwL#x35f" } hash "@4?1nf8d"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "l,C[xF9q" with-interface { 9F:Dc:* c4:*:* a3:F8:EC cb:*:* 7C:b2:2D 76:6D:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port " N'\''Drw /" name { "yM}En>b." "}&zN1e|6" } id all-of { 7cFb:* 4E08:AAda ccfC:9000 7DBA:838D 51eb:* 1AEb:* } hash "dk^GY`u?" with-interface none-of { c2:DB:* 17:f0:bF 4D:c2:* 2D:*:* } serial "q/[" } parent-hash equals { "h0n0UAV:" "=D]l*N}m" "fi4hn}of" "~kO9Jbv'\''" "UQu*t#C1" "B fA?>Oa" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "pb5CfNij" id all-of { Caa3:DeC6 0B2B:* } parent-hash { "FoYn&pG%" "BlS1aCnl" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "pqwFCcs&"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "=qD&%u6x" hash "Xt3Nj#0!" id 0Ffb:66af with-interface 72:*:* name { "HTaWQswf" "S&|otHSN" "uhi6etZ{" } parent-hash "Vt*!ktW-"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "[Qk2vU8k" with-interface C3:b1:B2 id equals { aFe4:* deBB:6f6D F439:E77e 1e2a:* C7B5:dEDf }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "rf+1o/d]" parent-hash { "eA*,txrY" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port { "^rTs?/lg" "ZE2L?#?c" "n-k~&6c>" } parent-hash { "Oa[S*Ln/" "RsG#@J&W" "b[]4m7W<" "&rM`le#t" } with-interface db:58:* serial "WM}iEQT]" name one-of { "OK:rpzt$" "I2yzR0|@" "FL>tTY{K" "7[/K2Nvx" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "tTNJq{Bb"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port "-=UR'\'']>v" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port { "VU[i`N0W" "fB<%eCU9" "@SQ&do ~" "Qe?0Wkgn" } hash all-of { "N?e5Ax8p" "{Sn|T?w'\''" "j'\''~s8Q{q" "oM?S6?r8" } parent-hash "$sS4Fl9o" with-interface none-of { 96:*:* E2:*:* Fa:2e:0c f4:*:* e3:12:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow via-port { "VX'\''5,yGt" } serial none-of { "YdyFnK4r" } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 0C:08:97 Aa:e0:* } via-port { "MU;,4G[h" "]v$$XKFh" ";,MZT'\''Dh" "g00{lD%j" "wRUZ*``0" "8#!J{gQ@" "`Z?3p92&" } hash "KYHTnNgP" id one-of { C60C:* d2EE:aDe8 ead7:214B 75Bc:59a6 3129:* AE7E:d25d ee2e:* A21D:* } name "n0CKUNor"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 14:E1:ee a9:ef:1e } name "$T[3!PZT'\''" } name "5K;E#z &" via-port { "Td'\''H/ VL" ":JR8Pf-y" "bcPr&3-N" "m,mo$xhm" "z+y&F4DE" "2J*&~~Q5" "%:{xUtY*" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface 28:fC:* id { ea02:8AA5 a850:18D3 db89:7D4e A936:* f9Fa:4ac5 5459:A4Ff } hash none-of { "w$4hD/zo" ">_kkI0SC" } via-port { "K 2yQU+K" "fFeBLR]-" "$4nL V]/" "McY*:%l*" "XHw.PIY~" "2f^.Riim" "!g;w8d3f" } name { "a@'\''MGh%H" "^c ?*4m;" "8+zFVU$^" "Fd]OSOtL" "7[:I!zm/" "16ef=Dwr" "g'\''!iYZf#" "5E [lcvs" } serial { "Y&Dek#;E" "n,SM_P.`" "uam6mmBw" } if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 3D:*:* dd:8f:* 52:*:* 1B:*:* dD:5f:* C0:60:* } hash "VO>%S5V7"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 43:b0:46 1d:*:* } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 4f:*:* 2E:F2:* df:*:* bD:ab:* } id all-of { 00F4:A611 14Ca:e9fD bbBc:* 6ac0:* 6bBb:* 2CbD:* A451:* } name all-of { "s8MybXM1" "%of*apu1" ";XgD.EWB" "$ry_*ET9" "dy3c34$q" "7B:IGp'\''W" } hash "8ubY&%6F" serial ":d.ZIO8O" parent-hash { "J'\''lqfII1" } via-port "IQ11oX7G" if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface 67:*:* id { C2cE:* 443F:* a9Aa:* 55cE:* 7c56:CcC4 b3e3:5ED9 } serial { "6Tkd8" "Yc&T]av-" "/a'\''c2kC0" "_PsP6?rO" } parent-hash "noA73;e " hash { "xy:]/`lW" "R9EGbN1s" "D'\''2[:{`M" "c[R|zY.I" "S}S/Q6@8" ";n|+@}IC" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface 70:8D:12 hash { "dOA|E$KY" } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface 7b:1D:* hash none-of { "+?E1L~L^" "=bx #1t$" "C99wrqMY" "ipuISR23" } via-port "xHe$bQv=" serial { "e5Z7M,dp" "Yn?y@k{>" "cs#_v=C}|T9" "c8N/kzhI" "'\''_10jW!s" "#[ijCZT?" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 7B:FF:15 cE:8b:* 53:07:* 11:*:* 6b:ef:44 72:C5:E0 e5:4d:14 eA:a5:f7 } name equals-ordered { "#aJ3LxP:" "N-KYq1[!" } if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 87:aA:Fd F0:eC:* 52:59:76 0a:5e:* 08:*:* cD:*:* Ad:Ac:* } id { 28EB:* B4aA:ea2d eb0E:* } serial one-of { "0'\''n*r_cs" "iw8WWWLl" "Lsg}?$:1" "|RHjrA_/" "vJEBSSwb" } via-port "plL|:RZH" parent-hash equals-ordered { "}14Ly8L." } name "'\''1&7cKcR" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { 9E:50:ce 8E:*:* 00:*:* 72:*:* 95:58:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface a0:c0:* hash "7&;B'\''tjr" id 077c:* parent-hash one-of { "S09lIr][" "U=<4iNZO" "ZiC5C%zw" "S?{>D_v%" "-l--E/ 5" } via-port "t8[0kfcv" serial equals-ordered { "7&ui :_p" "xlXLn{[0" "[Eohy@T1" "/8z3ntu:" "Vlia.R}h" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface { AB:E9:* c4:EE:a9 44:95:* Db:*:* FB:41:* a9:44:* e5:*:* fe:*:* } via-port all-of { "S[XnKOGQ" "no;OuBFCY7" ";9_u6Z`," "Ib-xY8QF" } hash "+NWLov?c" serial none-of { "2Gi$mO%3" } parent-hash "Cj>HG@S-"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface bA:24:aa hash "!e!GLMrL" serial "6zRoS=#<" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface c7:F7:1A via-port { "|G6xBNe}" "_Vq7=tvM" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface d3:03:2D parent-hash "}c4h_7%u" serial { "fWj!mqv^" ":}u~?I-l" "+ur+ WP9" "WT*6Wh|d" "O{@J,-+V" ";6IV^ec9" "EFjCq35E" "@6XSX3Kg" } via-port { "=mNB3G6z" "cy~o3RC%" "tZNj_T~y" "LPmId,3{" "i$M=pT#2" } id 9Ce0:* name { "0SH8.KEt" "galw}Sp3" "q3BQaY4y" "mP'\''DrTlq" "frxCfAif" "dix=6YG_x" "LQy7f=" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface one-of { A1:*:* DF:3E:e9 AA:*:* D3:d0:B2 7D:*:* Af:*:* } serial one-of { "6n%M`N$E" "9/,dG;Ur" "bI-NjCOw" "7XxBE}pR" "s=x~XEj5" "i}0R#%;V" } parent-hash equals-ordered { ">QOe0;Y]" "o`=]c:|$" "MSMcbHJA" "^`.4!7w7" } id eEb2:* hash "5-0v1wDe" via-port "Pao*1:w/"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface one-of { Aa:A5:fF a2:b0:4c Bc:cD:Ab Ea:B2:B8 Bf:*:* d5:B8:dB } hash equals { "'\''=GN}0o=" "E]cGge^s" } name "!qCiGB,J" parent-hash "yneIkx'\''u"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-interface one-of { c3:5A:cD A8:af:* } id a1fe:* via-port "Qh5Fl.$9" parent-hash "GYqxZ?a["' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type "hotplug" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type { "hardwired" "unknown" } id 38D7:C5a3 name "otYR$=X2" with-interface { Fb:bc:b8 Be:*:* DD:*:* Ac:*:* 11:49:* 00:*:* 9d:*:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type "hardwired"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type "hotplug" id AfA2:9aAA parent-hash "Jc{r^WNm" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type { "hardwired" "hotplug" "unknown" } via-port equals-ordered { "]/EQL?a2" "Imk7@r=E" ":,a-OO{l" "JW/|jwu3" "WDNq;;7?" "WJ;x@6@6" } parent-hash "i&mhTu/!" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type "hardwired" with-interface { 0C:08:97 Aa:e0:* } via-port { "MU;,4G[h" "]v$$XKFh" ";,MZT'\''Dh" "g00{lD%j" "wRUZ*``0" "8#!J{gQ@" "`Z?3p92&" } hash "KYHTnNgP" id one-of { C60C:* d2EE:aDe8 ead7:214B 75Bc:59a6 3129:* AE7E:d25d ee2e:* A21D:* } name "n0CKUNor"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'allow with-connect-type { "hardwired" } with-interface { 14:E1:ee a9:ef:1e } name "$T[" via-port equals { "uAn$>}g'\''" " Idtdm=Z" "L5+~$p9G" ".<2^/*_#" } name all-of { "CH'\''-JLED" "A!a^flj}" "VZB4bM29" "zQibW[lk" "~.O];jOw" } id b96e:* with-interface none-of { b8:*:* 1a:fA:* 7e:B6:97 57:*:* 8D:d8:* } serial "&02OlmQ." parent-hash "Y{cAzv[U"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "8$^jgkWg"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "aeTX#Tfw" via-port "V!N3Ipm@" parent-hash { ";l}?;R.9" } id 0Cc2:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash all-of { "I8{]4TvS" ";>w8mQ3E" "iU_;>55>" "de.:[T/{" "8@Y~;~Ud" } id equals { 8B12:ABF2 dcEf:* ddfE:24A6 FEa2:a862 e0ac:61dF 2612:709b 3Ff0:* 90Be:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash all-of { "wfr9j]&," "aM}B47'\''0" "u]Nso^u`" "Rs U3PGv" "Bd0PDz{&" " .T@Ue6:" "-Ca=Qf34" } parent-hash "?,dfADqq" with-interface one-of { 0d:*:* bE:7B:9a } if allowed-matches(name "E:!wSp0/")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "CN/]>ajf" "z0K/.E/~" } id fa24:a8B3 name "Pkw.EF=y"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash equals-ordered { "!,@nBB+`" "xH@nx/vL" "~@}AC*Ly" "0mH@|z$f" } with-interface equals { E7:3A:* Ea:*:* 15:3f:* BE:*:* de:Bd:a3 Df:bF:* a0:c2:* } parent-hash "zy5`RAoP" via-port "hF/%W||k"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash equals { "S MTzat_" "}y?9*DWF" "'\''1CZDI`s" "-J/qh^QB" "&[*Wb_/7" "@e^dU:tQ" "+t5v%1$8" if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "F>ws8LBg" "4oHO_`ho" "p82KS+hW" "&$PM2XAg" "#r>H#ci*" ",S:LX&96" "%5f`N/uF" "^}v{9$U9" } parent-hash "%YGaV~vW" id { 96df:52c7 aDbD:fFb7 94Bc:* ccdD:c235 ebB9:48EA 9969:a8A9 } via-port "K|@HOjK9" serial none-of { "3-lGLJWE" } name { "?fYq.09H" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "KsHd#KO7" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "LoI;c;|;" id { 3AE3:1AC7 ba1f:* f4cf:5ca4 33F3:EDDf C42C:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash none-of { "vwFpit9'\''" "-JOnStM>" "G1N~ qo=" } id cD21:* serial none-of { "ymL7n{J#" "VFxa[d?`" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash one-of { "^!H2I&&>" "zEe#+kmV" } serial "6qCWFY8N" id one-of { dFaC:3fE8 Bea9:b380 } parent-hash { "DwO;./Z~" "L[A%lFK@" "0=p;s|wy" "R#`w4kI<" "tsA0y" "tMDz<3%Q" "-+.e|mmH" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "oumf218x" serial "~7ptfL|S" via-port equals-ordered { ".w.ANTfz" } parent-hash { "mZ]JlT9:" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { ".P%.>a{w" "wC[{`i8^" "8W`:aPG." "{eB8'\''|J>" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "Pl;NW^Kb"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "$q4Dl?8>" "#b3;ft]c" "vH4O#2Vo" "@3-o4p>." "|r =Obpa" } name { "7|+eABNJ" } via-port "E!4R'\''w^F" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "&Qf696`H" serial "/yO&59%H" with-interface Fa:54:* name "E,=~G<.x" via-port all-of { "lDrl.tlM" ";n}9z?W+" "U6`<[?}|" "Be/u '\''JI" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "QW`eGv7n" via-port "{c*W-Ba'\''" serial "2=Ii_1z3" name { "@qlK{p}X" } with-interface { 14:21:DB 1e:fF:* e2:*:* } id { 5A3e:* 2D3D:a95F Aaf9:* } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "R2]4[$HM" "L?^FEDKK" "Y,A|pSj," "]l8AIp;x" "z]59obZ<" } serial "+|zv[%X" "'\''/`v17ou" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "V_1:S1^|" "= ig5cd|" "B@Wc+90b" "hYoiJ8j8" } parent-hash "tc=!Fe@a"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "vu9;@,zf" name { "AI5GR%}}" "4*Y6#;A&" "w[7270C4" "8%x#+WSy" "fstZ6{MN" } via-port { "Vf4KG%]a" "56:/Yh`3" "6g12o*Y8" "e6]u7?C<" } id 45Bc:7eDD with-interface Ef:*:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "XKY9u-i`" name { "Di^w/[6j" "qDuN82P<" "pSEsRC+m" "h6xx'\''H4n" "}kO%Yf.8" "Wjg T@g<" } parent-hash equals-ordered { "Z`iH X1@" "3f% -uN." "ab3&IXW}" "I&[ee27]" "1&}~P88|" "@u0rQJtY" "?[21I&C#" } id one-of { 04Ad:* f5EC:* 8b6D:* DaAD:* BAF2:5ADb 6cFF:0ffb }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "Y@2^&:1J" } name { "z65Hr9[n" "OBR`.4Ac" "gp:rgD5-" } via-port { "aX$s/Is&" "M[_C.dXB" } id B06E:* parent-hash "4nG|WX{E" serial "Q5LK-k0m" if allowed-matches(name "TP5S>yMp")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "yG<]?d;&" "1b|1g!1x" "iHmS?^ys" } serial { "Jx9eD!L," "/l t^MGd" ".QM[QCnd" "O956P'\''v;" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "'\''yq[dzkm" } serial "I5OdR;B " with-interface AE:*:* parent-hash ";B>c2noM" name { "<05hjw]z" "d5{Z#Krs" "~aS{~?|m" "AY`XF-.&" "sm-FCmrr" "VE^8J,mG" "$yx&AkNS" "TBvj}%u%" } via-port ">'\''S`PR{^" id cd3f:c410' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "]Yq/zy7."' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "^YTGF'\''cy" via-port " x*^{P23" name "Uy~j6mo%" id 167E:3E86 serial "pTI-k^x3" with-interface 30:*:* parent-hash "4KwDj+Mb" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash "z/,=KJA^" id { 5A34:* DA7d:* } parent-hash "#7Vbsiwb" with-interface { F3:Ab:ab } name "!Wk!y48D"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block hash { "zkz'\''l%|e" "mn:-" "Tnf;c[,9" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id 1d94:* via-port ";6m3hr,#" name equals { "u5BL~+Iw" "8V>4|N,g" "GG-SP%F " } parent-hash "D~yq2!`U" with-interface { d8:0A:* 9e:*:* f0:bE:* } hash "+9,I5<'\''U" if none-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { 2B53:ebe5 a450:263f 8CD6:65Bb F938:* } parent-hash equals-ordered { "1bXFHB=V" } name "$Ta3nV?n" via-port equals { "e4{l-'\''.{" "HPbds!s-" ",p~tl}H;" "Q$pM:Dyx" } hash "9V:G&u0R" with-interface { 7e:*:* 01:80:* 10:*:* DA:ad:* 72:*:* aF:F3:5d }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { 3BCb:E9Ac } with-interface equals { 5E:27:* d0:*:* b4:*:* } name equals { "K1?S?{QO" "Go|IG[D=" ",QhlJ/K=" "2XPr{.Qm" "LHBidWpJ" "e`N}8U.." "e%]y`i@w" } parent-hash equals { "Zs. GigL" "dM+n,UiW" "UjjY}+9?" "@Y nskCK" } via-port { "XL^>,O.4" "q&rZ'\''1q{" "sy#%6k4q" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id 44b4:5df8 serial { "uMRoMBw+" } name { "xb0$* rD" "*8;NyRL0" ">SHv+p#d" ",UAi0[Z," "- SrX62C" ";}XcO;?y" "{.27Uh<*" "@:DqXN8q" } parent-hash "h[n+P@kT" hash one-of { "/^sy_5=n" "bf^`gu?m" "~eW<.0OA" "xB$~&z&*" "O.JtGL63" "j^xE=&X[" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id 4AAd:4b12 serial { "Mn01^T*6" "U<-b4YcS" "&KXb>a9~" ".HGwBgPs" } via-port one-of { "'\''1SpdnS3" "95O/~:Kf" "7LOYj*uP" "8dgeM}6T" "K_v&tJli" } with-interface CF:EA:fe hash "ajwu53_r"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { 582F:dF7C 3cFB:* 9FdF:* } parent-hash ".f,8PG5;" via-port none-of { "-wmvAWJ6" "U{_*+s9K" "36#:;hDp" "ayEl.@J." ".Wg;O[x1" "M7H?n[|," "!n5'\''neLK" "UR/;l*id" } name { "U@9@6_wp" "r#=+WCY>" "4Q!%>u> " "rUPDX=N!" "a>{3OEH1" "<095NUYL" } hash "PsffPxFy" with-interface 13:*:* serial "KlA{huO%" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id 58F7:Eb14 via-port ">s_V[KA~" serial { ">L^$v|u+" "%e PCE+u" ">#[0jB4P" } parent-hash "^9AeMvRH" name "SDw{l&Ao" hash "cI8_@gq8" with-interface { 97:*:* dc:E5:* ce:57:64 5B:6B:* e5:*:* BF:cf:b7 c2:e9:9c }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { 95d1:8F77 0eCa:* ea6e:Ed87 2c38:* } hash "6k9t'\''FmU" name "i`Wc6n^m" serial { "X7HHs[t." "'\''O5_vE1X" "lxf3v&z2" ".z:: yj," } with-interface 8C:*:* serial "m!s3.;fB"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { ac1D:17F3 1E69:3C4c 96C8:* f5cE:* 79f6:* 1C3E:CA80 4F62:fE6F 5cAB:* } parent-hash "t?_DE75_" hash "QC7cocdT" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { B5A7:* 32A7:* 68d1:84F3 509a:* } via-port "w%RRQZ-`" parent-hash "pq_r!4}*" with-interface one-of { c5:e9:* fd:D4:D1 B0:04:15 } serial "<}~5zxX" "*$V+ vU{" "M4Tm+T[," "]_j^xQ;:" "l'\''Ek6f1'\''" } if all-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id Bb10:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { bCdc:fbd7 FaF3:* 3fCe:* f48a:* 3eD3:24Da 65E3:06EB BeFd:2b29 0fDD:* } name "lg;`0??e" parent-hash "FL;%ohya"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id bEf8:DFc1 serial { "=$*M5&,]" "> G6>u A" "gXpU|UjS" } via-port equals-ordered { "X SfAtNy" "g-0Pxz'\''a" "|&kP#Zo0" "s_4qo@2U" "a={k/y%]" "$J|5$HpJ" "MWpbA_v~" "vf&+vM0S" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id C349:* with-interface { 4e:*:* } hash { "iz6%]gx&" "'\''8saqxFU" "q_oUgsnH" "EmP}l^HZ" "LCLZElyo" " ;aRXKVu" } parent-hash "pf4^r3O@" via-port { "Wo*4CG-|" "XIfhL!E<" "1R1x-T$j" } hash "'\''_G ygl;" with-interface 1d:ed:5B serial none-of { "CcRRT|4A" "$esS|nRf];G>" } via-port "UPbzX}8w" parent-hash "TS.u5Zkn"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { C9dC:* c7ff:F1aa bB5e:* D1A1:* befC:* 4Cf9:8DcF e804:EaFf D181:EfdA } with-interface { B0:*:* 15:*:* 9A:*:* F2:c7:A2 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { cA9C:a91A eF08:* 1e19:c9dF E02A:* D0Ca:6717 fAf9:d9cf cfaD:* } parent-hash "^%vz#? ]" hash equals-ordered { "f$wv-oK[" "C[YfK4Rp" "rA,Y/YrS" "syCs^^q+" "ept^7P,B" "!G56=1[o" "P@=RPXR4" } with-interface all-of { De:*:* 72:2E:71 } via-port { " jJ-Tk#6" "Du6- &-_" "b0BOwEx1" "Gf3bpJ86" } name { "*6,0XVx#" "SoXPDrC4" "*[-wmbki" "6^DHj4of" "I]HM*47l" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { CDDb:* F2Fb:* 3B71:* } with-interface none-of { E3:Cb:* 8E:*:* 56:9b:* Ab:Ef:* } parent-hash equals { "!+}7|z[&" "7SoEJ,ha" "Yt}z85lb" "dzNn.mPQ" } via-port { "iMJ30j_v" "oI|W5'\'':r" "bRk&$*%9" "arT]]~T~" } serial all-of { "Fji<[ku+" ":=5MTQt0" "UDBA8cc2" "4IuitCCq" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id { d669:* 25F2:32fc c5Cb:cED7 f9dC:9AaA 43A3:* b3A0:BaF7 } serial { "cwXg3|J8" "bMi&3 mt" "7=Vz,po?" "jNEk=Yns" "?Nx}#XZ+" "Y+eP8V{g" "t8H{kV}@" } via-port { "`d&dZ<1p" } name { "o-d/}:O1" } with-interface none-of { 3f:*:* 70:*:* A2:*:* 81:*:* c0:10:37 1F:91:7C C4:*:* Ee:91:5F } hash "+Fmdx!Nq" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id deEf:* hash "Cb'\''`nt" "|M%.S;+," "wYa[{$c>" } with-interface D6:Ac:d1 name "|~dFo*-9" via-port "[h[a?X"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id equals-ordered { A5FF:* d9C4:* d93e:262D 017d:* Fa3D:* C245:F2D6 7c22:c885 } with-interface { E4:*:* eC:90:9a 79:57:Cf Ad:*:* fE:2e:3A } if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block id FC2A:fc1a name "t7;XHw+[" serial { ":yZ_=iA`" "G&t]D*Qj" "A[pb4&v|" "=*tl2#]6" "E[qo89KQ" "}J]_EsQk" } parent-hash "$oIha'\''+}" via-port { "[E3-p,Iz" "y%jM!IaQ" "5/4." "*j$OZyJo" } with-interface none-of { 4f:a1:7d de:*:* 2a:50:7A 06:BF:* D6:*:* 76:CB:e3 bB:*:* } hash { "Z*q4it!8" "8ZLct+~*" "P[^>T8V?" "xv`h?|{w" "%p=7/].P" "mDqnI1-k" "sRtPt:b" "}!s7ukY0" "q7yW-mP;" "yy_q6f>$" "W=Yu]8O7" } hash equals { "hi|{6=1'\''" "dLQ;-r=o" } parent-hash { "6hEH/~k3" "8A*CMnow" "9AMY,0BW" "Nmh-r #R" "Hr3 7-%X" "Xg-br3sO" "`pg@plOh" "1g2`GP*Q" } via-port "Si'\''[X:80" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name { "6irqmUO|" "wc2zD9zE" "YA6e,TvV" "P#GyJ{z;" "vEWJpA4D" "EPR[XX&w" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name { "6N@c|yfs" "85;l0EN'\''" "zf2a6D4D" } id F666:7BB3 with-interface equals { 8e:*:* 42:*:* } parent-hash "la5Y~kCa" via-port equals { "ZYUd[o&<" "4mxQB ~q" } hash all-of { "`aTH'\''6,U" ".zi!rs@4" "+W+'\''pp+%" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "8sP5!q'\''n" id { c146:8950 88E7:* ac5f:* } hash equals-ordered { "fKjG%nI7" "R;h_K_JO" "_pTjwmyU" "Z]'\''z}q&v" "g6KP4I./" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "99" id { f7ad:* fDaF:* a5ae:b0EC af7A:d1F7 } if equals { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "CpAt5Ay2" serial equals-ordered { "F`9{B=;p" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name equals-ordered { "J~eG={i=" "bj/6G~S6" "+]3qNl&G" "A*]:O|Qx" ">pKayUO," "/[e*uMsP" "IsdXZR_i" "c.