starting build "cde6219d-3ba3-48e4-9c86-916987eb1677" FETCHSOURCE BUILD Starting Step #0 Step #0: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #0: Using default tag: latest Step #0: latest: Pulling from oss-fuzz-base/base-runner Step #0: b549f31133a9: Pulling fs layer Step #0: 30aaeaadad69: Pulling fs layer Step #0: ab7f52187e31: Pulling fs layer Step #0: 289e383ccbcb: Pulling fs layer Step #0: ae3c8c5f880d: Pulling fs layer Step #0: 1b8983a83bd0: Pulling fs layer Step #0: f2bfa7a2dc1f: Pulling fs layer Step #0: d67283b778df: Pulling fs layer Step #0: d2843e55834f: Pulling fs layer Step #0: 56bfad0750c4: Pulling fs layer Step #0: 75ba15266c4f: Pulling fs layer Step #0: 38156a82711d: Pulling fs layer Step #0: 683a9b052710: Pulling fs layer Step #0: a8ecbf7824fe: Pulling fs layer Step #0: f3d95dc02b50: Pulling fs layer Step #0: 0e9230171267: Pulling fs layer Step #0: f6c0298b87aa: Pulling fs layer Step #0: 07381e005f25: Pulling fs layer Step #0: 82cd39ee2f69: Pulling fs layer Step #0: ffc52c88e239: Pulling fs layer Step #0: 3f5eb5e5dac0: Pulling fs layer Step #0: 28e118ff4714: Pulling fs layer Step #0: fabddd3a998b: Pulling fs layer Step #0: 38d78a24bf87: Pulling fs layer Step #0: cfdec0b4249f: Pulling fs layer Step #0: 68f98e23d401: Pulling fs layer Step #0: ae3c8c5f880d: Waiting Step #0: 1b8983a83bd0: Waiting Step #0: 07381e005f25: Waiting Step #0: f2bfa7a2dc1f: Waiting Step #0: 82cd39ee2f69: Waiting Step #0: ffc52c88e239: Waiting Step #0: d67283b778df: Waiting Step #0: cfdec0b4249f: Waiting Step #0: d2843e55834f: Waiting Step #0: 68f98e23d401: Waiting Step #0: 56bfad0750c4: Waiting Step #0: 28e118ff4714: Waiting Step #0: fabddd3a998b: Waiting Step #0: 75ba15266c4f: Waiting Step #0: 38d78a24bf87: Waiting Step #0: 38156a82711d: Waiting Step #0: 289e383ccbcb: Waiting Step #0: 0e9230171267: Waiting Step #0: a8ecbf7824fe: Waiting Step #0: f3d95dc02b50: Waiting Step #0: f6c0298b87aa: Waiting Step #0: 683a9b052710: Waiting Step #0: ab7f52187e31: Verifying Checksum Step #0: ab7f52187e31: Download complete Step #0: 289e383ccbcb: Download complete Step #0: b549f31133a9: Verifying Checksum Step #0: b549f31133a9: Download complete Step #0: 1b8983a83bd0: Verifying Checksum Step #0: 1b8983a83bd0: Download complete Step #0: ae3c8c5f880d: Verifying Checksum Step #0: ae3c8c5f880d: Download complete Step #0: d67283b778df: Verifying Checksum Step #0: d67283b778df: Download complete Step #0: f2bfa7a2dc1f: Verifying Checksum Step #0: f2bfa7a2dc1f: Download complete Step #0: 56bfad0750c4: Verifying Checksum Step #0: 56bfad0750c4: Download complete Step #0: 30aaeaadad69: Verifying Checksum Step #0: 30aaeaadad69: Download complete Step #0: 75ba15266c4f: Download complete Step #0: 38156a82711d: Verifying Checksum Step #0: 38156a82711d: Download complete Step #0: a8ecbf7824fe: Verifying Checksum Step #0: a8ecbf7824fe: Download complete Step #0: b549f31133a9: Pull complete Step #0: d2843e55834f: Verifying Checksum Step #0: d2843e55834f: Download complete Step #0: f3d95dc02b50: Verifying Checksum Step #0: f3d95dc02b50: Download complete Step #0: 0e9230171267: Verifying Checksum Step #0: 0e9230171267: Download complete Step #0: 683a9b052710: Verifying Checksum Step #0: 683a9b052710: Download complete Step #0: 07381e005f25: Download complete Step #0: f6c0298b87aa: Verifying Checksum Step #0: f6c0298b87aa: Download complete Step #0: ffc52c88e239: Verifying Checksum Step #0: ffc52c88e239: Download complete Step #0: 3f5eb5e5dac0: Verifying Checksum Step #0: 3f5eb5e5dac0: Download complete Step #0: 28e118ff4714: Verifying Checksum Step #0: 28e118ff4714: Download complete Step #0: fabddd3a998b: Verifying Checksum Step #0: fabddd3a998b: Download complete Step #0: 38d78a24bf87: Verifying Checksum Step #0: 38d78a24bf87: Download complete Step #0: 82cd39ee2f69: Verifying Checksum Step #0: 82cd39ee2f69: Download complete Step #0: cfdec0b4249f: Verifying Checksum Step #0: cfdec0b4249f: Download complete Step #0: 68f98e23d401: Verifying Checksum Step #0: 68f98e23d401: Download complete Step #0: 30aaeaadad69: Pull complete Step #0: ab7f52187e31: Pull complete Step #0: 289e383ccbcb: Pull complete Step #0: ae3c8c5f880d: Pull complete Step #0: 1b8983a83bd0: Pull complete Step #0: f2bfa7a2dc1f: Pull complete Step #0: d67283b778df: Pull complete Step #0: d2843e55834f: Pull complete Step #0: 56bfad0750c4: Pull complete Step #0: 75ba15266c4f: Pull complete Step #0: 38156a82711d: Pull complete Step #0: 683a9b052710: Pull complete Step #0: a8ecbf7824fe: Pull complete Step #0: f3d95dc02b50: Pull complete Step #0: 0e9230171267: Pull complete Step #0: f6c0298b87aa: Pull complete Step #0: 07381e005f25: Pull complete Step #0: 82cd39ee2f69: Pull complete Step #0: ffc52c88e239: Pull complete Step #0: 3f5eb5e5dac0: Pull complete Step #0: 28e118ff4714: Pull complete Step #0: fabddd3a998b: Pull complete Step #0: 38d78a24bf87: Pull complete Step #0: cfdec0b4249f: Pull complete Step #0: 68f98e23d401: Pull complete Step #0: Digest: sha256:694c457afc6cd67787d316dfeeb0ec448bb0f6eed13b099e76fbe8febbc34f17 Step #0: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #0: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #1: Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_client.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_dtlsclient.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_dtlsserver.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_pkcs7.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_privkey.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_pubkey.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_server.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_x509crl.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_x509crt.covreport... Step #1: / [0/20 files][ 0.0 B/ 12.3 MiB] 0% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/fuzz_x509csr.covreport... Step #1: / [0/20 files][264.0 KiB/ 12.3 MiB] 2% Done / [1/20 files][876.1 KiB/ 12.3 MiB] 6% Done / [2/20 files][ 1015 KiB/ 12.3 MiB] 8% Done / [3/20 files][ 4.3 MiB/ 12.3 MiB] 35% Done / [4/20 files][ 5.4 MiB/ 12.3 MiB] 43% Done / [5/20 files][ 5.6 MiB/ 12.3 MiB] 45% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_client.covreport... Step #1: / [5/20 files][ 5.6 MiB/ 12.3 MiB] 45% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_dtlsclient.covreport... Step #1: / [5/20 files][ 5.6 MiB/ 12.3 MiB] 45% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_dtlsserver.covreport... Step #1: / [5/20 files][ 5.6 MiB/ 12.3 MiB] 45% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_pubkey.covreport... Step #1: / [5/20 files][ 6.0 MiB/ 12.3 MiB] 49% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_pkcs7.covreport... Step #1: / [5/20 files][ 6.0 MiB/ 12.3 MiB] 49% Done / [6/20 files][ 6.0 MiB/ 12.3 MiB] 49% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_privkey.covreport... Step #1: / [6/20 files][ 6.0 MiB/ 12.3 MiB] 49% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_server.covreport... Step #1: / [6/20 files][ 6.0 MiB/ 12.3 MiB] 49% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_x509crl.covreport... Step #1: / [6/20 files][ 6.3 MiB/ 12.3 MiB] 51% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_x509crt.covreport... Step #1: / [6/20 files][ 6.6 MiB/ 12.3 MiB] 53% Done Copying gs://oss-fuzz-coverage/mbedtls/textcov_reports/20250723/usepsa-fuzz_x509csr.covreport... Step #1: / [6/20 files][ 7.1 MiB/ 12.3 MiB] 57% Done / [7/20 files][ 7.1 MiB/ 12.3 MiB] 57% Done / [8/20 files][ 8.8 MiB/ 12.3 MiB] 72% Done / [9/20 files][ 9.5 MiB/ 12.3 MiB] 77% Done / [10/20 files][ 9.6 MiB/ 12.3 MiB] 78% Done / [11/20 files][ 10.2 MiB/ 12.3 MiB] 82% Done / [12/20 files][ 10.4 MiB/ 12.3 MiB] 84% Done / [13/20 files][ 10.5 MiB/ 12.3 MiB] 85% Done / [14/20 files][ 10.7 MiB/ 12.3 MiB] 87% Done / [15/20 files][ 10.9 MiB/ 12.3 MiB] 88% Done / [16/20 files][ 11.1 MiB/ 12.3 MiB] 90% Done / [17/20 files][ 11.4 MiB/ 12.3 MiB] 92% Done / [18/20 files][ 11.6 MiB/ 12.3 MiB] 94% Done / [19/20 files][ 12.3 MiB/ 12.3 MiB] 99% Done / [20/20 files][ 12.3 MiB/ 12.3 MiB] 100% Done Step #1: Operation completed over 20 objects/12.3 MiB. Finished Step #1 Starting Step #2 Step #2: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #2: total 12620 Step #2: -rw-r--r-- 1 root root 897096 Jul 23 10:15 fuzz_client.covreport Step #2: -rw-r--r-- 1 root root 143205 Jul 23 10:15 fuzz_pkcs7.covreport Step #2: -rw-r--r-- 1 root root 2930323 Jul 23 10:15 fuzz_dtlsclient.covreport Step #2: -rw-r--r-- 1 root root 849595 Jul 23 10:15 fuzz_privkey.covreport Step #2: -rw-r--r-- 1 root root 1028943 Jul 23 10:15 fuzz_dtlsserver.covreport Step #2: -rw-r--r-- 1 root root 499267 Jul 23 10:15 fuzz_pubkey.covreport Step #2: -rw-r--r-- 1 root root 794793 Jul 23 10:15 fuzz_x509crt.covreport Step #2: -rw-r--r-- 1 root root 2134241 Jul 23 10:15 fuzz_server.covreport Step #2: -rw-r--r-- 1 root root 651137 Jul 23 10:15 fuzz_x509csr.covreport Step #2: -rw-r--r-- 1 root root 185617 Jul 23 10:15 fuzz_x509crl.covreport Step #2: -rw-r--r-- 1 root root 552382 Jul 23 10:15 usepsa-fuzz_dtlsclient.covreport Step #2: -rw-r--r-- 1 root root 207705 Jul 23 10:15 usepsa-fuzz_privkey.covreport Step #2: -rw-r--r-- 1 root root 143186 Jul 23 10:15 usepsa-fuzz_pkcs7.covreport Step #2: -rw-r--r-- 1 root root 242371 Jul 23 10:15 usepsa-fuzz_dtlsserver.covreport Step #2: -rw-r--r-- 1 root root 207414 Jul 23 10:15 usepsa-fuzz_pubkey.covreport Step #2: -rw-r--r-- 1 root root 204238 Jul 23 10:15 usepsa-fuzz_x509crl.covreport Step #2: -rw-r--r-- 1 root root 245420 Jul 23 10:15 usepsa-fuzz_server.covreport Step #2: -rw-r--r-- 1 root root 204792 Jul 23 10:15 usepsa-fuzz_x509csr.covreport Step #2: -rw-r--r-- 1 root root 205680 Jul 23 10:15 usepsa-fuzz_x509crt.covreport Step #2: -rw-r--r-- 1 root root 557536 Jul 23 10:15 usepsa-fuzz_client.covreport Finished Step #2 Starting Step #3 Step #3: Already have image (with digest): gcr.io/cloud-builders/git Step #3: Cloning into 'oss-fuzz'... Finished Step #3 Starting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322" Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Sending build context to Docker daemon 9.728kB Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 1/10 : FROM gcr.io/oss-fuzz-base/base-builder Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": latest: Pulling from oss-fuzz-base/base-builder Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": b549f31133a9: Already exists Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 30aaeaadad69: Already exists Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ab7f52187e31: Already exists Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": e504bbe9893a: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0a6eb66e412a: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 32d3affaeea4: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 35e8843c123a: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4b6c7aa2e5d1: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 66c80ade3738: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 23aed1781d70: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": c6c62d1ff1ef: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b1f775bfdce: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 83cc8c38ffff: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b15116a22de: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f0b34cdeb9b: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d31c10307172: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 17e5f7713ecb: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3be6b23a1a1e: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6e7201bcc05c: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d8ebdfdbb3da: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7d9dd83ac02f: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9dc24824b77b: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": f360698291b2: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9df79967a947: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3b9c8de7357b: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6b3ba93dbd67: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1a34e1a3dced: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fa868e941de8: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 61284772a17f: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f4f9df598af: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 929de8ea86fe: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d59dabad1207: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7688036e4c4c: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0aa10b9074f9: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 83cc8c38ffff: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fb47f5474edd: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b15116a22de: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 105205f4845e: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 646f8ff5c8ee: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f0b34cdeb9b: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ce5cae8d6a8a: Pulling fs layer Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d31c10307172: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9dc24824b77b: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 17e5f7713ecb: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1a34e1a3dced: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": f360698291b2: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3be6b23a1a1e: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fa868e941de8: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9df79967a947: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 61284772a17f: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6e7201bcc05c: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f4f9df598af: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d8ebdfdbb3da: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3b9c8de7357b: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 929de8ea86fe: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7d9dd83ac02f: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6b3ba93dbd67: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d59dabad1207: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7688036e4c4c: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0aa10b9074f9: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fb47f5474edd: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": c6c62d1ff1ef: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 66c80ade3738: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 35e8843c123a: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b1f775bfdce: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 23aed1781d70: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 105205f4845e: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ce5cae8d6a8a: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 646f8ff5c8ee: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4b6c7aa2e5d1: Waiting Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 32d3affaeea4: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 32d3affaeea4: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0a6eb66e412a: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0a6eb66e412a: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4b6c7aa2e5d1: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4b6c7aa2e5d1: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": e504bbe9893a: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": e504bbe9893a: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 