*~mB%s" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name equals-ordered { "N+#*FMv>" "XM@jR13G" "Q2gggu4D" "73[,G4pr" "htmp0n;y" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name equals-ordered { ":rW~XH,e" "?qD M^By" "VV0JtdV4" "6n4Mu][+" "02%d8|]}" "/*sEX2g+" ".z1Eq'\''g6" } serial one-of { "^q~TNw9g" "viT|A&+:" "#_FK,oD}" "&~q?kBJe" } with-interface { db:3B:40 6F:2a:7a Cf:cD:bb 0B:9e:2a 98:Aa:* fB:*:* 1A:*:* f8:B9:* } via-port "5R;@ZFk#" hash "n75?R^Pj" if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name equals { "_qV8 T/;" "I{3^%: t" "!hmlB?~R" "M'\''JZ1/5w" "!'\''LF[=;7" } serial "3SF!lO:$" parent-hash "l#d+Rh-i" id 85cC:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "FVDdAU{7" with-interface 33:7a:* hash { "yLj2N2|!" "Pp/ [&j?" "O[@}^Gd" with-interface AE:c1:* if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "Mg=WgqmF" id { 9FED:* 3383:* 5bFc:* 83b3:79a7 45Cd:* } hash { "-*~qnBh<" "9k:>Jrv7" "@sLqxO6`" "vzL?1t|p" "M|n1{Jna" } via-port "bcd08y#^" with-interface 02:*:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name none-of { ">M?`+X$C" ">i^b,U~%" "sY>xvTT0" "H^TOz]W;" "&>$YbViY" "gkK1S5rp" } id 22da:* parent-hash equals-ordered { "C|@zP8Z_" "#z]cv4xk" "%n|W`J?]" } with-interface 5B:Bd:* serial "C+`?Fz]k" via-port { "/fS9*4_j" "ev%;X+2B" "9GUN~7'\''<" "qsS+/q0J" "K/_>vPoF" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name none-of { "NU{W;w`u" "$b[r3m8~" "f5t@ms#h" "/>AA~2=V" } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name one-of { "AA-/&9$~" "bOp/li_$" "CfW:vfv4" "yS9:!IMO" "7IxD/:vz" } id { eb7B:* 3dd6:* A5E5:* Aacf:2d28 7d6A:c6a3 } hash { "C/inU2S}" "p^u6Z@P3" "f!G9*IfP" "zR|'\''8`;w" "+PAxJimJ" "5{XNx2oA" "xGCt;e5h" "=@LgMsm#" } parent-hash all-of { "fwFQ1DT5" "L%;jVz:{" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name one-of { "^u[!p>QI" } parent-hash "f9b;ZhA9" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name { "/oP`X?*z" "_!X,AqnB" "T=16?BEd" } id none-of { 1dbd:* 1eCE:* fF9b:* 4C95:* faEE:Ddf2 b0dC:* e6Ec:E1c4 } via-port equals { " py~xw9g" "[j34#b.r" } parent-hash none-of { "H2SgFn F" "[%%nLycE" "#?1C[?Xs" "Veft}bxH" "!P<@,#pK" "|fa1}4#t" "N |^5wbY" "kM@>]21B" } with-interface C1:Ae:* hash "Q3^HT${I"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "QAqob,a!" serial "rEw%U^w/" parent-hash "bDPkocYi" id equals-ordered { 0AD0:* 4C9A:* FafC:* } via-port { "q[B88NOc" "T=xNUK=g" "_o|al.T2" "l&_4,aPi" "Kw]7Qb.x" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name "r,,u!0{i" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block name { "%:.rVab}" "]xBCyk}D" } with-interface 66:94:* hash all-of { "^$Bf&qU7" "o7Y^3$/R" "l`>[Pj3i" "ynJ9FJY&" "$d6G|Q'\''D" "@p%N " "TOMlmlNI" "Fb8m6I+Q" "H~:QL.UD" "Dpf#Pu!G" "/Lwj=Z#N" } id 4E5D:* with-interface 3A:C8:0f serial "FN*fZ;-#" via-port { "E,87V'\''+I" "sUy~uY:1" "]UlXaH7*" "t.HDA6Jf3X" } serial "VyFloU7r" id equals { b3b5:BcE6 15dC:600b B472:* b6Bc:* 2590:e9b6 9DEa:* } with-interface one-of { 7A:7F:3f a1:Ce:7b 36:99:fE fd:*:* 09:AB:* 34:35:14 0E:d9:8D E7:8d:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash all-of { "2^b>tMZ9" } hash { "B?hC,{Bj" "<.-E8DU-Y" "awZ`Ef}r" "J4Mu$G:s" "]O4a_6J>" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash all-of { "b,3j{ppL" " A8Uwj$ZJYqNB" "|mc #!Y'\''" "pMoA'\''8Rl" "KCl=_M99" "w|5xT9it" } id { 7f3C:* fdcF:67FC f9D8:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash all-of { "J]:[6Jqx" } serial { "2|2<4JP5" "rLIqprTN" "-2q*d-j&" "E=^sZK:v" "Z%PAsTS/>Rb" ",m|Ey].r" "m>3^d|4%J" "YPS=~{vK" } id 6FFc:b1aE hash equals { "wi}|9GhL" "B{zbT|B}" "?>]]H6ap" " N:v*10/" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash equals { "uJ^#2y6i" "Ff!laFJ0" "}f}h.g4X" "1MbV8da0" "C+8%?Q6U" "s1[lmY%#" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash equals { "V vAP>Nk" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "ezm[2y!>" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "fX@NNuz<" if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "hFVb=a]v" via-port "_>yes/3e" name "Fs:h_Dgi" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "H/jAM?aA" id 2E41:7bb8 serial "@kx!V/0=" if all-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "kA_-2C{P" id none-of { 7ed2:* D0a6:* 1CE2:6A3C } with-interface fc:9c:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "KB`ggh%$" name one-of { "0VHg Mj7" "CXJpN}&_" "78ZY[J,9" "S/fMOsBS" "i" "@~#eew$W" "9{I{]&AL" } via-port ">kGIuTly" with-interface none-of { fa:Ca:fb 5D:71:* cc:4F:* 9f:D3:* 0e:*:* 97:02:* F5:*:* d4:eD:6c } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "nNNAz.^`"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash none-of { "=p2'\''G%/R" "`rSM/{V41V" "'\''e=o-JZ6" "1N+cIu57" } via-port "SvFZ[vIF" id EAbA:b670 if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash none-of { "RjZ?hi>z" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash none-of { "zYLz C[<" "F'\''#=,hSP" "I~m]3CL&" "{VYPWoaV" "0h7pXVvW" } hash all-of { "U>oPSzpi" ">Bw-q,r." " ~N4-u]'\''" "6f}{r9ac" "#>`{ou?2" "NmUv" "G[?4[80D" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash one-of { "T}_IDn.B" "]u^-]`@2" ":VdFg}@k" "chNfa#4y" } via-port "f[e5Tgy "' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "?`^OyjQz" name none-of { "Grq=9g?N" "?`{W;u$1" "!:qHkOnE" "PoS;!L%4" "uknBuD.c" "$q,O|>nb" "7JiWxXz2" } via-port { "_:>SwR9G" "+4*n?JQu" } id b01c:* if allowed-matches(name "+c?MisE]")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "|#q$o`;;"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash ";q#>P&gx" serial "PxV.Uk`&" hash "/hm>#_di" if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "qV9zTUu'\''" via-port "#X1xQi w" id { CCE0:* bD2f:1c3C 5171:* 8c7f:FdC1 a6eB:* Ee29:* } serial "vP{R-v8n" with-interface equals { 9d:40:fc Fc:*:* cc:*:* BF:EC:1e a1:8E:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "t5i40Mi5" via-port "v.|gmD$u" with-interface { A9:A9:F1 dd:*:* 71:6a:* } hash one-of { ",.`s6&B3" "g|1._Ad~" "r~&lp@I|" "czL_mWbB" "3m5HC^6F" "?{+PsB8#" "" " _?Fi$MY" "J5JaU|&" id EcEd:525f with-interface 3b:53:a6' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "*[+*v?Qa" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "XBI[m=}6" id A6Ce:Bb2C' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "@yxQxKg+" serial "0ArW{g%m" id EccD:* name none-of { ">H7VTb~G" "a^j3,$g9" } via-port ".74DS:u>" hash "{Y`7LS@F"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block parent-hash "'\''>&Z7>LM" via-port "]=B#ZaTF" name equals-ordered { "M[~MU2xp" "~!F5:^my" "hAM!{1m4" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "5k!NtdOw" parent-hash { "knBr`sDw" "M#p@X{n7" "-1!FSbvy" } with-interface F5:A7:81 hash none-of { "WgXXjR%0" ":yp4~W1i" "IN|/{}iZ" "@LF'\''@,f}" "|%fU_L:[" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "7:cGHL-q" hash "36H6N7qN" via-port equals { "w|6+~n$~" "4HBa~Jc^" "3J#4Hr{A" "4uV?>m'\''R" "-vhhXm_4" "OF=srz=k" "t@Glk!9]" } id a3a8:61Cc if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "[A[%d}}I" "AsEQI#|A" "sO ,kKyx" ",pgym~+]" "c7~YSz8@" "w@%`=__`" "H`94zga~" } parent-hash { "}XqLyP56" "D;n@Ck5y" " fiyNEYZ" ",2E>IUxz" "wqK.BwsP" ">DX=NBX2" "+-Rl'\''G8u" "i2h&iQTC" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial all-of { "#c8.X:-Y" } id { 41Ed:d98B bdEc:3816 a310:* } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial all-of { "!r]r9n%j" " q_j`lom" "0SWfwBi^" } with-interface { 0c:9d:d2 c4:8f:38 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { " AU~L GJ" "w'\''HG$9lw" "!<@~jUnM" "e8{o-Gx5" "ZoCZc,*-" "_uk>L?J7" "xZS:xwZ_" } id 35aE:* via-port "HBAs5HUE" if equals-ordered { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "BifnQB;f" "1EzqbCm-" "sr%T8ku1" "M1I{Kbbi" "`=vu'\'' ]" } hash { "~ipRFqXt" "a7koW-?I" "bnc=Hq>[" "7hry-AQw" "Ja=L,,vN" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "Cpbo$~Wm" name none-of { "KY`5FjbW" } parent-hash "+#pSB|sv" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "Dkms" "Ui'\''U-%F@" "2n$q;q$N" "g^:_0JFU" "{@$|DC:{" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "`;!;DLHl" with-interface equals { D6:*:* 42:bD:* F3:Cf:0a DF:c1:9D e3:86:* 2E:CD:EC 9B:65:1c } hash { "_Hbk{9Gr" "cW;&v2*1" } id 347c:* name "uLRP|dS{" via-port "Md}pzTT?" parent-hash all-of { "Ckp2HGG^" "<1dTG{R4" "L+JGxo#g" "'\''GZ5;72<'\''" "SZ'\''9L|0+" "nb4f8RQz" "%+nj5uJs" "lH7mX[{B" } parent-hash none-of { "VR.!VZX:" "&7Tajs#j" } via-port "4+Ob__&2" hash equals-ordered { "f;W/ v{Q" "F>Q:t#.2" ",@%aQY_E" } id 8dfb:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial equals { "xWWz!iq-" } parent-hash { "Ub$=]95S" "mt&G6+Eu" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "EtM=.0H=" "7wvO_c>h" "RqHmhcsb" "" "MOp%AD]8" "y~*@-5&@" "j>?8YCa4" "[-X'\''%8?^" } id 8eBd:* with-interface F1:5c:* if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "G7Hl0@@U" with-interface none-of { 3b:f5:* b7:*:* } hash "Vc0:K}4s" via-port equals-ordered { "5hp=l9_8" "% QvSSSf" ":,B~_>W/" "1n3XbOh3" "~Y'\''.ex'\''N" "vMR$&2!X" "DcB*rc}!" } id { 1f2A:* 00B2:* e0a5:4bF2 } name { "Oe8#Cxz[" "K^v%Z H%" "n;%%>%;5" "k>2buv{d_8S" "|DA`7z,{" "Q0m}qYqH" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "KnLBtuVQ" hash "FiI:Bz}W" via-port one-of { "%S-b%9+;" "Dpg0#>Sa" "E$K*v%+E" "IJpS]k6q" } id all-of { aACF:* 90C5:* A7A8:ccC7 } name { "d!7:npy2" } with-interface { Dc:2C:8e 63:eE:* 9D:*:* 24:*:* } parent-hash "wW^-A|#2" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "l>00&hpe" name { "_XnAr}w=" " g!AX5y~" "4Z>eHm;^" } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "@mG|`A=;" with-interface { D6:*:* cA:BF:41 } hash equals { "Li_axYd9" } parent-hash "n4Sh7/rB" via-port "_TF++qc5"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "NM`pS}J," via-port "axRr3:6 " id eBC5:* with-interface { 8A:D9:ed D6:d1:58 } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial none-of { "h-Dd;##S" "QCrcpQjW" "$?+ue*4n" "'\''cL*DpQ-" ">=|fzWe/" } with-interface 45:a4:* id equals-ordered { b4Fd:BE2f bADF:* dfB1:5Ca9 } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial none-of { "ss*lxBk8" "=!c'\''A[A " "'\'' IYFYQ?" "`u+X*Qlq" "bf7iVpu]" "#}$%!hJM" "[OCDq**f" "[zrj/>9+" } parent-hash "e Dv9jX9" name { "#`^4g4K_" "0{15Sc;7" "7=w?`OZg" "k{pxJQE|" } id 1CA3:* via-port "@?r/_-H7"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "nTNZzl6n" "71B>?fM-" } parent-hash "8*9yJk{3" via-port "c0tbr0|&"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "$-=Nza+3" name none-of { "30d9s1Dg" "N'\'':gAJOd" "pf&ZKJ$a" } with-interface 8E:*:* hash { "Kjx&s,h4" "-pwN/r``" } via-port equals { "P>weG^H`" " J/$!?|2" "kBpu;493" "I:`pMk%x" "x+:H5M^m" "8k}A9.s." "L:[C$cTH" "Ss|=h1gp" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "O2J*vt@U" "Xxg6?Ht'\''" "<^JN5g?m" "KPb}83d>" "9Yzu^@QF" "QPFRo/e0" } parent-hash all-of { "2u!WdQ9d" "av2]'\'',Yy" "*N;8S!f_" "N9yO&7F_" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "`q!QOU<," "T= L1xgN" } hash "QV4Uuq'\''L" name "BtA,$^P_" parent-hash { "%t{F, !g" "TZ!a&sG-" "~UfoGl#r" "Vr8/2" "c;bGTwYg" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "s2Z~_#iZ" hash "3Bedsrzv" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "snK~dU2{" id { 0f5e:Eca7 90cF:* aAff:cDEb 1BEA:* 34ab:3BA2 e4C5:bF82 8B55:* E1Ea:2B40 } parent-hash "://Xl0 F" via-port "k%*vc#+d" hash none-of { "Nf3@+-.B" } name all-of { "vi3?1<5C" "[Zs%3'\''{l" "kRsA^@e$" "jreX %09" } with-interface E3:*:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "s`Q4u%&?" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "SY}dZ1}R"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "u_&3&b2:" name equals { "/o5R>cVR" "cvf@{5=_" "FRz{FM2m" "oD<[]IWK" "BLPBm$KH" "wH##;BPs" "`np5?fe " "$Wgsg7m." } hash { "B~ib$R#P" "Q:PuxpS " "bmD{ Bnc" "%0PiV/~n" "8#%37{5Y" "K${[-h}Q" } parent-hash "2Oi{W{D+" id one-of { ce4E:* D90e:* cb7A:* D304:* DBc0:E21C 5635:dD4A } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "u%:ve#!R" name { "UkA,q gP" "@0OnrN3c" "X&p;CS|y" "~,giQ?QB" "~`BVQ^O$" } hash equals { "D?;Tl]_J" "/Jl,y@G " "s,}Y__1Y" "!FlBcp{i" "@4f;T#a'\''" } parent-hash "wT-L-=NE"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial { "wc_5YL@~" } name equals { "WCpMtmIV" "|sS}Qkxw" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial ",@WJ;`;Q" with-interface equals { 5f:FC:* B9:aF:* 14:d5:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block serial "z]2+_&LL"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "5 !K1-==" "*jn`b+LB" "$`Ues@P*" } hash { "T4/UgQMZ" "iW05a@lm" "6&|@Fm1E" "TkS~;Pg[" "!:5dX-Pm" "^CzASK^o" "%z`4" "lU?A9f<}" "1J`|uGKU" "KH3*zjhu" "eV@ 2K*k" "HOXUA%6<" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "78fe][qA" hash "e{A-Z^T|" name { "?2czF>QW" ",.4Bfl*m" "$tdEa~ev" } serial "?D51Ae'\''@" id fCdF:* parent-hash "$LD+}w`l" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "7'\'' ._x2S" "-s+cEk?X" "u_nn 7Qn" } with-interface { 2f:71:Aa 7a:eB:* 52:1d:* 1d:AB:* 1F:*:* 16:5C:48 } name "4}TCw0:^" if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port all-of { "IIJ_W:%" "^cw<3`ov" "xlBNXbrF" } parent-hash { "2Y3Ym>|I" ";L$-&U3^" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port all-of { "YlI:D}r6" "qlv,DT?^" "aUt'\''`4oo" "I-Z{F%y/" } parent-hash equals-ordered { "*tmW,F=," "SIf]?V5k" "[@dCg f&" "'\''{'\''74Xd<" "p/VxfJ>j" "uiSH@o3^" "NORxWxcC" "T/z0rpS`" } with-interface Cf:7a:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "BE?i[yLS"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "!BWzM} Z" "$Rqc0on/" "ax%P!bsy" } parent-hash "l~%9d6~=" id equals { Ec8c:* E8B1:4F11 cEdE:* eD6D:* Bbb1:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "c%v x{w2" "I]Bqt^Qp" "c$y F_:R" "A4" "cXjmDFId" "0$<9Q3;!" "huaXz&Rj" } id all-of { 0CCa:25d2 c6E2:5B9c 699B:* ABC7:* } hash none-of { "qCDG|.!c" "*F/='\''Y}7" "[u1=P9iY" "KHg&fL'\''n" "RyOZxhti" "e0R V/c'\''" ">O 8+O*M" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "cX`c|1-J" name "{`8.Jg=y" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "DLIukMxR" parent-hash equals { ":a+CUZHG" ",eGZK{5s" "f`>?TzN," "$GqQ6t{}" "]I_dTJ/o" "G8Z'\''}@=X" } name { ";i5hOE14" "7OX#}Ewl" "a$~BJ@GO" "A9ZZ=&=p" "Z'\''F0JZg/" "~nc>Y5[ " } serial "'\''$TaI/F "' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "-D^Y&axw" hash { "!-0_ZcyV" "xDdWv6Yk" "[*vXaN7*" "b:j[[`c1" "njTVUT&{" "_1OX ; U" } serial all-of { "G`}$C'\''6V" ".bl,>ZI*" "!+:xPC=P" "]v}j>KxA" "/wKPw?u}" "jV?yr0q!" "nNxp#Z,~" } id one-of { 2212:* BF1d:* cfC5:E9Ba FBCc:* b964:* 1B1b:ffCA } with-interface BE:7E:* if equals-ordered { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "!:,DZGae" "B=PI9ou;" "B_GCHKA@" "v_gKi+1>" "/-;54U:B" "+D_rvG>2" } id aa2c:955e name none-of { "0N@FwwnE" "u1g$Nwsi" "4@=@Ucbm" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "E8.Tq;%<" id { CDfD:ad9d B3a8:* 5E9b:A7e7 1cCb:* } hash "GKzYp{e{" parent-hash equals { "la8'\''so#b" } serial "w4[W|3q=" with-interface { 7B:*:* BD:*:* EF:*:* 62:*:* 75:B8:3B } name { "K$$r10V." "lEf^6<0N" "S]W-m-Ef" "O#E?L*.O" "D8!qvAY3" } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "eFNbse*f" ";YM:OHPa" } id 4ab6:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "g_54F !j" parent-hash "l H.2?NR"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "h'\'']48,_c" with-interface Db:*:* name "}`[=L6/Z"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "KbX_Hib3" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port ">KeBB?~9"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "@$l~5]&i" "okMY~gz|" "uJ=:`4#/" "Tbd4tk@*" "a%BaM?#[" "Q3'\''=tU{F" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "lYgo0V-i" with-interface a4:6C:f0 serial "j,Go$M}X" parent-hash "_5*11g7g" id 01D1:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "m`[7N-`>" "bWvd#kCF" "xLp qu&w" "Q_Cf4+MD" "n9X3dQxN" "=9NjE2nJ" "7mFzm6n_" "nD[fq@kZ" } name { "r5/FW`Bf" ".?l:5#s%" } serial "8u!SAX#[" parent-hash { "Ff%e^mN%" "gE'\''fl:,|" "IF%9Tb9O" ";m VCHt" " TuirsMZ" "g~?tLWKZ" } with-interface a3:8d:* id 2AA9:f295' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "NGSav7D0" id cB95:99Ce if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port none-of { "o!Xn/sA?" "U^}l_$`?" } parent-hash "zrKp|0?V" serial { "|[[:VRFb" "#IA=Myg&" "ha9FbW&?" "SeB3CYXm" } with-interface { 07:*:* 83:e1:BC dA:*:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port none-of { "pgDBVQrE" "Jmbl_]" } parent-hash equals-ordered { "q_Whut;E" "f`M'\'',oua" "qKo],I6Y" "fU!F'\''9u>" "{5 x]LDt" "{`;uC4~[" ",~zk|#zl" } serial "{]}WymuR"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port one-of { "*FWFX{J0" "Y>Ll09>Y" "9hnX8@6k" "yshm'\''r~N" } hash "#gYL&?I[" name one-of { "-i|.z`T" ",8W}YNwd" } with-interface FC:D0:0c parent-hash "W+{ef2tz" id { EdC9:* BB37:5D3e Ed2d:B077 9631:* EA0C:c146 e0b4:73E5 B22f:Efd9 77Ae:* } serial equals { "ZK@9x6N<" "}7ZbM!E#" "A,O.3%Gn" "%0Ti{l0L" ",T-AO?_?" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port one-of { "Sc,B.qfh" "%L R~8N6" "r$-rC;~v" "yp[U~ /Y" ", ERO/cJ" "pN{Se]+6" } id 1739:* name "~5B}c8EA" with-interface 1B:0d:F7 serial "KX.te?$/" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { ".^P:/EpE" "o;[LbPKD" "7H^Tn%84" "Zs VtIbi" "D6T%w}Q " "&g'\''L`Dpj" "ni}XBvS<" } parent-hash "o'\''>CI~Oa" serial "eqrAJ+E+" name one-of { "`zX02f&e" ">7^rmj:h" "LN+GDy>H" "2e74XFrX" ":jT3|Ni." "8T1y.V#a" "O&IUV,o:" "AaiziRVW" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "rpT[fRm<" "o8Five`v" } hash all-of { "<$t25oR|" "/+ >vwv=" } parent-hash ":ORfv_2J" id one-of { 0a72:2cCE bfE4:* eB54:37A8 } with-interface Ca:78:* serial "l sRp5*m" name "c!