66c80ade3738: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 66c80ade3738: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": c6c62d1ff1ef: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": c6c62d1ff1ef: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b1f775bfdce: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b1f775bfdce: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 83cc8c38ffff: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 83cc8c38ffff: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": e504bbe9893a: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b15116a22de: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b15116a22de: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 23aed1781d70: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 23aed1781d70: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f0b34cdeb9b: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f0b34cdeb9b: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d31c10307172: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d31c10307172: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0a6eb66e412a: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 17e5f7713ecb: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 17e5f7713ecb: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 32d3affaeea4: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3be6b23a1a1e: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3be6b23a1a1e: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6e7201bcc05c: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6e7201bcc05c: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d8ebdfdbb3da: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d8ebdfdbb3da: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7d9dd83ac02f: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7d9dd83ac02f: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 35e8843c123a: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 35e8843c123a: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9dc24824b77b: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9dc24824b77b: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": f360698291b2: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": f360698291b2: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9df79967a947: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9df79967a947: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3b9c8de7357b: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3b9c8de7357b: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6b3ba93dbd67: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1a34e1a3dced: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fa868e941de8: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fa868e941de8: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 61284772a17f: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 61284772a17f: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 929de8ea86fe: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 929de8ea86fe: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f4f9df598af: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f4f9df598af: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d59dabad1207: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d59dabad1207: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7688036e4c4c: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7688036e4c4c: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0aa10b9074f9: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0aa10b9074f9: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fb47f5474edd: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fb47f5474edd: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 105205f4845e: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 105205f4845e: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ce5cae8d6a8a: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ce5cae8d6a8a: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 646f8ff5c8ee: Verifying Checksum Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 646f8ff5c8ee: Download complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 35e8843c123a: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4b6c7aa2e5d1: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 66c80ade3738: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 23aed1781d70: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": c6c62d1ff1ef: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b1f775bfdce: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 83cc8c38ffff: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1b15116a22de: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f0b34cdeb9b: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d31c10307172: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 17e5f7713ecb: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3be6b23a1a1e: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6e7201bcc05c: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d8ebdfdbb3da: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7d9dd83ac02f: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9dc24824b77b: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": f360698291b2: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 9df79967a947: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 3b9c8de7357b: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 6b3ba93dbd67: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 1a34e1a3dced: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fa868e941de8: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 61284772a17f: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 4f4f9df598af: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 929de8ea86fe: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": d59dabad1207: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 7688036e4c4c: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0aa10b9074f9: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": fb47f5474edd: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 105205f4845e: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 646f8ff5c8ee: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ce5cae8d6a8a: Pull complete Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Digest: sha256:e271a10812d3e7975d21d64e90088ce63c93f66678df24855b04d7d7e138affb Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 93d7ba6c057e Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 2/10 : RUN apt-get update && apt-get install -y make cmake Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in 75c10e23c6ec Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Fetched 383 kB in 1s (710 kB/s) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Reading package lists... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Reading package lists... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Building dependency tree... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Reading state information... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": make is already the newest version (4.2.1-1.2). Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": make set to manually installed. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": The following packages were automatically installed and are no longer required: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": autotools-dev libsigsegv2 m4 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Use 'apt autoremove' to remove them. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": The following additional packages will be installed: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Suggested packages: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": cmake-doc ninja-build lrzip Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": The following NEW packages will be installed: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Need to get 15.0 MB of archives. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": After this operation, 65.0 MB of additional disk space will be used. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.10 [640 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.5 [327 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": debconf: delaying package configuration, since apt-utils is not installed Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Fetched 15.0 MB in 0s (30.3 MB/s) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libicu66:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libxml2:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.10_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.10) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libuv1:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package cmake-data. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libarchive13:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.5_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.5) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libjsoncpp1:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package librhash0:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking librhash0:amd64 (1.3.9-1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package cmake. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up librhash0:amd64 (1.3.9-1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.10) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libarchive13:amd64 (3.4.0-2ubuntu1.5) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container 75c10e23c6ec Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 82231a423a64 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 3/10 : RUN apt-get update && apt-get install -y python-all-dev python3-all-dev python3-pip Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in 96731ce65fe3 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Hit:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Reading package lists... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Reading package lists... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Building dependency tree... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Reading state information... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": The following packages were automatically installed and are no longer required: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": autotools-dev libsigsegv2 m4 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Use 'apt autoremove' to remove them. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": The following additional packages will be installed: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": file libexpat1-dev libmagic-mgc libmagic1 libmpdec2 libpython-all-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython2-dev libpython2-stdlib libpython2.7 libpython2.7-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython2.7-minimal libpython2.7-stdlib libpython3-all-dev libpython3-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython3-stdlib libpython3.8 libpython3.8-dev libpython3.8-minimal Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython3.8-stdlib mime-support python-all python-pip-whl python2 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python2-dev python2-minimal python2.7 python2.7-dev python2.7-minimal Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3 python3-all python3-dev python3-distutils python3-lib2to3 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3-minimal python3-pkg-resources python3-setuptools python3-wheel Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3.8 python3.8-dev python3.8-minimal zlib1g-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Suggested packages: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python2-doc python-tk python2.7-doc binfmt-support python3-doc python3-tk Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3-venv python-setuptools-doc python3.8-venv python3.8-doc Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": The following NEW packages will be installed: Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": file libexpat1-dev libmagic-mgc libmagic1 libmpdec2 libpython-all-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython2-dev libpython2-stdlib libpython2.7 libpython2.7-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython2.7-minimal libpython2.7-stdlib libpython3-all-dev libpython3-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython3-stdlib libpython3.8 libpython3.8-dev libpython3.8-minimal Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": libpython3.8-stdlib mime-support python-all python-all-dev python-pip-whl Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python2 python2-dev python2-minimal python2.7 python2.7-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python2.7-minimal python3 python3-all python3-all-dev python3-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3-distutils python3-lib2to3 python3-minimal python3-pip Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3-pkg-resources python3-setuptools python3-wheel python3.8 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": python3.8-dev python3.8-minimal zlib1g-dev Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": 0 upgraded, 44 newly installed, 0 to remove and 0 not upgraded. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Need to get 21.9 MB of archives. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": After this operation, 95.5 MB of additional disk space will be used. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.18 [721 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.18 [1900 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.18 [1676 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.18 [387 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:10 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-minimal amd64 2.7.18-1~20.04.7 [336 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:11 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7-minimal amd64 2.7.18-1~20.04.7 [1278 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:12 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2-minimal amd64 2.7.17-2ubuntu4 [27.5 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:13 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-stdlib amd64 2.7.18-1~20.04.7 [1889 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:14 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7 amd64 2.7.18-1~20.04.7 [248 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:15 http://archive.ubuntu.com/ubuntu focal/universe amd64 libpython2-stdlib amd64 2.7.17-2ubuntu4 [7072 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:16 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2 amd64 2.7.17-2ubuntu4 [26.5 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:17 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:20 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pkg-resources all 45.2.0-1ubuntu0.3 [130 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:21 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libexpat1-dev amd64 2.2.9-1ubuntu0.8 [117 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:22 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7 amd64 2.7.18-1~20.04.7 [1038 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:23 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-dev amd64 2.7.18-1~20.04.7 [2468 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:24 http://archive.ubuntu.com/ubuntu focal/universe amd64 libpython2-dev amd64 2.7.17-2ubuntu4 [7140 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:25 http://archive.ubuntu.com/ubuntu focal/universe amd64 libpython-all-dev amd64 2.7.17-2ubuntu4 [1112 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:26 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8 amd64 3.8.10-0ubuntu1~20.04.18 [1625 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:27 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-dev amd64 3.8.10-0ubuntu1~20.04.18 [3950 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-dev amd64 3.8.2-0ubuntu2 [7236 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-all-dev amd64 3.8.2-0ubuntu2 [1116 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:30 http://archive.ubuntu.com/ubuntu focal/universe amd64 python-all amd64 2.7.17-2ubuntu4 [1100 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:31 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7-dev amd64 2.7.18-1~20.04.7 [294 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:32 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2-dev amd64 2.7.17-2ubuntu4 [1268 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:33 http://archive.ubuntu.com/ubuntu focal/universe amd64 python-all-dev amd64 2.7.17-2ubuntu4 [1116 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:34 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python-pip-whl all 20.0.2-5ubuntu1.11 [1808 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:35 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-lib2to3 all 3.8.10-0ubuntu1~20.04 [76.3 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:36 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-distutils all 3.8.10-0ubuntu1~20.04 [141 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:37 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-all amd64 3.8.2-0ubuntu2 [1104 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:38 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:39 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-dev amd64 3.8.10-0ubuntu1~20.04.18 [514 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:40 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-dev amd64 3.8.2-0ubuntu2 [1212 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:41 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-all-dev amd64 3.8.2-0ubuntu2 [1112 B] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:42 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-setuptools all 45.2.0-1ubuntu0.3 [330 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:43 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python3-wheel all 0.34.2-1ubuntu0.1 [23.9 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Get:44 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python3-pip all 20.0.2-5ubuntu1.11 [231 kB] Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": debconf: delaying package configuration, since apt-utils is not installed Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Fetched 21.9 MB in 1s (34.3 MB/s) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3.8-minimal:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20315 files and directories currently installed.) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3.8-minimal. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-minimal. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20598 files and directories currently installed.) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package mime-support. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking mime-support (3.64ubuntu1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libmpdec2:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3.8-stdlib:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3.8. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3.8 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3-stdlib:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 21000 files and directories currently installed.) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../0-python3_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython2.7-minimal:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../1-libpython2.7-minimal_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython2.7-minimal:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python2.7-minimal. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../2-python2.7-minimal_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python2.7-minimal (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python2-minimal. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../3-python2-minimal_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python2-minimal (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython2.7-stdlib:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../4-libpython2.7-stdlib_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython2.7-stdlib:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python2.7. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../5-python2.7_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python2.7 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython2-stdlib:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../6-libpython2-stdlib_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython2-stdlib:amd64 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython2.7-minimal:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python2.7-minimal (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python2-minimal (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python2. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 21783 files and directories currently installed.) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../00-python2_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python2 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libmagic-mgc. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libmagic-mgc (1:5.38-4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libmagic1:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libmagic1:amd64 (1:5.38-4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package file. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking file (1:5.38-4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-pkg-resources. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../04-python3-pkg-resources_45.2.0-1ubuntu0.3_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-pkg-resources (45.2.0-1ubuntu0.3) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libexpat1-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../05-libexpat1-dev_2.2.9-1ubuntu0.8_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libexpat1-dev:amd64 (2.2.9-1ubuntu0.8) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython2.7:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../06-libpython2.7_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython2.7:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython2.7-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../07-libpython2.7-dev_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython2.7-dev:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython2-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../08-libpython2-dev_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython2-dev:amd64 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython-all-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../09-libpython-all-dev_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython-all-dev:amd64 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3.8:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../10-libpython3.8_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3.8:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3.8-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../11-libpython3.8-dev_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3.8-dev:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../12-libpython3-dev_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3-dev:amd64 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package libpython3-all-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../13-libpython3-all-dev_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking libpython3-all-dev:amd64 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python-all. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../14-python-all_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python-all (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python2.7-dev. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../15-python2.7-dev_2.7.18-1~20.04.7_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python2.7-dev (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python2-dev. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../16-python2-dev_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python2-dev (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python-all-dev. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../17-python-all-dev_2.7.17-2ubuntu4_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python-all-dev (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python-pip-whl. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../18-python-pip-whl_20.0.2-5ubuntu1.11_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python-pip-whl (20.0.2-5ubuntu1.11) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-lib2to3. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../19-python3-lib2to3_3.8.10-0ubuntu1~20.04_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-distutils. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../20-python3-distutils_3.8.10-0ubuntu1~20.04_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-all. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../21-python3-all_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-all (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package zlib1g-dev:amd64. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../22-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3.8-dev. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../23-python3.8-dev_3.8.10-0ubuntu1~20.04.18_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3.8-dev (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-dev. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../24-python3-dev_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-dev (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-all-dev. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../25-python3-all-dev_3.8.2-0ubuntu2_amd64.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-all-dev (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-setuptools. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../26-python3-setuptools_45.2.0-1ubuntu0.3_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-setuptools (45.2.0-1ubuntu0.3) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-wheel. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../27-python3-wheel_0.34.2-1ubuntu0.1_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-wheel (0.34.2-1ubuntu0.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Selecting previously unselected package python3-pip. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing to unpack .../28-python3-pip_20.0.2-5ubuntu1.11_all.deb ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Unpacking python3-pip (20.0.2-5ubuntu1.11) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up mime-support (3.64ubuntu1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libmagic-mgc (1:5.38-4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libmagic1:amd64 (1:5.38-4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up file (1:5.38-4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython2.7-stdlib:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libexpat1-dev:amd64 (2.2.9-1ubuntu0.8) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python-pip-whl (20.0.2-5ubuntu1.11) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libmpdec2:amd64 (2.4.2-3) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3.8 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython2.7:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython2.7-dev:amd64 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python2.7 (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython2-stdlib:amd64 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-wheel (0.34.2-1ubuntu0.1) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python2 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3.8:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython2-dev:amd64 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python2.7-dev (2.7.18-1~20.04.7) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-pkg-resources (45.2.0-1ubuntu0.3) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python2-dev (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-setuptools (45.2.0-1ubuntu0.3) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython-all-dev:amd64 (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-all (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python-all (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3.8-dev:amd64 (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-pip (20.0.2-5ubuntu1.11) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3.8-dev (3.8.10-0ubuntu1~20.04.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python-all-dev (2.7.17-2ubuntu4) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3-dev:amd64 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up libpython3-all-dev:amd64 (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-dev (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Setting up python3-all-dev (3.8.2-0ubuntu2) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container 96731ce65fe3 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> f7126d571355 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 4/10 : RUN pip3 install 'pip>=20' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in 1ae0c9e29e41 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Requirement already satisfied: pip>=20 in /usr/local/lib/python3.11/site-packages (25.1.1) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container 1ae0c9e29e41 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 2ada3984cdd0 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 5/10 : RUN git clone --recursive --depth 1 -b mbedtls-3.6 https://github.com/Mbed-TLS/mbedtls.git mbedtls Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in b91028d66a69 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Cloning into 'mbedtls'... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Submodule 'framework' (https://github.com/Mbed-TLS/mbedtls-framework) registered for path 'framework' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Cloning into '/src/mbedtls/framework'... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Submodule path 'framework': checked out '2a3e2c5ea053c14b745dbdf41f609b1edc6a72fa' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container b91028d66a69 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 8b73f4be01b8 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 6/10 : RUN pip3 install -r $SRC/mbedtls/scripts/basic.requirements.txt Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in dcf1e1d021c8 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Ignoring Jinja2: markers 'python_version < "3.10"' don't match your environment Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting markupsafe<2.1 (from -r /src/mbedtls/scripts/driver.requirements.txt (line 7)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading MarkupSafe-2.0.1.tar.gz (18 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Installing build dependencies: started Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Installing build dependencies: finished with status 'done' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Getting requirements to build wheel: started Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Getting requirements to build wheel: finished with status 'done' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing metadata (pyproject.toml): started Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Preparing metadata (pyproject.toml): finished with status 'done' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting Jinja2>=2.10.3 (from -r /src/mbedtls/scripts/driver.requirements.txt (line 15)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading jinja2-3.1.6-py3-none-any.whl.metadata (2.9 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting types-Jinja2>=2.11.9 (from -r /src/mbedtls/scripts/driver.requirements.txt (line 17)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading types_Jinja2-2.11.9-py3-none-any.whl.metadata (1.1 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting jsonschema>=3.2.0 (from -r /src/mbedtls/scripts/driver.requirements.txt (line 18)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading jsonschema-4.25.0-py3-none-any.whl.metadata (7.7 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting types-jsonschema>=3.2.0 (from -r /src/mbedtls/scripts/driver.requirements.txt (line 19)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading types_jsonschema-4.25.0.20250720-py3-none-any.whl.metadata (1.9 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting types-MarkupSafe (from types-Jinja2>=2.11.9->-r /src/mbedtls/scripts/driver.requirements.txt (line 17)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading types_MarkupSafe-1.1.10-py3-none-any.whl.metadata (1.1 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting attrs>=22.2.0 (from jsonschema>=3.2.0->-r /src/mbedtls/scripts/driver.requirements.txt (line 18)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading attrs-25.3.0-py3-none-any.whl.metadata (10 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting jsonschema-specifications>=2023.03.6 (from jsonschema>=3.2.0->-r /src/mbedtls/scripts/driver.requirements.txt (line 18)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading jsonschema_specifications-2025.4.1-py3-none-any.whl.metadata (2.9 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting referencing>=0.28.4 (from jsonschema>=3.2.0->-r /src/mbedtls/scripts/driver.requirements.txt (line 18)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading referencing-0.36.2-py3-none-any.whl.metadata (2.8 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting rpds-py>=0.7.1 (from jsonschema>=3.2.0->-r /src/mbedtls/scripts/driver.requirements.txt (line 18)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading rpds_py-0.26.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (4.2 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Collecting typing-extensions>=4.4.0 (from referencing>=0.28.4->jsonschema>=3.2.0->-r /src/mbedtls/scripts/driver.requirements.txt (line 18)) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading typing_extensions-4.14.1-py3-none-any.whl.metadata (3.0 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading jinja2-3.1.6-py3-none-any.whl (134 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading types_Jinja2-2.11.9-py3-none-any.whl (18 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading jsonschema-4.25.0-py3-none-any.whl (89 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading types_jsonschema-4.25.0.20250720-py3-none-any.whl (15 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading attrs-25.3.0-py3-none-any.whl (63 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading jsonschema_specifications-2025.4.1-py3-none-any.whl (18 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading referencing-0.36.2-py3-none-any.whl (26 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading rpds_py-0.26.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (383 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading typing_extensions-4.14.1-py3-none-any.whl (43 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Downloading types_MarkupSafe-1.1.10-py3-none-any.whl (4.0 kB) Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Building wheels for collected packages: markupsafe Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Building wheel for markupsafe (pyproject.toml): started Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Building wheel for markupsafe (pyproject.toml): finished with status 'done' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Created wheel for markupsafe: filename=markupsafe-2.0.1-cp311-cp311-linux_x86_64.whl size=17929 sha256=c9166819635a2c735be93c4a8d95ad019e8d8ee38d3bbabb5646261301e214ef Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Stored in directory: /root/.cache/pip/wheels/ea/18/79/6266ea508b8164a77b95aa19534c77eb805f2878612c37efca Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Successfully built markupsafe Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Installing collected packages: types-MarkupSafe, typing-extensions, types-Jinja2, rpds-py, markupsafe, attrs, referencing, Jinja2, types-jsonschema, jsonschema-specifications, jsonschema Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Successfully installed Jinja2-3.1.6 attrs-25.3.0 jsonschema-4.25.0 jsonschema-specifications-2025.4.1 markupsafe-2.0.1 referencing-0.36.2 rpds-py-0.26.0 types-Jinja2-2.11.9 types-MarkupSafe-1.1.10 types-jsonschema-4.25.0.20250720 typing-extensions-4.14.1 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container dcf1e1d021c8 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 75ff530f77d1 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 7/10 : RUN git clone --depth 1 https://github.com/google/boringssl.git boringssl Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in 7cb3939004ca Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Cloning into 'boringssl'... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container 7cb3939004ca Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 7b28ea77db71 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 8/10 : RUN git clone --depth 1 https://github.com/openssl/openssl.git openssl && cd openssl && git submodule update --init fuzz/corpora Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in f41c84ce9806 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Cloning into 'openssl'... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Submodule 'fuzz/corpora' (https://github.com/openssl/fuzz-corpora) registered for path 'fuzz/corpora' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Cloning into '/src/openssl/fuzz/corpora'... Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Submodule path 'fuzz/corpora': checked out 'ce771805c094d098c25a218bc8e9f7344eccbc5a' Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container f41c84ce9806 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> ac2c7ae90e0a Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 9/10 : WORKDIR mbedtls Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> Running in 2bd1ee4a9589 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Removing intermediate container 2bd1ee4a9589 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 20c4f4219f8c Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Step 10/10 : COPY build.sh run_tests.sh $SRC/ Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": ---> 17fcee61ac22 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Successfully built 17fcee61ac22 Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Successfully tagged gcr.io/oss-fuzz/mbedtls:latest Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/mbedtls:latest Finished Step #4 - "build-037ea3f9-caca-4620-a420-cd27f4183322" Starting Step #5 - "srcmap" Step #5 - "srcmap": Already have image: gcr.io/oss-fuzz/mbedtls Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + SRCMAP=/tmp/fileY9cCvO Step #5 - "srcmap": + echo '{}' Step #5 - "srcmap": + PATHS_TO_SCAN=/src Step #5 - "srcmap": + [[ c++ == \g\o ]] Step #5 - "srcmap": ++ find /src -name .git -type d Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/openssl/.git Step #5 - "srcmap": + GIT_DIR=/src/openssl Step #5 - "srcmap": + cd /src/openssl Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/openssl/openssl.git Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=499f65533708318af57f0190315672aaeaf10f84 Step #5 - "srcmap": + jq_inplace /tmp/fileY9cCvO '."/src/openssl" = { type: "git", url: "https://github.com/openssl/openssl.git", rev: "499f65533708318af57f0190315672aaeaf10f84" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/filePNCzq9 Step #5 - "srcmap": + cat /tmp/fileY9cCvO Step #5 - "srcmap": + jq '."/src/openssl" = { type: "git", url: "https://github.com/openssl/openssl.git", rev: "499f65533708318af57f0190315672aaeaf10f84" }' Step #5 - "srcmap": + mv /tmp/filePNCzq9 /tmp/fileY9cCvO Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/boringssl/.git Step #5 - "srcmap": + GIT_DIR=/src/boringssl Step #5 - "srcmap": + cd /src/boringssl Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/google/boringssl.git Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=6aa79db9d5d3b149ac10250f3773da91d5cbeace Step #5 - "srcmap": + jq_inplace /tmp/fileY9cCvO '."/src/boringssl" = { type: "git", url: "https://github.com/google/boringssl.git", rev: "6aa79db9d5d3b149ac10250f3773da91d5cbeace" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/fileZgfJeH Step #5 - "srcmap": + cat /tmp/fileY9cCvO Step #5 - "srcmap": + jq '."/src/boringssl" = { type: "git", url: "https://github.com/google/boringssl.git", rev: "6aa79db9d5d3b149ac10250f3773da91d5cbeace" }' Step #5 - "srcmap": + mv /tmp/fileZgfJeH /tmp/fileY9cCvO Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/mbedtls/.git Step #5 - "srcmap": + GIT_DIR=/src/mbedtls Step #5 - "srcmap": + cd /src/mbedtls Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/Mbed-TLS/mbedtls.git Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=8f4779c6fa40374f88404787bebad85cc7e9969b Step #5 - "srcmap": + jq_inplace /tmp/fileY9cCvO '."/src/mbedtls" = { type: "git", url: "https://github.com/Mbed-TLS/mbedtls.git", rev: "8f4779c6fa40374f88404787bebad85cc7e9969b" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/filee4Pjeg Step #5 - "srcmap": + cat /tmp/fileY9cCvO Step #5 - "srcmap": + jq '."/src/mbedtls" = { type: "git", url: "https://github.com/Mbed-TLS/mbedtls.git", rev: "8f4779c6fa40374f88404787bebad85cc7e9969b" }' Step #5 - "srcmap": + mv /tmp/filee4Pjeg /tmp/fileY9cCvO Step #5 - "srcmap": ++ find /src -name .svn -type d Step #5 - "srcmap": ++ find /src -name .hg -type d Step #5 - "srcmap": + '[' '' '!=' '' ']' Step #5 - "srcmap": + cat /tmp/fileY9cCvO Step #5 - "srcmap": + rm /tmp/fileY9cCvO Step #5 - "srcmap": { Step #5 - "srcmap": "/src/openssl": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/openssl/openssl.git", Step #5 - "srcmap": "rev": "499f65533708318af57f0190315672aaeaf10f84" Step #5 - "srcmap": }, Step #5 - "srcmap": "/src/boringssl": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/google/boringssl.git", Step #5 - "srcmap": "rev": "6aa79db9d5d3b149ac10250f3773da91d5cbeace" Step #5 - "srcmap": }, Step #5 - "srcmap": "/src/mbedtls": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/Mbed-TLS/mbedtls.git", Step #5 - "srcmap": "rev": "8f4779c6fa40374f88404787bebad85cc7e9969b" Step #5 - "srcmap": } Step #5 - "srcmap": } Finished Step #5 - "srcmap" Starting Step #6 - "compile-libfuzzer-introspector-x86_64" Step #6 - "compile-libfuzzer-introspector-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": vm.mmap_rnd_bits = 28 Step #6 - "compile-libfuzzer-introspector-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #6 - "compile-libfuzzer-introspector-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 28% Reading package lists... 28% Reading package lists... 41% Reading package lists... 41% Reading package lists... 41% Reading package lists... 41% Reading package lists... 42% Reading package lists... 42% Reading package lists... 52% Reading package lists... 52% Reading package lists... 55% Reading package lists... 55% Reading package lists... 56% Reading package lists... 66% Reading package lists... 66% Reading package lists... 66% Reading package lists... 66% Reading package lists... 69% Reading package lists... 69% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 81% Reading package lists... 81% Reading package lists... 84% Reading package lists... 84% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #6 - "compile-libfuzzer-introspector-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree Step #6 - "compile-libfuzzer-introspector-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #6 - "compile-libfuzzer-introspector-x86_64": zlib1g-dev is already the newest version (1:1.2.11.dfsg-2ubuntu1.5). Step #6 - "compile-libfuzzer-introspector-x86_64": zlib1g-dev set to manually installed. Step #6 - "compile-libfuzzer-introspector-x86_64": The following packages were automatically installed and are no longer required: Step #6 - "compile-libfuzzer-introspector-x86_64": autotools-dev libsigsegv2 m4 Step #6 - "compile-libfuzzer-introspector-x86_64": Use 'apt autoremove' to remove them. Step #6 - "compile-libfuzzer-introspector-x86_64": The following additional packages will be installed: Step #6 - "compile-libfuzzer-introspector-x86_64": libjpeg-turbo8 libjpeg-turbo8-dev libjpeg8 libjpeg8-dev libyaml-0-2 Step #6 - "compile-libfuzzer-introspector-x86_64": Suggested packages: Step #6 - "compile-libfuzzer-introspector-x86_64": libyaml-doc Step #6 - "compile-libfuzzer-introspector-x86_64": The following NEW packages will be installed: Step #6 - "compile-libfuzzer-introspector-x86_64": libjpeg-dev libjpeg-turbo8 libjpeg-turbo8-dev libjpeg8 libjpeg8-dev Step #6 - "compile-libfuzzer-introspector-x86_64": libyaml-0-2 libyaml-dev Step #6 - "compile-libfuzzer-introspector-x86_64": 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. Step #6 - "compile-libfuzzer-introspector-x86_64": Need to get 469 kB of archives. Step #6 - "compile-libfuzzer-introspector-x86_64": After this operation, 2050 kB of additional disk space will be used. Step #6 - "compile-libfuzzer-introspector-x86_64": 0% [Working] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libyaml-0-2 amd64 0.2.2-1 [48.9 kB] Step #6 - "compile-libfuzzer-introspector-x86_64": 2% [1 libyaml-0-2 14.2 kB/48.9 kB 29%] 11% [Working] Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjpeg-turbo8 amd64 2.0.3-0ubuntu1.20.04.3 [118 kB] Step #6 - "compile-libfuzzer-introspector-x86_64": 12% [2 libjpeg-turbo8 5500 B/118 kB 5%] 34% [Waiting for headers] Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjpeg-turbo8-dev amd64 2.0.3-0ubuntu1.20.04.3 [238 kB] Step #6 - "compile-libfuzzer-introspector-x86_64": 35% [3 libjpeg-turbo8-dev 3000 B/238 kB 1%] 78% [Waiting for headers] Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libjpeg8 amd64 8c-2ubuntu8 [2194 B] Step #6 - "compile-libfuzzer-introspector-x86_64": 81% [Waiting for headers] Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libjpeg8-dev amd64 8c-2ubuntu8 [1552 B] Step #6 - "compile-libfuzzer-introspector-x86_64": 81% [5 libjpeg8-dev 1552 B/1552 B 100%] 84% [Waiting for headers] Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjpeg-dev amd64 8c-2ubuntu8 [1546 B] Step #6 - "compile-libfuzzer-introspector-x86_64": 84% [6 libjpeg-dev 1546 B/1546 B 100%] 87% [Working] Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 libyaml-dev amd64 0.2.2-1 [58.2 kB] Step #6 - "compile-libfuzzer-introspector-x86_64": 88% [7 libyaml-dev 2116 B/58.2 kB 4%] 100% [Working] Fetched 469 kB in 3s (139 kB/s) Step #6 - "compile-libfuzzer-introspector-x86_64": debconf: delaying package configuration, since apt-utils is not installed Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libyaml-0-2:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 22887 files and directories currently installed.) Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../0-libyaml-0-2_0.2.2-1_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libyaml-0-2:amd64 (0.2.2-1) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libjpeg-turbo8:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../1-libjpeg-turbo8_2.0.3-0ubuntu1.20.04.3_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libjpeg-turbo8:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libjpeg-turbo8-dev:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../2-libjpeg-turbo8-dev_2.0.3-0ubuntu1.20.04.3_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libjpeg-turbo8-dev:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libjpeg8:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../3-libjpeg8_8c-2ubuntu8_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libjpeg8:amd64 (8c-2ubuntu8) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libjpeg8-dev:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../4-libjpeg8-dev_8c-2ubuntu8_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libjpeg8-dev:amd64 (8c-2ubuntu8) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libjpeg-dev:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../5-libjpeg-dev_8c-2ubuntu8_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libjpeg-dev:amd64 (8c-2ubuntu8) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Selecting previously unselected package libyaml-dev:amd64. Step #6 - "compile-libfuzzer-introspector-x86_64": Preparing to unpack .../6-libyaml-dev_0.2.2-1_amd64.deb ... Step #6 - "compile-libfuzzer-introspector-x86_64": Unpacking libyaml-dev:amd64 (0.2.2-1) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libyaml-0-2:amd64 (0.2.2-1) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libjpeg-turbo8:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libjpeg8:amd64 (8c-2ubuntu8) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libjpeg-turbo8-dev:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libyaml-dev:amd64 (0.2.2-1) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libjpeg8-dev:amd64 (8c-2ubuntu8) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Setting up libjpeg-dev:amd64 (8c-2ubuntu8) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: pip in /usr/local/lib/python3.11/site-packages (25.1.1) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: setuptools in /usr/local/lib/python3.11/site-packages (65.5.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting setuptools Step #6 - "compile-libfuzzer-introspector-x86_64": Using cached setuptools-80.9.0-py3-none-any.whl.metadata (6.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Using cached setuptools-80.9.0-py3-none-any.whl (1.2 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": Installing collected packages: setuptools Step #6 - "compile-libfuzzer-introspector-x86_64": Attempting uninstall: setuptools Step #6 - "compile-libfuzzer-introspector-x86_64": Found existing installation: setuptools 65.5.0 Step #6 - "compile-libfuzzer-introspector-x86_64": Uninstalling setuptools-65.5.0: Step #6 - "compile-libfuzzer-introspector-x86_64": Successfully uninstalled setuptools-65.5.0 Step #6 - "compile-libfuzzer-introspector-x86_64": Successfully installed setuptools-80.9.0 Step #6 - "compile-libfuzzer-introspector-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting cxxfilt Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading cxxfilt-0.3.0-py2.py3-none-any.whl.metadata (3.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pyyaml Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading PyYAML-6.0.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (2.1 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting beautifulsoup4 Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading beautifulsoup4-4.13.4-py3-none-any.whl.metadata (3.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting lxml Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading lxml-6.0.0-cp311-cp311-manylinux_2_27_x86_64.manylinux_2_28_x86_64.whl.metadata (6.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting soupsieve Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading soupsieve-2.7-py3-none-any.whl.metadata (4.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting rust-demangler Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading rust_demangler-1.0-py3-none-any.whl.metadata (866 bytes) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: typing-extensions>=4.0.0 in /usr/local/lib/python3.11/site-packages (from beautifulsoup4) (4.14.1) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading cxxfilt-0.3.0-py2.py3-none-any.whl (4.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading PyYAML-6.0.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (762 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/763.0 kB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 763.0/763.0 kB 19.2 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading beautifulsoup4-4.13.4-py3-none-any.whl (187 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading lxml-6.0.0-cp311-cp311-manylinux_2_27_x86_64.manylinux_2_28_x86_64.whl (5.2 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/5.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 5.2/5.2 MB 109.7 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading soupsieve-2.7-py3-none-any.whl (36 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading rust_demangler-1.0-py3-none-any.whl (8.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Installing collected packages: rust-demangler, cxxfilt, soupsieve, pyyaml, lxml, beautifulsoup4 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l  ━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━ 4/6 [lxml]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━ 5/6 [beautifulsoup4]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 6/6 [beautifulsoup4] Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Successfully installed beautifulsoup4-4.13.4 cxxfilt-0.3.0 lxml-6.0.0 pyyaml-6.0.2 rust-demangler-1.0 soupsieve-2.7 Step #6 - "compile-libfuzzer-introspector-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting matplotlib Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading matplotlib-3.10.3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (11 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting contourpy>=1.0.1 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading contourpy-1.3.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (5.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting cycler>=0.10 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading cycler-0.12.1-py3-none-any.whl.metadata (3.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting fonttools>=4.22.0 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading fonttools-4.59.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.metadata (107 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting kiwisolver>=1.3.1 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading kiwisolver-1.4.8-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (6.2 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting numpy>=1.23 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading numpy-2.3.1-cp311-cp311-manylinux_2_28_x86_64.whl.metadata (62 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting packaging>=20.0 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading packaging-25.0-py3-none-any.whl.metadata (3.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pillow>=8 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pillow-11.3.0-cp311-cp311-manylinux_2_27_x86_64.manylinux_2_28_x86_64.whl.metadata (9.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pyparsing>=2.3.1 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pyparsing-3.2.3-py3-none-any.whl.metadata (5.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting python-dateutil>=2.7 (from matplotlib) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading python_dateutil-2.9.0.post0-py2.py3-none-any.whl.metadata (8.4 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: six>=1.5 in /usr/local/lib/python3.11/site-packages (from python-dateutil>=2.7->matplotlib) (1.15.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading matplotlib-3.10.3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (8.6 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/8.6 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 8.6/8.6 MB 107.8 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading contourpy-1.3.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (326 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading cycler-0.12.1-py3-none-any.whl (8.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading fonttools-4.59.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (5.0 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/5.0 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 5.0/5.0 MB 104.8 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading kiwisolver-1.4.8-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (1.4 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/1.4 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1.4/1.4 MB 84.6 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading numpy-2.3.1-cp311-cp311-manylinux_2_28_x86_64.whl (16.9 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/16.9 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 16.9/16.9 MB 155.2 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading packaging-25.0-py3-none-any.whl (66 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pillow-11.3.0-cp311-cp311-manylinux_2_27_x86_64.manylinux_2_28_x86_64.whl (6.6 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/6.6 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 6.6/6.6 MB 136.5 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading pyparsing-3.2.3-py3-none-any.whl (111 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading python_dateutil-2.9.0.post0-py2.py3-none-any.whl (229 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Installing collected packages: python-dateutil, pyparsing, pillow, packaging, numpy, kiwisolver, fonttools, cycler, contourpy, matplotlib Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l  ━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  2/10 [pillow]  ━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  2/10 [pillow]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━  4/10 [numpy]  ━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━  6/10 [fonttools]  ━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━  6/10 [fonttools]  ━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━  6/10 [fonttools]  ━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━  6/10 [fonttools]  ━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━  6/10 [fonttools]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━  9/10 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 10/10 [matplotlib] Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Successfully installed contourpy-1.3.2 cycler-0.12.1 fonttools-4.59.0 kiwisolver-1.4.8 matplotlib-3.10.3 numpy-2.3.1 packaging-25.0 pillow-11.3.0 pyparsing-3.2.3 python-dateutil-2.9.0.post0 Step #6 - "compile-libfuzzer-introspector-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #6 - "compile-libfuzzer-introspector-x86_64": /fuzz-introspector/src /src/mbedtls Step #6 - "compile-libfuzzer-introspector-x86_64": Obtaining file:///fuzz-introspector/src Step #6 - "compile-libfuzzer-introspector-x86_64": Installing build dependencies ... [?25l- \ | done Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Checking if build backend supports build_editable ... [?25ldone Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Getting requirements to build editable ... [?25l- done Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Preparing editable metadata (pyproject.toml) ... [?25l- done Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hCollecting beautifulsoup4==4.10.0 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading beautifulsoup4-4.10.0-py3-none-any.whl.metadata (3.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: cxxfilt==0.3.0 in /usr/local/lib/python3.11/site-packages (from fuzz-introspector==0.1.10) (0.3.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting lxml==5.3.0 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading lxml-5.3.0-cp311-cp311-manylinux_2_28_x86_64.whl.metadata (3.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting matplotlib==3.10.0 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading matplotlib-3.10.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (11 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: PyYAML==6.0.2 in /usr/local/lib/python3.11/site-packages (from fuzz-introspector==0.1.10) (6.0.2) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting soupsieve==2.2.1 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading soupsieve-2.2.1-py3-none-any.whl.metadata (5.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting yapf==0.40.1 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading yapf-0.40.1-py3-none-any.whl.metadata (35 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting flake8 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading flake8-7.3.0-py2.py3-none-any.whl.metadata (3.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pep8 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pep8-1.7.1-py2.py3-none-any.whl.metadata (22 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting mypy (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading mypy-1.17.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl.metadata (2.2 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting psutil (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading psutil-7.0.0-cp36-abi3-manylinux_2_12_x86_64.manylinux2010_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (22 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting toml (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading toml-0.10.2-py2.py3-none-any.whl.metadata (7.1 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pytest (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pytest-8.4.1-py3-none-any.whl.metadata (7.7 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinx==6.0.0 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinx-6.0.0-py3-none-any.whl.metadata (6.2 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinx_rtd_theme (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinx_rtd_theme-3.0.2-py2.py3-none-any.whl.metadata (4.4 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting configparser (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading configparser-7.2.0-py3-none-any.whl.metadata (5.