*vZnWr"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "R`Z`gX6i" parent-hash "= @pD7g*" with-interface 8c:80:52 id Bdd6:Ade3' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "U>=| @=6" serial { "C;szU@6P" "NA,32MR:" "8m5}c:~p" ".UgZK{^3" "?3*t!j[1" "EgY]OrbQ" "hKd70&?u" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "UAH43man" parent-hash all-of { "A+VqoH" ":m'\''ymU[f" } with-interface equals-ordered { e3:4b:* ce:Cf:* 4D:*:* } name "CBsuMcGQ" hash equals-ordered { "gtlY7]U:" "x}u 7*[>" "IpTb9YWc" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "vVuXkgvY" } hash equals { "+Xg7|nS?" "LBAh7[&Z" "0jBo=3Lf" "d,XM@ruj" } parent-hash none-of { "L;,RTXMG" "T%'\''R=E>V" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "w6a`xG_@" hash equals-ordered { "n*/}JO_W" "8Y2WK`kD" "?wpZ [mV" "y4:!MWqM" "ANbq$6v-" "LmXDIGJ9" "2mPA2Z|l" "6!M:LDz*" "hDM&i_h^" "LwU[z:Ol" } id { 0Ef7:* aFB2:* aaf5:aFd3 cE48:* 4419:CBce 92Ad:ec12 } hash one-of { "-A&SRAU " "p}Lv6~7!" "qE@ p7a$" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port { "ZB/]rEkt" "x-!F0S_$" } name "h4Ea!k`L" id { 00E5:* d33B:e9f7 568F:* } with-interface 6E:*:* parent-hash { "Rn.49Ml/" ".hM?Kl0!" ";>DagLEX" "qNireG/M" "wq'\'']dhK9" "59QKT?8w" "^a}~Y~^e" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block via-port "ZqDuUpoG" serial "&D==,?!e" hash all-of { "TN5aEI7[" "SF5&ERkU" } with-interface 5e:*:* id all-of { dCe7:* 78Eb:D3D1 bbad:4B57 BD4b:8dd9 DC8D:BC9F 0Ea6:* EAd7:Eb2D f95e:e70B } name "5m!o~Xfc" } serial equals { "p#f_vo+#" "5.a`[rDI" "/@$V`L,`" "ZA?@;!K`" "<{Ov{x8c" "'\''ML0kxaG" ",di|TmXj" } via-port { "r3WLsN@ " "$O:K<+Oq" ":xICCvk_" "uooBkLi`" } parent-hash { "&xj!Qfun" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface 24:*:* via-port equals { "$XN`8p$r" "TqS8;!L6" "sw&v0?We" "6CK@#?u/" } serial equals { "r{JT!cVJ" "fq9dCeG9" "?.jmW=p2" "_Vv?2A-:" "!%Ud;e1T" } hash equals { "En,#'\''S~f" "UAsT?dU+" "^0+t$:ms" "56%n>n%w" "rpPp?7Mn" "@]`SAq7f" } id b8c6:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface 25:*:* parent-hash equals-ordered { "ht_Hm5eP" "e%n?q'\''iF" "Tua5=t1/" "ktRw_P'\''U" "6vr>j;iV" } serial { "`YyM?>fF" "o'\''K1ve1n" "f/[D;X$H" "VY_yn0G]" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface 3b:A9:BF id { 59a5:Cad7 B9A4:B28A eEb6:* } hash all-of { "1?X2u9A7" "_`]`neGo" "Q M{30d6" ">-pqob~!" "VzM,Y<-^" } serial ">4J~>=e4" name { "+Z%U,Y00" "NM{+o^}%" "T.9qaZ^A" "HJ-Q{6z[" "8c+uJ<=." "3/J][.8." } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface { 3c:*:* 19:DD:* aA:3c:12 20:EE:* B0:A5:96 d2:Ec:* 90:*:* } id 5c1e:baBF parent-hash { "eP%]m#5H" "*]o,:N3@" "#&BkVZ4L" "wBnmz=[U" } name { "_" "r5EX5>kH" "b|lqUXYfvcq" ".F0A*k41" "'\''r2h-dh6" "7h`f1-f7" } name "8G7kkhQ7" serial "OsNC2zYh" if equals-ordered { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface 6d:*:* id 7FCb:* parent-hash { "BGqqqM56" "?dp[q72M" "SMeEnhAR" } hash equals-ordered { "LYHvjL^?" ",yi7>{K'\''" "m@>epG}]" "Z5VXM7q3" "8?V3/J@Sh" "d1!=aN:j" "u5oPoIU~" "PK~S_xcM" "tY-6>'\'':e" "k_et|o@w" "4xam[7[2" "f:s$YH;H" } serial "v1zlks:D" id Efcc:bFEc via-port equals-ordered { "I`??fBQ2" "~ g|pv`I" "bIO,gl^/RbH" id AcCd:7CB5 via-port none-of { "n|0aM2`!" " iD/>]cC" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface a4:*:* id all-of { 1cdb:5E8a Ff2f:75dA A6EE:D743 } parent-hash one-of { "Pc}|020l" "'\''G@Jrnb8" "~v8C-Yz4" "9^$W0A8A" "V/E+]D[x" "3?>{VB,w" } via-port { "yX~x;K=|" } hash { "vJuCVhx<" "fP{Dp0Xt" } name "pUZ*qJUW" serial { "?Tl/5dt-" "I^lZgZHl" "0s5_XF%-" "4v$Q@8^`" "-X_,HHAc" "]&vYO P<" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface aE:7b:* name "|8#QiJ33" hash "D~U9`z:k" parent-hash "X<@j9O;%" serial all-of { "*%,Ky/HE" } via-port { "rl58j%kf" "{~@CDQB*" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface { AE:cE:* d9:3a:* 8E:*:* cb:eC:aE 95:*:* CD:4E:bC AF:7a:04 } hash "_CKMJ0]N" name equals { "Gop@bU;Q" "1_s;X2=|" "z&63>bW{" "Z {~TV!?" "LO%KQla3" "H`F0+|k{" } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface all-of { 0e:1e:7c CA:Ad:* d3:75:BE Fc:*:* A7:C2:58 b4:23:df be:b3:* } id { fC57:* 58ae:9e5a 61d9:bfCC Eb22:* 7d29:89dA } serial "k]JqDsf>" via-port equals-ordered { "-.XB7dRR" "xG_Ccd/c" "LC!$Xgq*" "Y#,$uq;]" "MD@bdIg?" "%A^I5 s3" "Oq@7FSBo" "cFTQdt" serial "G!qbaP^{" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface b6:AD:1C id { B3Ce:9CBD } parent-hash none-of { "HquSqjm^" "%zUK}a[&" "$Zi,1`Xo" "YZ0`2j/G" } via-port { "A/+1F$no" "w 9{C`hn" "o67!`!bx" "QK6uQ!;]" "1r7v]E|i" "Z%S*:#~3" "eK[84Jxa" ",tMvkD.E" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface bd:cc:* if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface d7:F3:* hash "2D88zYyS" id { b5BD:* FAFa:8a31 bd0e:6EA4 8ffF:AbfF bFbe:* AAe5:A0fb 90A7:* } parent-hash equals { "d1MLIn+P" "t}pD*D'\''^" } via-port { "F.#ANH0I" "dI`AdJfx" "aWNs9!tI" "d`pqB@jU" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface e0:cc:66 hash "/olqC{fb" parent-hash { "dX%$0jUD" "[Bc6D>$_" "Y+;Ck0sY" ".MWzF/t." "$9h`HI7p" "D2Xqa.pQ" "D^4us:7&" "C4D5z}&*" } id 7C39:* if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface { E4:dE:* fE:EA:* } hash "Z$,WkT?t" name { "@zKN_{v~" "ww68=L]a" "/yR}Nx_Y" } id 995f:* if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface { e7:16:* 00:8c:* B7:*:* 96:85:B1 F3:DC:c7 8d:*:* 4D:FB:C1 f9:F6:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface equals { D6:6b:* 5C:7d:d6 1A:A9:fd } id E24e:* name "ATnytMKm" serial "thT 8a>6" hash none-of { "l?//cX4|" "kJ3PKdA3" "h-xcKG{c" "'\''GyRKy05" } parent-hash "nLQ&6Z'\''C"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface equals-ordered { 61:d4:0D f7:a4:* 5F:a8:* 10:BE:* 5F:6e:* B7:ea:* } id 7e3D:C64C hash one-of { "4S_>uLhN" "ymB40UjR" " [X^20f~" "DXY zCQ$" "ZkZIh0<7" "*R[^3%'\''=" "E#M&lB~a" } via-port { "C3{mIl4K" "]T%X~7Ny" } name { "MN4&f^:T" "nxc@Yu-+" "$.ucE&=x" "+Rd,6AJ%" "jpKp{93A" ">'\''|Ajd1x" "~/pN#L~a" } serial "2u{i/oM~" parent-hash "3E:mtsZ?" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface equals-ordered { 78:e6:0c 6C:3C:1D 3d:*:* 6A:25:* F9:04:Ad } if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-interface fA:3e:* hash "AmTqP5 p" serial "[|toucRl" id 1C5e:363f name "05Q9Xl3c" parent-hash none-of { "ATrZW!5r" "V^" via-port "t72rZLXt"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type "hotplug" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type { "hardwired" "unknown" } id 38D7:C5a3 name "otYR$=X2" with-interface { Fb:bc:b8 Be:*:* DD:*:* Ac:*:* 11:49:* 00:*:* 9d:*:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type "hardwired"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type "hotplug" id AfA2:9aAA parent-hash "Jc{r^WNm" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type { "hardwired" "hotplug" "unknown" } via-port equals-ordered { "]/EQL?a2" "Imk7@r=E" ":,a-OO{l" "JW/|jwu3" "WDNq;;7?" "WJ;x@6@6" } parent-hash "i&mhTu/!" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type "hardwired" with-interface { 0C:08:97 Aa:e0:* } via-port { "MU;,4G[h" "]v$$XKFh" ";,MZT'\''Dh" "g00{lD%j" "wRUZ*``0" "8#!J{gQ@" "`Z?3p92&" } hash "KYHTnNgP" id one-of { C60C:* d2EE:aDe8 ead7:214B 75Bc:59a6 3129:* AE7E:d25d ee2e:* A21D:* } name "n0CKUNor"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'block with-connect-type { "hardwired" } with-interface { 14:E1:ee a9:ef:1e } name "$T[" "X<3c%D*e" "UB%S[so7" "Z}.[Q6WF" "1>hZhf]5" "<34Evd'\''X" } if allowed-matches(name "*[*x9]~u")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "b0D'\''QA*e" id { 2aDc:A2Ba C8FB:fcEB EBBA:* 695C:f516 468b:* 5804:454D 1DC9:cbFF } serial { "3X: ,Cf!" "ugaG98K{" "Ezn~!j6`" "% Ues8z{" "[ZovP4^~" "lW$nec!U>" with-interface 0b:0A:* parent-hash "C?]%!-7<" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "Bo2h^]Oz" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash { "@C|3,Ouw" "PBPB=,5p" "3,M=HXmp" "^d/Oc`]{" "sXO6hG'\''x" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "[}~e0hn0"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash equals { "1kh30%d[" "p1=De" "EV8^{G}v" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "-~>gG%fTv{:T*" "Z=&nbK?+" } if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "Gm`6pj&%" via-port "@-]2I=^g" id equals { 7DFC:ae9E 2171:a7A8 } parent-hash { "GKN!A_k'\''" "apUd'\''LSC" "4ekw`kiU" "~!wwwVYI" "?]=;<|l#" "jI$!aT/b" "A?2SM7|:" "a;`8kMK}" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash { "I[PNT@Z~" "rsW97@.3" "?6=P@J'\''^" "j=;_bXLR" "->gZH*ra" "O]tZ5$$F" } id { 79E5:3eeC Fe67:fbB8 72C4:FD9A } parent-hash one-of { "T+2EUtG5" "ZK>VO'\''@Z" "ad7#,UQc" "N1}.@'\'',O" "3>34^D{|" "@$F2%=kf" "7B/OD4/K" } via-port "$DUYR{`T" "6TMrB1hg" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "lT#?*;OP" with-interface 41:06:60 serial { "MMlyhV=s" } via-port equals { ":VQzu!nI" "BZ%+~>By" "&5bF,jcd" } id 52b4:0b4C name "%=IHTdHV" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "?[mV2hbt" via-port { "NTL#35VS" "GNF;i$Gc" "[Pc*YAv#" } with-interface 8B:AB:* parent-hash one-of { "8ev{?iL{" "z/nzXAyC" "o*xz=03E" "Y]%[`A61" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "N:E8h;Kj" with-interface { CB:11:c8 83:21:E3 2a:*:* FD:1d:8F } serial { "FWnuG'\''ZV" "M2/T-:We" "2kVF7G{H" } parent-hash "*F39Z}Cl"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash none-of { "CJ1Nz9Z{" "WcuHsk6>" "NpjWM.]7" "NkY:--> " "V5jH}mW-" "t.m;e<#X" "pMHOwS[;" "1E~~5{tc" } with-interface 4a:A5:* via-port "Z^6=5TWc" serial ",W%frw%#" name { "S#+wxp:M" "VYeg}Ha " "z3PF,:q:" "N@b}A>am" "St!$s@vI" "!*-!t!Dd" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash none-of { "~m_rz19P" "J7K,'\''hSj" "n|#{gV7=" "`AB'\''I2Jc" } serial "R1GLA_n5" name { "p8rjMj/p" ";-Fu-,TR" "S;oHdGm:Eg" "3FikLCM=" "7=3FQZu?" "_a-Ztiry" "lQHw4oN6" "516SZiMV" } with-interface { 55:*:* bb:28:* } name none-of { "$}eZ+%-Q" "AlJ8CEZ!" "1M8nkB*|" } serial "@U_9bo:." if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "U38UP9GX" with-interface 75:Be:79 name "m21T_Y_j" parent-hash "j{AjXFP-" if equals-ordered { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "U lD+u:]" serial all-of { "Fb8b%OjY" } parent-hash "1b^k[@3v" name "1Wq*}{,J" via-port { "Nd[?'\''s8i" } with-interface c7:15:* id none-of { Ad7d:* } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "Up*][U%n" with-interface bA:e3:* via-port { "@ApJ.7#w" "+gA:sEtD" "Ir}3O901" } id { c4Bc:dcBa 6B95:9eAE c314:* } name "Z/]z+HW&" serial "L=D9AEA="' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "-XE`#cnz" parent-hash "chqw^{-s" serial "Z,JLN4a=" with-interface 58:3b:* id fb6d:* via-port "+EcI1:HO" name { "mVZvzunQ" "[Lbg9}A;" "Jzy5h}-]" "_K;gC -c" "fdP7{+IX" "O-$|L*o[" "_wv9$Eh3" } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "*^xG]YbX" id equals-ordered { 2EBA:A9DF Af4f:66cf d37C:* A1E3:a938 eAbC:* 42A7:Cf26 92cC:bf9c } parent-hash "?I/^7:LM" name ".yZMM>NV" serial "7=1~1MLH" via-port "sv+L,vRL" with-interface none-of { 75:93:7B 5D:0A:* d1:*:* bD:*:* C2:*:* d1:c6:* 01:37:* 44:A0:* } if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject hash "XYUYMU=z" if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id 0F1B:* name { "#,U,0 *^" ",$1P Vnl" "r%qhbEFO" "h5N8f Vw" "*d-Q_uyi" ">hTH I E1 {" } via-port none-of { "`di7N>ib" "vL:^QSP~" "_Zns|#e<" "S!Cp*0~n" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { 0fEE:* } serial "i516'\''{x;" via-port "nZCN'\''n_." name "lLSY}3#U" with-interface { 6B:D8:* } hash "]$t6GN5:"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id 2aad:* with-interface { D2:*:* 94:D3:9a F3:F2:1A 0d:cE:d8 dE:Aa:* 5c:B4:bA 62:ED:* } parent-hash all-of { "qq=]MS0s" "x|iO,5Hd" "GTb10H--" "8K+a seT" "8O^G=NEj" "E<8[gIRD" "Qf ],4 }nW;" "=#rDr^{L" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id 3B2B:* via-port { "+s2n~GJW" "G.R23S~y" "i55Jl'\''0_" "Wl4L~IAG" ":,!KzKtD" "v~]+0kAj" } serial { "23WapeE6" "@DVJk/td" "G~DpkBu&" "bM<{pcd{" "a :KAV&$" "Nw[?+~dj" "vupgW]+3" "EFHrH*r^~io" name "MR|#3K1e" parent-hash all-of { "i,nW517[" "S/#8 d.7" ",czl7.$+" "$Hf~Duzd" "]7v&Evwq" "=SA-{ R;" } with-interface e6:*:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { 3FfE:* E3E9:d174 dCa7:136F BC1a:* c21F:1c0c f060:* } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { 49AD:* ec5f:5EB1 1A44:e4c4 afA4:8a4d af89:755E 0b63:* 47c9:E34F } serial "&iwWT|6x" with-interface CC:60:* via-port "#hlL8Q12" name none-of { "s}$OqHc&AB" name equals-ordered { "kIXbZ&Iv" "b%GDhUO " "uyF*6|c&" "ImC&Pt.K" } parent-hash all-of { "x25nCP=&" "b16r` -:" "*p}+KS`=" "sW21L0_N" "dk=q|XmO" "iC~C`dY " ":-vuH@+k" "@ &6Nr`K" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { 92b0:* A9E4:43cF 09E8:* DFce:3a8A 4f5a:5EBb b5d6:* 8c9f:* } serial { "s~vn=?,Y" "fXV1gP'\''S" "dfjw;tkd" "}yiH]agp" "Yr=~E3a_" "L33Y3lBb" } name "Qr+W'\''o5@" with-interface equals-ordered { 38:*:* D0:A5:* A2:*:* 47:*:* } parent-hash { "1Tjf" } via-port { "iJ#[#f`T" "D1PIZjW6" "JX1ov!fr" "Qr.R`0Hc" "|oM@a,8U" "f-1~]lMw" "Hw2wlpKR" "e85}*T%." } parent-hash { "1Hw1mIX4" "5Ozd.v88" "0FkXsJ^B" "2c&>*dcz" ">9|dWE3%" } serial "2XEV7NhW" name { "ys;K%M!Y" "kv%{TNI1" "F@gO+~cM" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id all-of { 6f3e:4B62 7abc:7F67 6270:52B8 bEEB:14eb } if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id all-of { AdF0:* aF48:6BB4 6437:* 6C06:9cf8 9d72:94cc afaE:* 0D5f:6f89 } serial equals { "t?@u8guJ" "3tlipcoe" "&%AzJBDr" "`K;/4B1`" } with-interface 8A:*:* via-port "8jom+v6k" hash all-of { "Z*HiOkgt" "s$$_,o:m" "Fe${.H,v" "2jRbyQk=" "_UMahp." } name "NdIzfn7p" if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id B7a5:* via-port "8ij/qhi2" parent-hash "CPP6Sw3h" serial { "lx+VNll0" "%MKO_>R~" "~.yx/ri+" } with-interface equals { Ef:*:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id BF5C:8CBD' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { c291:* F3a3:* a6F7:a1cF ffF2:* } serial equals { "I?a3bI5l" } via-port one-of { "029&qKTb" "=EJ N$h;" "F2g6CjE&" "psu#e2-x" "i!NbSlDi" "eh9Z`x@I" "j_!jE+ku" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id c3cC:* hash all-of { "LE@#m=8^" "r. TLT~X" "lwHAY7FD" "x0A7@};4" "H:fBT5My" } name "~zx9Sr!2" with-interface equals-ordered { 6c:*:* f6:*:* e9:dE:ec 20:*:* } serial "[FG+Oqb9" parent-hash equals-ordered { "'\'';?3}Ehp" "ALVSz7pU" ",$N5l:9T" "2LFU50s*" "?6Ht-3jA" "Vo.1@{1 " "2%7$o6um" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id C658:DC06 parent-hash none-of { "jT9W65}`" "Vdq]R$w|" "r=9cOI[4" "-;Ucr/<7" "u!}jK%zO" "@i /{qhA" "+c.n8C,<" "KPP}fiSt" } serial "LIX CA#3" name "AXI*a'\''!|" via-port { "D54{9Lr1" "w8^^9*b&" "FQ]@PUrG" "n~!sV_D5" "3*q.T,>B" "YRfS%0ii" "bX{lH=FP" } with-interface fE:28:aD' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id cEbB:* name "dA$k/Gfl" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id D858:* hash all-of { "wYj *H.i" "Kzl[m3p[" "=8z5EbX=" } serial "g>_?@dsqc" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { E9D1:F5FD } serial "" "X^6mK4x`" "'\''%@dOV#_" } hash "x0CHSDxC" if allowed-matches(name "K Gfi!1p")' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id { Eacc:* a6bb:* 5B7F:* E5aB:* d064:fA1D Eb2F:* d623:* E50c:DF47 } serial none-of { "hVmcqCF," "!P_+f]1c" "fdfng[,E" "*JznKWT " "^1}M%{M " } name "xg[a7_Z<"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id fCf3:8e21 parent-hash { "7VK[#h5N" } with-interface 9f:*:* serial "jAdP:Z5g" hash "5&ptC#n;"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id FD06:* with-interface 20:*:* serial none-of { "6PX4K?U2" "+8I+GUde" } parent-hash { "3E$DcA5>" "t+Dj2Qx*" ",Kh39ykT" "%od12 .e" "N;JUVP2{" "vjXMynPJ" "BsXh@WiA" "$!qK`.D<" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id none-of { Ac4c:531b 322B:Ddaa dBa8:* adB9:b737 94ca:52ee } parent-hash { "ldHR'\''Z{9" "oUXbhJ:7" "ASlMOo-@" "|B?=jfBQ" "bBT$CfOm" "L0s[L~xX" "ggfSi_u~" } name "]JA3! ~{"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id none-of { CB8E:5F01 F0F8:7491 756E:* } name { "xH1K%16p" "f8IaYm:7" "qldMQwAy" "yURda{Yz" } serial all-of { "9`=C|qIb" "Z.P^*0fg" ":N=;w!CI" "N,9t//KC" "WEA%^|To" "28'\''p r'\''," } via-port { "$aLcV$yi" "};<{St]i" "9B+nCP-8" "nU|pJibH" "$+naTyL8" "g 3XTrU9" } hash "nfHI[N|D"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject id one-of { ad8f:2dEe 90D5:4110 3D25:b8DC f2ce:* 116A:* 2EAB:* D7AA:* } name "5=/x6jiG" with-interface 8C:4B:* via-port none-of { "l!y2V>o;" "L`Gm~U5s" "bPtmRur8" "Z W+_x^c" "6a+rBNV%" "AyDpi0g-" } hash "lHDzSn.c" serial { "BmG3_dJ-" "}^hWJ{?v" "w*$DF!FK" "kkQNPA`H" "SMt!`X#V" "9o7at*m=" } parent-hash "X`Xcsvb'\''" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name { "0.3>p?[#" } id { dA10:* 08c9:7cE2 DA31:* bDA8:* a6A8:* 5aCC:* D55D:91Ff } via-port "w,1NnKf7" with-interface equals { d7:DC:* 81:*:* f1:fE:4e 5E:Ba:* 2C:*:* fa:22:94 30:3a:* 59:B5:6b } serial "YWz@`LrK" hash "NYe2I9QE"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name " 5YsSERs" serial equals { "?knRo&X`" "7LCsKjVO" "rT9>5Afr" "?YNluTiT" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name { "@@6<:=:C" "}Xg~gi|L" "&KS`*XHb" "DFgIE-" via-port "vZPjD]1O" with-interface 92:cb:d5 serial equals { "wT$g3ei/" } parent-hash { "XfY8@wT0" "b4%O3xI$" "-ZUKNz" "_Fz4u7`L" "2/X@NSO0" "`]]k?|wv" "<%:W