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting coverage (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading coverage-7.9.2-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (8.9 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: setuptools>=65.5.1 in /usr/local/lib/python3.11/site-packages (from fuzz-introspector==0.1.10) (80.9.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tqdm (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tqdm-4.67.1-py3-none-any.whl.metadata (57 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: rust-demangler in /usr/local/lib/python3.11/site-packages (from fuzz-introspector==0.1.10) (1.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting numpy==2.1.0 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading numpy-2.1.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (60 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter==0.23.2 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter-0.23.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (9.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter-python==0.23.6 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_python-0.23.6-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (1.9 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting networkx (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading networkx-3.5-py3-none-any.whl.metadata (6.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter-languages==1.10.2 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_languages-1.10.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (10 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter-cpp==0.23.4 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_cpp-0.23.4-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (1.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter-go==0.23.4 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_go-0.23.4-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (1.7 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter-java==0.23.5 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_java-0.23.5-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (1.7 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tree-sitter-rust==0.23.2 (from fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_rust-0.23.2-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (2.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: contourpy>=1.0.1 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (1.3.2) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: cycler>=0.10 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (0.12.1) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: fonttools>=4.22.0 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (4.59.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: kiwisolver>=1.3.1 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (1.4.8) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: packaging>=20.0 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (25.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: pillow>=8 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (11.3.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: pyparsing>=2.3.1 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (3.2.3) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: python-dateutil>=2.7 in /usr/local/lib/python3.11/site-packages (from matplotlib==3.10.0->fuzz-introspector==0.1.10) (2.9.0.post0) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-applehelp (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_applehelp-2.0.0-py3-none-any.whl.metadata (2.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-devhelp (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_devhelp-2.0.0-py3-none-any.whl.metadata (2.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-jsmath (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_jsmath-1.0.1-py2.py3-none-any.whl.metadata (1.4 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-htmlhelp>=2.0.0 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_htmlhelp-2.1.0-py3-none-any.whl.metadata (2.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-serializinghtml>=1.1.5 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_serializinghtml-2.0.0-py3-none-any.whl.metadata (2.4 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-qthelp (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_qthelp-2.0.0-py3-none-any.whl.metadata (2.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: Jinja2>=3.0 in /usr/local/lib/python3.11/site-packages (from sphinx==6.0.0->fuzz-introspector==0.1.10) (3.1.6) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting Pygments>=2.12 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pygments-2.19.2-py3-none-any.whl.metadata (2.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting docutils<0.20,>=0.18 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading docutils-0.19-py3-none-any.whl.metadata (2.7 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting snowballstemmer>=2.0 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading snowballstemmer-3.0.1-py3-none-any.whl.metadata (7.9 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting babel>=2.9 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading babel-2.17.0-py3-none-any.whl.metadata (2.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting alabaster<0.8,>=0.7 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading alabaster-0.7.16-py3-none-any.whl.metadata (2.9 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting imagesize>=1.3 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading imagesize-1.4.1-py2.py3-none-any.whl.metadata (1.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting requests>=2.25.0 (from sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading requests-2.32.4-py3-none-any.whl.metadata (4.9 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting importlib-metadata>=6.6.0 (from yapf==0.40.1->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading importlib_metadata-8.7.0-py3-none-any.whl.metadata (4.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting platformdirs>=3.5.1 (from yapf==0.40.1->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading platformdirs-4.3.8-py3-none-any.whl.metadata (12 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting tomli>=2.0.1 (from yapf==0.40.1->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tomli-2.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (11 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting zipp>=3.20 (from importlib-metadata>=6.6.0->yapf==0.40.1->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading zipp-3.23.0-py3-none-any.whl.metadata (3.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: MarkupSafe>=2.0 in /usr/local/lib/python3.11/site-packages (from Jinja2>=3.0->sphinx==6.0.0->fuzz-introspector==0.1.10) (2.0.1) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: six>=1.5 in /usr/local/lib/python3.11/site-packages (from python-dateutil>=2.7->matplotlib==3.10.0->fuzz-introspector==0.1.10) (1.15.0) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting charset_normalizer<4,>=2 (from requests>=2.25.0->sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading charset_normalizer-3.4.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (35 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting idna<4,>=2.5 (from requests>=2.25.0->sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading idna-3.10-py3-none-any.whl.metadata (10 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting urllib3<3,>=1.21.1 (from requests>=2.25.0->sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading urllib3-2.5.0-py3-none-any.whl.metadata (6.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting certifi>=2017.4.17 (from requests>=2.25.0->sphinx==6.0.0->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading certifi-2025.7.14-py3-none-any.whl.metadata (2.4 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting mccabe<0.8.0,>=0.7.0 (from flake8->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading mccabe-0.7.0-py2.py3-none-any.whl.metadata (5.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pycodestyle<2.15.0,>=2.14.0 (from flake8->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pycodestyle-2.14.0-py2.py3-none-any.whl.metadata (4.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pyflakes<3.5.0,>=3.4.0 (from flake8->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pyflakes-3.4.0-py2.py3-none-any.whl.metadata (3.5 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Requirement already satisfied: typing_extensions>=4.6.0 in /usr/local/lib/python3.11/site-packages (from mypy->fuzz-introspector==0.1.10) (4.14.1) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting mypy_extensions>=1.0.0 (from mypy->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading mypy_extensions-1.1.0-py3-none-any.whl.metadata (1.1 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pathspec>=0.9.0 (from mypy->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pathspec-0.12.1-py3-none-any.whl.metadata (21 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting iniconfig>=1 (from pytest->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading iniconfig-2.1.0-py3-none-any.whl.metadata (2.7 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting pluggy<2,>=1.5 (from pytest->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pluggy-1.6.0-py3-none-any.whl.metadata (4.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Collecting sphinxcontrib-jquery<5,>=4 (from sphinx_rtd_theme->fuzz-introspector==0.1.10) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_jquery-4.1-py2.py3-none-any.whl.metadata (2.6 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading beautifulsoup4-4.10.0-py3-none-any.whl (97 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading lxml-5.3.0-cp311-cp311-manylinux_2_28_x86_64.whl (5.0 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/5.0 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 5.0/5.0 MB 80.4 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading matplotlib-3.10.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (8.6 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/8.6 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 8.6/8.6 MB 111.6 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading numpy-2.1.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (16.3 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/16.3 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 16.3/16.3 MB 150.6 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading soupsieve-2.2.1-py3-none-any.whl (33 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinx-6.0.0-py3-none-any.whl (3.0 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/3.0 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 3.0/3.0 MB 130.8 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading tree_sitter-0.23.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (567 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/567.6 kB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 567.6/567.6 kB 36.5 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading tree_sitter_cpp-0.23.4-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (316 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_go-0.23.4-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (65 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_java-0.23.5-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (84 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_languages-1.10.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (8.4 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/8.4 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 8.4/8.4 MB 132.3 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading tree_sitter_python-0.23.6-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (112 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tree_sitter_rust-0.23.2-cp39-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (157 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading yapf-0.40.1-py3-none-any.whl (250 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading alabaster-0.7.16-py3-none-any.whl (13 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading docutils-0.19-py3-none-any.whl (570 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/570.5 kB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 570.5/570.5 kB 28.6 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading babel-2.17.0-py3-none-any.whl (10.2 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/10.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 10.2/10.2 MB 144.2 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading imagesize-1.4.1-py2.py3-none-any.whl (8.8 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading importlib_metadata-8.7.0-py3-none-any.whl (27 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading platformdirs-4.3.8-py3-none-any.whl (18 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pygments-2.19.2-py3-none-any.whl (1.2 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/1.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1.2/1.2 MB 77.9 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading requests-2.32.4-py3-none-any.whl (64 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading charset_normalizer-3.4.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (147 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading idna-3.10-py3-none-any.whl (70 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading urllib3-2.5.0-py3-none-any.whl (129 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading certifi-2025.7.14-py3-none-any.whl (162 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading snowballstemmer-3.0.1-py3-none-any.whl (103 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_htmlhelp-2.1.0-py3-none-any.whl (98 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_serializinghtml-2.0.0-py3-none-any.whl (92 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tomli-2.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (236 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading zipp-3.23.0-py3-none-any.whl (10 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading configparser-7.2.0-py3-none-any.whl (17 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading coverage-7.9.2-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (244 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading flake8-7.3.0-py2.py3-none-any.whl (57 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading mccabe-0.7.0-py2.py3-none-any.whl (7.3 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pycodestyle-2.14.0-py2.py3-none-any.whl (31 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pyflakes-3.4.0-py2.py3-none-any.whl (63 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading mypy-1.17.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (12.6 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/12.6 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 12.6/12.6 MB 149.1 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading mypy_extensions-1.1.0-py3-none-any.whl (5.