Jye[U" "y5x#/sv4" " :/2Lz=P" "HzD8 ~:Y" "A[Tbwb,`" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name "/@jbkQD_" serial "w&'\'''\''4D1I" id 1d0a:9c3d with-interface one-of { cE:*:* 8a:02:41 A5:8c:cb 51:*:* Fc:*:* b6:0b:* } parent-hash all-of { "n[BckQO." "2w=0/ %E" "}&/+j_Qx" "C 5/4{}p" "7<8+Z.Nx" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name "+ k@2AK[" hash "p]XAeB4<" serial { "t`4i#?@j" } id { d1E2:3f0c f9bb:eeF1 } with-interface 4F:24:C9 parent-hash { "rmn2uS`B" "7!>X-#t " "Q/z0$}y!" "n5q-UQSV" } via-port "T]5}gqCr"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name { "K:bJ~pZN" "7/WAM$7U" "5Y@mWwK{" "?;~[$&2T" "_" "|2R`x9'\''L" "C}2lpXN*" "%t vMg^5" "-3,kbJn~" "YqeMJmK " "$utXt`4>" "`ItJ;%v-" } id { 7A72:A624 aebb:* B5E0:f82b af1B:* fbbC:* 6fdc:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name "'\''*'\''ODy,m" if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name one-of { "A_!ageD6" "#dnn!;1C" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name one-of { "*%jBcE^$" "UQ>z9d`d" "oDjo`d_8" "5.aan,I-" "P|2agjJ]" "qWsJ`{/c" ";=6H[J8&" } if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name one-of { "MjwwJ2[#" " U+&#=;C" } parent-hash { "y{RP$j$>" "!~rML4GS" "Ll@k**[G" "lCOO]z.'\''" } serial "h~=Iooa]" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name one-of { "$nm%oD&`" "NHYqfUSX" "5fak#K,#" "Axm5~6Yd" "/+#>QCn!" "w.Wdv]d}" } parent-hash { "dv=6cauW" "&*zIIRMW" "]Cjp0TM@" "ufp8mYf4" "+b1B`Z6;" } serial none-of { ",s`4!EqI" "UM>7kns9" "!8SWI.9^" "xV4z*>#5" } hash "<8K22oJJ" with-interface Fd:6c:FA via-port { "{Eya!^r}" ":+R{W:4%" "%*pPgWF" "OR48bQGf" "1<}L[-r*" "X8?ntxcn" "u@s}<65M" "jRRI*o&#" } id all-of { eCE0:7baC 1EEd:aEBC } serial "Y=NJg9wI" parent-hash "X:;ybhwQ" hash "|mal.Sx&" via-port equals { "$_si#$^F" "sUaA>WLa3[z" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name "rEsKUes`" if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name "u/VVdX-}"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name "$:VLVUt1" hash "F2=1BmK#" parent-hash equals-ordered { "`0tMM5yI" "M82GhsG8" } with-interface 9D:ae:8b id equals-ordered { EbAf:* 6438:* b7BF:* 817f:f85d } via-port none-of { "*/!PBa&a" "&|BQ?*5x" } if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name ", W+>V+[" serial ";TRd,dg5"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject name { "X5Rn6eh4" "GC8|#lQr" } with-interface { Ad:9a:* } hash "|G" "_PzgYs6*" "STeHy+rkdJ!" "3Q+qNz5w" "w`aG'\''GI " "_-mIGw&." "n0;W1OF;" "b^M,y&qH" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "0r_<@7i9" hash "1CV'\''OF~j" serial "d:ED>o!~"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "2wNrRzr6" serial "!>#bDOH}" id 1FEE:* via-port all-of { "ShfwRw0q" "3GG#ehwQ" "B- :G'\''E." "k_1]w1N^" } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "_7ZLxB6G" name "7WCR'\''X3y" hash equals { "@!=xWS7;" "`@{plKR|" "TVmxF59U" "*G359Ie*" "?s>qMjR{" "W|}.YuFC" "fVHHkcVn" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "8t_CM>e^" with-interface fd:a3:7a serial { "Y;g+x~Mv" "4ZR6l?%4" "Lm4HGQNF" "{K[@b]SI" "QZp[3dMc" "Vu:m32:," "%*z5}OX" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash all-of { "P7]c0nNX" "3_&^#yEJ" } id f95f:50B3 name { "!LhZc2*;" "}T6nb%,[" } hash one-of { "lT^&hCCJ" "xrQ|dVvY1deR" id EA9f:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash equals { "=9b|uzS&" } hash "; G~.kY>" id { 27EA:88a8 b64B:* 7cD2:* 1F8f:67a5 } via-port { "PLh*QJxq" "Ie Lx3Bl" "pE}F,+&:" "M=7Ybu[}" "o/2j4D[1" "]Nxs]%/=" "Y4wX:AJG" } name "Kvvv/@aZ" serial "OTo[nEQG" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash equals-ordered { "bOV/%R Y" "A4e6 Aw-" } id { e037:29cC fD17:9676 } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash equals { "oSq:n=w>" "f4r1=muK" "!K~XvSkO" "G^BHQRy " "Jg}IBh,g" "YLEJQAx5" } serial "3bLc{.ws" with-interface ba:8A:3d hash "+>YsE`n$" name "m>1hCH;*" via-port "Zu[~8Dp_" if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash { "GOz5^lET" "^ D;G9;o" "i^b_jYaK" } id 2d0B:* name { "AO#w:4+@" "XqQ-a>Tb" "16j||Q@f" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash { "H`HFW+Bq" "ld@SlY?7" } name equals { "&D9h-rx]" "I|w]WM!c" "D67/_fad" "ltD`@Z_EPLEx" id e776:b4de via-port "X=Z$q9QL" hash "d'\''K6!i9k" with-interface equals-ordered { B5:8a:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "~N%%gcbm" via-port "sO3#EYB-" serial all-of { "@B#>.>i_" "I+=9jDe2" } name "QV,I&YBX" id 8fD6:bB51 if random(0.4)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash none-of { "=Gi[ M/H" } name { "<=%@z<8V" "SQ|DTt3Q" } serial none-of { "L cRz#a;" "+m`@ 1mE" "J.x0CTY6" "|w+9T]cW" "0e%t27<~" "W1TH{=>d" "1AuYe@#T" } id equals-ordered { bfAb:* a4Fc:DEDD 26b0:9B0B } if none-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "N|ZSy3;C" with-interface { 2D:eB:aC 69:*:* Da:*:* e1:*:* 8A:6d:* 37:Ca:1f 58:D4:D1 a6:*:* } via-port "$;E_qiz~" name "CCAi7r,%"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash one-of { "J<$/a@lJ" "A2!r,IcW" "iyueSV0-" "P[MnB.!C" } hash "uUf0 z!k" serial all-of { "aA_A 7Y;" "1I*^KP'\''2" "1}yHe*@C" "v,Q|Du!v" "4|:$N$Pk" "Wj.W>4R," "}Jm5-dyo" } via-port none-of { "iZt@2Hu4" "XD4RoDKv" "VC&?CMr_" "e]deW#?c" "pyrMs&Tj" "+Gr{LmeV" "=VO,.SD1" } id all-of { CB9E:aa15 dAFd:* 3D0f:da06 8a84:a0AC 702E:0e84 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash ",OW@B=j+" with-interface 6c:6C:e4 hash "GWjH-J~~" serial "6T;9}=:3" name { "bS8ZZF$c" } via-port "QD_,gF5K" id Ced9:80A9' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash { "P3c+rNLA" "%R176MB/" "M8b${|e~" "[[,mRM.s" "k|=QPF8'\''" "[[t?Vs}N" "}iEf8Y`A" "ezL~@?TT" } hash { "*b@P!A,8" "42?I^aRJ" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "Qt 6lmKA" hash "*<{Bo}+@" serial "O#BcnMLa" with-interface 04:c8:* if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "?@sIZG]s" serial "9j$ed:J^" if all-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash { "s&wl/vew" "ti:p;+U<" "]+<_5~O*" "GCsP9^-a" "iN@5d]S2" } hash one-of { "[,PrhA#Tfe>Kn"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash "tU/{gC,%" with-interface 50:*:* via-port "ZwF!e#Vv" hash all-of { "w1uq;#&e" "{Go-91~N" "XgqIqSt<" "Ob2Ja#Pw" "mpt8^~YW" "2|w}^!I," " WmzvZK3" "e'\'''\''=/>,e" } if equals { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash { "XPQ&H?/i" "4$0A}vu@" "-*'\''+,D`L" "UXt:R^PY" "nBZE_w!j" } name one-of { "J{TnYcN$" } serial none-of { "R'\''B]U?N_" } via-port all-of { "j!m}'\''mlg" "@Q[199]*" ".^&m|fFL" ";k`UMvqo" "5|m.2>S%" } with-interface bB:*:* if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject parent-hash { "xpt85li4" "5MbYU}#<" "fc'\''Lt|X:" "~#|7%brx" "9dubX5me" "7k|=2Udt" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "3*!TVEF." name { "=1tabA0C" "7]GQXA+G" "GOU$@B>?" "&&UpmWWP" "*mwY!8T2" "!xV1|PH=" "uma={s!9I2S_" id one-of { 4cBE:0AeA 8A63:4f7b 4204:1f52 CcB4:2bc0 56f3:* fa3b:65dA } via-port { "H,EGcl=1" ".}2_5+ru" "Mp7ZYx}'\''" "cD0{q*1O" "eaGU"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "&4WC`L,g" name { "/u*lF3x+" "F'\''*6ZwZ~" "v`CLYgAq" "69}NC][]" ">US,9#n_" } parent-hash { "aPaU$#JJ" } with-interface { 1d:*:* 5F:3c:5b B6:d0:27 FF:eC:* C4:01:* CA:03:* 9e:d5:* f9:b4:* } hash { "Dj!q$aWH" "_Z^*&PkM" "Q68'\''a-PF" "h2y&o5.R" "f%Q7uFmY" } via-port { ">eqF'\''4zV" } id none-of { 3C9f:* } if none-of { true false !true false }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial { "4wu05cpJ" "&_w*2 =" "XcoX}[6S" "?v$E?48'\''" "kt[C*+G?" "]*/IY62," }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial { "7xIHQ&6k" "dkp95tZ>" } name "vxgJF1`8" with-interface { Cd:*:* } parent-hash "+K'\''Pc;v0" via-port { "$0=*6 1B" "a5GZ[]m!" "g?+vIX1T" "a3EEY'\''RX" ",$Wd<{g'\''" "$fP.:VqR" "z/;VL0Oy" "S|5qpw|E" } if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "7*z'\''Z'\''&G" via-port { "ab_6Y['\''}" "`8DE#Sni" "{eGE-8,o" "]umndJTy" "T_m!{eu~" } hash "dv01sV`4" name equals-ordered { "D=Kb&V8E" "3qbhv7:D" "qsKb3Q=v" "v3I,4_Bb" } id all-of { 85C3:Af6c c0ac:B772 6CAB:* } with-interface all-of { 20:*:* Dd:02:fF A1:ec:Fc d3:43:2d }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "8NBn[Z5X" via-port "A[mPm{T?" with-interface { df:*:* 8E:46:* } hash "XaG2$9dw" name "O-~qONma" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "}9X:0,AO" hash equals { "?Rkyb7Gj" "`rdVxIPH" "!psLZYri" ",O'\''Dt]A2" "{x13ogap" } name none-of { "z.K9x_5t" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial all-of { "6wUEMpXb" "jg]qSe*C" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial equals { "8q*wl_7;" "#?Cz25l>" ",xX2#>^7|" name "C!&FSf[[" id one-of { 21E2:* 49fF:5365 ff8B:3B40 bF63:c127 F4b2:* } hash { "h.JdhBxY" "@Ao/K1WI" "0ZeybeL+" "`C6:E>k^" } parent-hash "~lhRb8yO"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial equals-ordered { "QyXLGQ[F" "G,5>pfG7" "-abZ?fQ&" "d5]{bX|!" } via-port one-of { ".SZx$,lo" "9ULx%gd/" } with-interface 39:*:* hash "e^1EyKo-" } hash none-of { "!>U%:4vW" "OrTvY# #" "-siS+*AY" "PHUKiMtB" "tQ~pe{8}" "W|*vBwhf" "TJP?D9LH" } name equals { "Q%xmbV44" "nD%v>O`&" "BM$RWJtk" "d?K~f'\''GX" "jiA6lJ&Y" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial equals { "YBM#3e+Y" "LW&++&`]" "6S0iF7d}" "Bn+QD_p>" "8GrJ'\''TDw" } id { dcb6:9e73 dEca:9a81 fbEe:* 3F7c:89fD eE3F:93b7 } parent-hash all-of { "qM^t^MMI" } if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial equals { "zYPQUS,t" ",8s@iV[+" "zv=|Ibee" "]wy @V@>" "ABe5y;Ne" } hash "&2S4+h7x" name "zg'\''o? l`" with-interface none-of { 11:*:* De:63:* bF:2C:88 bE:*:* e0:16:E6 67:F0:eC } parent-hash { "mLui`B66" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial { "gXw/X>[Y" "j9NZiw 8" "bUuO>jOj" "%iY-U`j." "9:MoaC@T" "yM;^e&8e" "cB31QIrY" "B8@K" } hash equals { "9KbK7 n9" "7^Y}y[zC" "$~b2VKV6" "p5?:2;6^" "-E%Y/xS<" "gn& OydI" } id 0218:5aD0 with-interface equals-ordered { A1:FC:A7 b2:*:* } parent-hash { "{0d /DeV" "^M0h8rW+" } via-port "4|l" id Cc6C:* name ";F" "u&YS8Kp{" "eiqI#P{}" "ckmD~,eL" "b@BoOd16" "w`xS]Shd" } name { "]$6n&V}'\''" "e0ZX%H%n" "?w.GsXnD" "+@'\''hG y]" } via-port { "ooyc-XxV" "Ijg& $qk" "4yy K%Dd" } id d6Ed:E850 if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "NU/;XmN<" hash "kcA,v-`r" name "L?Mjqz5*" if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial one-of { "q%A%e6}A" "8j1jmnsY" "h_'\'']MvKa" "Bj:D]^Z " } with-interface equals-ordered { b7:d2:dF } hash "Xte%iyb3" id one-of { bB8e:* d6cE:* a3B1:4aeB e3Dc:caBe A40D:* c828:* } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "qm4,tfTk" name equals { "{cidNdy#" "^{W:5f$j" "zDsd@" "s#qz,9" parent-hash "qix@~0oi"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "T7,F{/K/" name { "$V.[Az2C" ":2#a14H5" } hash { "f` >1Q/t" "+KS4`]@k" "[Q0VLrbo" "=GiN1}@N" "}-ZQIC8W" "q4xXjc$T" "}L_Lm_v6" "p=ETrlQ6" } via-port none-of { "&2k,G}2d" "I].&A+rN" } id 6AA2:* parent-hash { "OYDuGi8^" } with-interface 50:*:* if true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "'\''Te}9S.5" if localtime(1:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial { "ULk+s2#t" ">H*AHgXC" "J]?wS*F_" "D`vhu%Uh" } parent-hash { "9KJ8-A*r" "01,=@zx^" "R$_Y}'\''e3" "{*^-a7hv" "xV,g2RF2" "830f-Hdp" } hash "mJSqiT#;" if !localtime(2:00)' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject serial "UTk+Sla]" id DDF9:* via-port one-of { "M; ^=6Yc" " S|~g'\''1|" "0AKvgTcS" "fMzh8C#`" "uulT'\''}rx" "&Er" "n:w/i.N8" } name "|NzS@zhj" id aE53:91ca serial { "u4qBeA%N" "@}WuVN-E" "=8w.|e?g" "$];{w#1d" "&m:dk0OJ" "{[=b}%2h" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "&6;Lp3Jr" hash { "19ue7ppW" "jPm_E9u[" "XHXbAQfh" } id 74Af:* name "#w%^nM29" serial "GGc-*I#H" if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "?7c*ChM~" hash { "#mcn/L%|" "#+R}c0_2" "BDDM6n|;" "@^|+S T1" "wF4#0qg/" "3]m?w!@4" } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port all-of { "K0VqF+Gb" "3pC` uiR" "J9oQv@xj" "@a~]k`Bs" "L4p=hK,W" "v<^_@9pj" "0Qf!kw>O" "XL,e|w29" } serial "c@Mv@072" name equals { "QtCJ@G1X" "v%Zz];Nk" "OgDAzb;f" "QCD20FZf" "3Kc$hF`v" "V5eASmy`" "7[@?=n'\''1" "`8pM6g=2" } parent-hash "Y<./hNbL" hash { "0oAp/FC," "^B {c<9S" "QCZmbegC" "6V4Yqg;p" } id 29F2:* with-interface BC:*:* if random' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port all-of { "$xiRRuA0" "ucED~8D~" "5!3@6d/;" "A1G?#D%x" "_><84;Od" "L~|hS{ie" "Sbr{v=!h" } name { "PQ+BpVq3" "U+EGir[X" "tQqCvPJZ" "-@Wl6^2t" "e#EQ;%;V" "{6:06@~?" } serial "&IRo@|4y" id 73fA:* with-interface fC:02:Ba' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "bD8Rd4h3" id FbB6:CFC2 with-interface { Df:F2:* c1:ca:* C9:dd:* F0:*:* aE:D8:* 3f:F2:cc } name { "BD]@?>Pe" "y06|$chx" "j5bwMTxB" "QxyDi6}7" "XOhlCYXh" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "bGnHdw]w" hash "k$'\''d~z6n"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port equals-ordered { "&=xQv@>T" } name "G:OIHDL%"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port equals { "RcN0%qdv" "wL/s -2j" "m|pNyWw/" } serial " UhO;hcr" name "'\''a}h{Bq|" parent-hash one-of { "UMR~^Q%8" "{43&ERq@" "_v>]YJ>^" "RL$N9DPe" "ln;dlnX " "L~<]0Pt$" "5[d_kiJ0" "N8^t'\''%$J" } hash all-of { "y]8T!ZjI" "v/_QaO9g" "BmEU$o6g" "8luhi=k{" } if !true' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port { "%G]q99,m" "pS QkiA/" "Pw#,[*Jl" "t]/CPH.7" } hash { "K@Xx7_.6" } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "HXNGe!~r" } name { "X[O61%i*" "}m?t*CL," } serial "&pwE EB3" hash "&VndDS!C"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port { ":i0cIL'\''M" "*@I 6*m~" "yzmdhl,~" "~b!M|JFN" "l}k>O#<9" "Ir,692JX" } id all-of { 82C4:* } with-interface 12:2a:* parent-hash one-of { "rX_x8`=H" } name { "7WWdHd@." "*+BkA*_G" "[Qjw3%ke" "RBF;Ct9y" } hash "}Jss8/:[" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "I;9@" "RI=H7cEL" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port { "Kz#>Y7h&" "1H;f+x0J" "9yfE/aP?" "SVO/1vE'\''" "Dp>`bvY^" "HdZ=b8AR" } with-interface { df:59:* cb:C6:* fd:*:* bd:ee:15 F2:1b:77 5a:Ab:* d1:DD:69 00:dF:* } id equals { 9F95:979d } serial { "W,#1v9^L" "dK=I5w2~" "Xh51tX#Z" "W|SO^7p+" "q/$9M`&3" "L0egqhkc" "Q;ZhaO L" "1VT@_3+-" } name equals { "sLC_IeZ0" "uyDl3!'\''%" "Sj@8b~$X" "EXW*!-Kd" "_u8tM{0<" } parent-hash "W]_P!+7-" hash { "@2[K+BQL" " @/-L'\''=@" "A61T0=U4" "=_lLts/{" "XNSHKWn'\''" "|a{tACCh" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port { "lGGya;4 " "&O}+H*?3" ";zFFN-" hash "N{:t^rC~" id { bE28:* A1aa:* Cbc1:6130 5EB9:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port none-of { "5Z|q{oD " "TIp&-R+I" "*j0:mqm{" "n[PSiWbK" "mh=#eyiR" "+rg&18WP" "}!oMK,tm" } hash "Yt]2`N1~" parent-hash "atg,JQY-" serial "uBEk@%#+" name "O*9.A-AW" with-interface equals { fC:D4:* 75:ee:05 93:*:* Ca:AA:BF 55:F8:7f 89:B3:* C4:0E:* }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port none-of { "6$%l,XTW" "=9|vn?v<" "|G|z!gN," } hash { "PU$$Ze3@" "C!:Bp,Vy" "'\'''\''@1lTHi" "1fdP-c<6" } id equals-ordered { 67b6:* aCfA:* edD3:* eB7c:f594 E08c:* 9B0F:* 667F:Fe05 } parent-hash { "bcLD0MZC" "wI>f;$" "eEZGDHwf" "4Q3sUS++" "wY,SpD,k" "Z}-o#?8r" "L0k}},Q`" } serial equals { "WeyWk$wd" "k3qK9#tf" "f.PzwCh1" } name none-of { "6/R~QS1A" "TC3J&| g" "BAXF!1H:" "ETwE?L4K" "a,XQ@mS5" "*M40BIUR" "]EU19Gp6" } with-interface equals-ordered { f0:6d:* EC:56:bC fF:90:* Bf:80:* 1F:e5:bb ce:*:* b7:72:* } if !false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "[nV2,'\''_]" name equals { "Giz|X=bX" "N`*1%<6c>" "4_Eo@!%4" } parent-hash one-of { "jx>bd$fq" "v'\''Mgl~j#" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port { "Xb," "A4v9y81 " "kL!93cbP" "ZEft4UJ>" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "^q- .QhX" with-interface 9c:d3:52 name ">HR2>{#>" id { 524D:E4DA 9235:* 342d:* dFf8:dC1C b0a5:a3F6 52c2:* bDB6:* } parent-hash "VCxji7#0" serial ".-O35PI~" hash { "H/:8rNSr" "b=J@*vm%" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "Q$q*" } name "fRz5|x=$"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject via-port "vh BXA=^`7" "ps4dan9w" "dH>d%U9K" } parent-hash none-of { "tJqRQ3bn" "dlw=m3u|" "n6$r?u]e" "bV9Q?EH]" ">FA" "s6+S2%l5" "E3pv/;BY" } via-port "*5:v~5i9" id one-of { 2C15:8aca E1d0:* 8e8f:eBAf } if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface 11:*:* via-port "F>dN9k8u" id dd04:* serial equals-ordered { "8ceTmi`L" "U@?w]Bp&" } name equals { ">,7DlJUZ" "xg:B;try" "QnHe$K>[" "tq@1&:ZQ" "2bd6T5$R" "$hPfMM]-" } hash all-of { "bc&kA?os" "|ZYtEw{u" } parent-hash one-of { "2U=YXA{:" "c:Tm_#2S" "}z!w'\''1B/" "4ul%Cwk-" "O3>fc]{}" "v[m1e-Jh" " $|!r<:0" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface 26:9E:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface { 2a:08:04 f3:Da:* 75:*:* a5:99:Eb BF:62:5D } parent-hash "J-Okz#D8" name "[hEk%Lx@" serial { "&4Q_y:/T" "*4!n.F}n" "7he9Ds7-" "X-Q.5$Ex" "3G@Y~qU?" "MnBe" serial ".qUztFD?"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface 5d:*:* via-port "~E5V%!;e" if rule-applied' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface { 61:*:* 05:*:* } hash equals-ordered { "pqA>L{h/" "waG&}3`T" "y?>'\''tXXX" ".8 R}D4V" } parent-hash one-of { "zse-_#V7" "@J5SFAYW" "LD$|4E h" "xO :4mfF" "9O7SIM@'\''" } id { 9ACC:* 5A63:* } via-port all-of { "V7U8B7{>" "wVJhb+ w" } name { "cGx&|$|E" "fn?$,61e" } serial "U|~BC`7z"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface { a1:*:* 03:3E:* d5:4C:* A0:1A:dD } id D0FF:E036 hash ",ILd,|,2" parent-hash "IdwSC*:W" via-port equals { "EQz-_|Vs" } serial { ",$m4~]*8" "LQ,IDL~3" "H/=1CmFZ" "DGnkBUU1" "@}mYr2O#" } name "Cyd!Va`b" if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface aB:eF:c3 name "-w,Mcb$^" serial none-of { "X@%WOcGi" "UOz'\''%$kH" "4&4R.P`N" "N:Eq gX&" "O$^a$LeWOnXgR" } hash "0URbo;UI" if false' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface c0:*:* id { 20Bc:* ddD2:0221 b26F:8AcF 5E66:* aEa2:FEe2 } serial { "`xT6]S2'\''" "f$v;>cT8" "fPhC>4vl" "a.Me#7j^" } via-port "UUj@H.3r" hash { " ?n6!6k/" "Z>{_S%GH" } parent-hash "*CKflJ>`" name none-of { "^$~7=7Lw" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface CA:FF:*' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface cC:e7:BE hash "qRY/7Nrk" id equals-ordered { BcdA:2171 898c:735D c70A:6aC8 aC5A:* } name { "UmIo`9:u" "PqvByT+l" "Q~s-+B6&" "|QY3b4ba" ",w&!Pk&-" } parent-hash "m&yOwhm+" serial all-of { "!7+ql}$F" "aU>u uoT" "dW9fQg&<" "!sZ.wN0L" ",bxT.~h<" "8I~,f q=" "iZ2^XbSk" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface { CD:fE:* d5:6f:* } id { bCbF:* c04C:* DF52:Feeb Ec12:45De } serial equals-ordered { "U$@AJ5T^" "]CEwaZm1" "_#>'\''L8@3" } hash one-of { "obCl_1h*" "e|~iGd5I" "UkIf]O<@" "Uc;vK3W&" "XkVv'\''Kx!" "M'\''9Xp:kk" } parent-hash { "PmRYV5yf" "b1ae]ZLS" "<*#65Evo" "TJr#Z@&q" "K*uZHI,E" "^^6pBx3+" "cB~uUU>~" "L^U4+mV8" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface { cE:6E:4D 8D:27:* 48:a5:* 4A:22:18 } hash "QO*BIH-E" via-port "YO[Rxo1n"' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface d6:75:* serial "K6qOwgW0" name one-of { "nqK$62cR" }' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface d6:*:* id 4320:* name "+@rSM,?:," "rwM*Ex|j" } id one-of { 028c:7202 B82E:* } if rule-evaluated' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface equals { E6:4c:* 4F:8F:24 A8:c1:C8 5e:eB:Fb ED:*:* A1:3d:* fA:*:* } hash "rJjT-`yo" id 26a5:0e6F' Step #3 - "compile-libfuzzer-coverage-x86_64": + read -r line Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'reject with-interface none-of { C8:3C:* 4b:*:* 5c:2e:4c 7f:*:* BA:F7:* d3:4D:cb } parent-hash none-of { ":m_H'\''h`:" } id all-of { ADc6:* 332d:* } via-port equals-ordered { "vHE?ZN;x" "Ga:kiC`N" "PlOjBwj0" } name "GQu