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pathspec-0.12.1-py3-none-any.whl (31 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading networkx-3.5-py3-none-any.whl (2.0 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/2.0 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 2.0/2.0 MB 109.0 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading pep8-1.7.1-py2.py3-none-any.whl (41 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading psutil-7.0.0-cp36-abi3-manylinux_2_12_x86_64.manylinux2010_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (277 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pytest-8.4.1-py3-none-any.whl (365 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading pluggy-1.6.0-py3-none-any.whl (20 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading iniconfig-2.1.0-py3-none-any.whl (6.0 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinx_rtd_theme-3.0.2-py2.py3-none-any.whl (7.7 MB) Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/7.7 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 7.7/7.7 MB 133.7 MB/s eta 0:00:00 Step #6 - "compile-libfuzzer-introspector-x86_64": [?25hDownloading sphinxcontrib_jquery-4.1-py2.py3-none-any.whl (121 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_applehelp-2.0.0-py3-none-any.whl (119 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_devhelp-2.0.0-py3-none-any.whl (82 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_jsmath-1.0.1-py2.py3-none-any.whl (5.1 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading sphinxcontrib_qthelp-2.0.0-py3-none-any.whl (88 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading toml-0.10.2-py2.py3-none-any.whl (16 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Downloading tqdm-4.67.1-py3-none-any.whl (78 kB) Step #6 - "compile-libfuzzer-introspector-x86_64": Building wheels for collected packages: fuzz-introspector Step #6 - "compile-libfuzzer-introspector-x86_64": Building editable for fuzz-introspector (pyproject.toml) ... [?25l- done Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Created wheel for fuzz-introspector: filename=fuzz_introspector-0.1.10-0.editable-py3-none-any.whl size=3905 sha256=be74ca03ce38f6a74de0929af14951cc695e37ebcba31ac2ee8a0f4dbfba7711 Step #6 - "compile-libfuzzer-introspector-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-35h8tfe1/wheels/44/ee/b6/7a2a30503e5336c67773d206f572139af7f7e84341b0b70950 Step #6 - "compile-libfuzzer-introspector-x86_64": Successfully built fuzz-introspector Step #6 - "compile-libfuzzer-introspector-x86_64": Installing collected packages: pep8, zipp, urllib3, tree-sitter-rust, tree-sitter-python, tree-sitter-java, tree-sitter-go, tree-sitter-cpp, tree-sitter, tqdm, tomli, toml, sphinxcontrib-serializinghtml, sphinxcontrib-qthelp, sphinxcontrib-jsmath, sphinxcontrib-htmlhelp, sphinxcontrib-devhelp, sphinxcontrib-applehelp, soupsieve, snowballstemmer, Pygments, pyflakes, pycodestyle, psutil, pluggy, platformdirs, pathspec, numpy, networkx, mypy_extensions, mccabe, lxml, iniconfig, imagesize, idna, docutils, coverage, configparser, charset_normalizer, certifi, babel, alabaster, tree-sitter-languages, requests, pytest, mypy, importlib-metadata, flake8, beautifulsoup4, yapf, sphinx, matplotlib, sphinxcontrib-jquery, sphinx_rtd_theme, fuzz-introspector Step #6 - "compile-libfuzzer-introspector-x86_64": [?25l  ━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/55 [tree-sitter-cpp]  ━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 13/55 [sphinxcontrib-qthelp]  Attempting uninstall: soupsieve Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 13/55 [sphinxcontrib-qthelp]  Found existing installation: soupsieve 2.7 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 13/55 [sphinxcontrib-qthelp]  Uninstalling soupsieve-2.7: Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 13/55 [sphinxcontrib-qthelp]  Successfully uninstalled soupsieve-2.7 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 13/55 [sphinxcontrib-qthelp]  ━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━━ 19/55 [snowballstemmer]  ━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━━ 19/55 [snowballstemmer]  ━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━ 20/55 [Pygments]  ━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━ 20/55 [Pygments]  ━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━ 20/55 [Pygments]  ━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━ 21/55 [pyflakes]  ━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━ 23/55 [psutil]  Attempting uninstall: numpy Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━ 23/55 [psutil]  Found existing installation: numpy 2.3.1 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━ 23/55 [psutil]  Uninstalling numpy-2.3.1: Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━ 23/55 [psutil]  Successfully uninstalled numpy-2.3.1 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━ 23/55 [psutil]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 27/55 [numpy]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  Attempting uninstall: lxml Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  Found existing installation: lxml 6.0.0 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  Uninstalling lxml-6.0.0: Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  Successfully uninstalled lxml-6.0.0 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━ 28/55 [networkx]  ━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━ 31/55 [lxml]  ━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━ 34/55 [idna]  ━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━ 35/55 [docutils]  ━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━ 36/55 [coverage]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━ 40/55 [babel]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━ 40/55 [babel]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━ 40/55 [babel]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━ 42/55 [tree-sitter-languages]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━ 43/55 [requests]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━ 44/55 [pytest]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  Attempting uninstall: beautifulsoup4 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  Found existing installation: beautifulsoup4 4.13.4 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  Uninstalling beautifulsoup4-4.13.4: Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  Successfully uninstalled beautifulsoup4-4.13.4 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━ 45/55 [mypy]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━ 49/55 [yapf]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  Attempting uninstall: matplotlib Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  Found existing installation: matplotlib 3.10.3 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  Uninstalling matplotlib-3.10.3: Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  Successfully uninstalled matplotlib-3.10.3 Step #6 - "compile-libfuzzer-introspector-x86_64": ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━ 50/55 [sphinx]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 51/55 [matplotlib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 55/55 [fuzz-introspector] Step #6 - "compile-libfuzzer-introspector-x86_64": [?25h Successfully installed Pygments-2.19.2 alabaster-0.7.16 babel-2.17.0 beautifulsoup4-4.10.0 certifi-2025.7.14 charset_normalizer-3.4.2 configparser-7.2.0 coverage-7.9.2 docutils-0.19 flake8-7.3.0 fuzz-introspector-0.1.10 idna-3.10 imagesize-1.4.1 importlib-metadata-8.7.0 iniconfig-2.1.0 lxml-5.3.0 matplotlib-3.10.0 mccabe-0.7.0 mypy-1.17.0 mypy_extensions-1.1.0 networkx-3.5 numpy-2.1.0 pathspec-0.12.1 pep8-1.7.1 platformdirs-4.3.8 pluggy-1.6.0 psutil-7.0.0 pycodestyle-2.14.0 pyflakes-3.4.0 pytest-8.4.1 requests-2.32.4 snowballstemmer-3.0.1 soupsieve-2.2.1 sphinx-6.0.0 sphinx_rtd_theme-3.0.2 sphinxcontrib-applehelp-2.0.0 sphinxcontrib-devhelp-2.0.0 sphinxcontrib-htmlhelp-2.1.0 sphinxcontrib-jquery-4.1 sphinxcontrib-jsmath-1.0.1 sphinxcontrib-qthelp-2.0.0 sphinxcontrib-serializinghtml-2.0.0 toml-0.10.2 tomli-2.2.1 tqdm-4.67.1 tree-sitter-0.23.2 tree-sitter-cpp-0.23.4 tree-sitter-go-0.23.4 tree-sitter-java-0.23.5 tree-sitter-languages-1.10.2 tree-sitter-python-0.23.6 tree-sitter-rust-0.23.2 urllib3-2.5.0 yapf-0.40.1 zipp-3.23.0 Step #6 - "compile-libfuzzer-introspector-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #6 - "compile-libfuzzer-introspector-x86_64": /src/mbedtls Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:37.547 INFO cli - main: Running fuzz introspector post-processing Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.838 INFO analysis - extract_tests_from_directories: All test files Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.838 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_pake.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.839 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/options.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.840 INFO analysis - extract_tests_from_directories: /src/openssl/test/bntest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.840 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bytestring/asn1_compat.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.841 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_rcidm_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.841 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/platform_builtin_keys.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.841 INFO analysis - extract_tests_from_directories: /src/openssl/test/ctype_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.842 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_pw_callback_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.842 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/impl_dispatch_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.842 INFO analysis - extract_tests_from_directories: /src/openssl/test/strtoultest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.842 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bytestring/ber.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.843 INFO analysis - extract_tests_from_directories: /src/openssl/test/quicfaultstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.843 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_srtm_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.843 INFO analysis - extract_tests_from_directories: /src/openssl/test/time_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.843 INFO analysis - extract_tests_from_directories: /src/openssl/providers/fips/self_test_kats.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.844 INFO analysis - extract_tests_from_directories: /src/openssl/test/priority_queue_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.844 INFO analysis - extract_tests_from_directories: /src/openssl/test/provfetchtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.844 INFO analysis - extract_tests_from_directories: /src/openssl/test/radix/terp.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.844 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_decode_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.845 INFO analysis - extract_tests_from_directories: /src/openssl/test/tls13encryptiontest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.845 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/kyber/kyber_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.845 INFO analysis - extract_tests_from_directories: /src/openssl/test/timing_load_creds.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.846 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_comp_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.846 INFO analysis - extract_tests_from_directories: /src/openssl/test/rand_status_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.846 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/test_helpers.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.846 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/programs/query_included_headers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.847 INFO analysis - extract_tests_from_directories: /src/openssl/test/provider_default_search_path_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.847 INFO analysis - extract_tests_from_directories: /src/openssl/test/decoder_propq_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.847 INFO analysis - extract_tests_from_directories: /src/openssl/test/provider_status_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.847 INFO analysis - extract_tests_from_directories: /src/openssl/test/casttest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.848 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/verify_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.848 INFO analysis - extract_tests_from_directories: /src/openssl/test/pemtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.848 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_key_management.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.848 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/ssl_test_ctx.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.849 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_time_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.849 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/test_cleanup.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.849 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmactest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.849 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/cast/cast_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.850 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/trust_store_collection_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.850 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/handshake_srp.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.850 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic-openssl-docker/hq-interop/quic-hq-interop-server.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.851 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/format_output.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.851 INFO analysis - extract_tests_from_directories: /src/openssl/test/provider_fallback_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.851 INFO analysis - extract_tests_from_directories: /src/openssl/test/json_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.851 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/certificate_policies_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.852 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_extra_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.852 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_skey_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.852 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/verify_signed_data_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.853 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/refcount_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.853 INFO analysis - extract_tests_from_directories: /src/openssl/test/asynciotest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.853 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/poly1305/poly1305_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.853 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/cmake_subproject/cmake_subproject.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.854 INFO analysis - extract_tests_from_directories: /src/openssl/providers/implementations/rands/fips_crng_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.854 INFO analysis - extract_tests_from_directories: /src/openssl/test/sha_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.854 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.855 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/test_state.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.855 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/ec/p256-nistz_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.856 INFO analysis - extract_tests_from_directories: /src/openssl/test/build_wincrypt_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.856 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/evp/scrypt_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.856 INFO analysis - extract_tests_from_directories: /src/openssl/test/memleaktest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.856 INFO analysis - extract_tests_from_directories: /src/openssl/test/servername_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.857 INFO analysis - extract_tests_from_directories: /src/openssl/test/modes_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.857 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/handshake_util.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.857 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_asymmetric_encryption.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.857 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/rand/urandom_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.858 INFO analysis - extract_tests_from_directories: /src/openssl/test/test_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.858 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/dsa/dsa_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.858 INFO analysis - extract_tests_from_directories: /src/openssl/test/fake_rsaprov.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.858 INFO analysis - extract_tests_from_directories: /src/openssl/test/params_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.859 INFO analysis - extract_tests_from_directories: /src/openssl/test/params_conversion_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.859 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.859 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/hrss/hrss_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.860 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/conf/conf_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.860 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_xof_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.860 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_encode_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.860 INFO analysis - extract_tests_from_directories: /src/openssl/providers/fips/self_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.861 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/hkdf/hkdf_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.861 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/cmake_package_install/cmake_package_install.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.861 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_hdr_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.862 INFO analysis - extract_tests_from_directories: /src/openssl/test/recordlentest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.862 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_addr_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.862 INFO analysis - extract_tests_from_directories: /src/openssl/test/acvp_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.862 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/ec/p256_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.863 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_aead.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.863 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/abi_self_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.863 INFO analysis - extract_tests_from_directories: /src/openssl/test/bftest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.864 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/siphash/siphash_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.864 INFO analysis - extract_tests_from_directories: /src/openssl/test/chacha_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.864 INFO analysis - extract_tests_from_directories: /src/openssl/test/v3nametest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.864 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/psa_crypto_stubs.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.865 INFO analysis - extract_tests_from_directories: /src/openssl/test/hpke_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.865 INFO analysis - extract_tests_from_directories: /src/openssl/test/ectest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.865 INFO analysis - extract_tests_from_directories: /src/openssl/test/v3ext.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.865 INFO analysis - extract_tests_from_directories: /src/openssl/test/moduleloadtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.866 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/hmac/hmac_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.866 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/chacha/chacha_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.866 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_mac.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.867 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/psa_memory_poisoning_wrappers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.867 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/mock_quic_transport.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.867 INFO analysis - extract_tests_from_directories: /src/openssl/test/exdatatest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.867 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_srt_gen_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.868 INFO analysis - extract_tests_from_directories: /src/openssl/test/errtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.868 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/input_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.868 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/dlopen.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.868 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/helpers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.868 INFO analysis - extract_tests_from_directories: /src/openssl/test/gmdifftest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.869 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/hpke/hpke_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.869 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_pkey_ctx_new_from_name.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.869 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/ecdh/ecdh_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.869 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/curve25519/spake25519_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.870 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/helper.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.870 INFO analysis - extract_tests_from_directories: /src/openssl/test/ossl_store_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.870 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/udp_proxy.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.870 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_acert_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.871 INFO analysis - extract_tests_from_directories: /src/openssl/test/localetest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.871 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_fetch_prov_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.871 INFO analysis - extract_tests_from_directories: /src/openssl/test/drbgtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.871 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_status_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.872 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/pem/pem_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.872 INFO analysis - extract_tests_from_directories: /src/openssl/test/dsatest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.872 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/evp/evp_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.872 INFO analysis - extract_tests_from_directories: /src/openssl/test/fatalerrtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.873 INFO analysis - extract_tests_from_directories: /src/openssl/test/dsa_no_digest_size_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.873 INFO analysis - extract_tests_from_directories: /src/boringssl/util/ar/testdata/sample/bar.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.874 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bytestring/cbb.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.874 INFO analysis - extract_tests_from_directories: /src/openssl/test/rc5test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.874 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/evp/pbkdf_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.874 INFO analysis - extract_tests_from_directories: /src/openssl/test/filterprov.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.874 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_cipher.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.875 INFO analysis - extract_tests_from_directories: /src/openssl/test/radix/main.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.875 INFO analysis - extract_tests_from_directories: /src/openssl/test/pbetest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.875 INFO analysis - extract_tests_from_directories: /src/openssl/test/versions.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.875 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/spake2plus/spake2plus_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.876 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/dh/dh_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.876 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bytestring/unicode.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.876 INFO analysis - extract_tests_from_directories: /src/openssl/test/byteorder_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.876 INFO analysis - extract_tests_from_directories: /src/openssl/crypto/rsa/rsa_acvp_test_params.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.877 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_req_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.877 INFO analysis - extract_tests_from_directories: /src/openssl/test/packettest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.877 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/xts/xts_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.877 INFO analysis - extract_tests_from_directories: /src/openssl/test/asynctest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.878 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_load_cert_file_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.878 INFO analysis - extract_tests_from_directories: /src/openssl/test/clienthellotest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.878 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/bssl_shim.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.878 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/ecdsa/ecdsa_p1363_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.879 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/ssltestlib.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.879 INFO analysis - extract_tests_from_directories: /src/openssl/test/danetest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.879 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/constant_time_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.879 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/xwing/xwing_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.880 INFO analysis - extract_tests_from_directories: /src/openssl/test/threadstest_fips.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.880 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_base64_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.880 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/md5/md5_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.881 INFO analysis - extract_tests_from_directories: /src/openssl/test/endecoder_legacy_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.881 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_prefix_text.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.881 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_stable_parse_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.881 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/aes/gcm_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.882 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/pool/pool_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.882 INFO analysis - extract_tests_from_directories: /src/openssl/test/pkcs12_api_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.882 INFO analysis - extract_tests_from_directories: /src/openssl/test/ml_kem_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.882 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/ssl_internal_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.883 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_enc_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.883 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/ip_util_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.883 INFO analysis - extract_tests_from_directories: /src/openssl/test/siphash_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.883 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/thread_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.883 INFO analysis - extract_tests_from_directories: /src/openssl/test/ssl_handshake_rtt_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.884 INFO analysis - extract_tests_from_directories: /src/openssl/test/pem_read_depr_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.884 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/ssl_c_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.884 INFO analysis - extract_tests_from_directories: /src/openssl/engines/e_ossltest_err.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.884 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/mem_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.885 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/cmac/cmac_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.885 INFO analysis - extract_tests_from_directories: /src/openssl/test/ssl_ctx_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.885 INFO analysis - extract_tests_from_directories: /src/openssl/test/sslcorrupttest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.885 INFO analysis - extract_tests_from_directories: /src/openssl/test/igetest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.886 INFO analysis - extract_tests_from_directories: /src/openssl/test/trace_api_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.886 INFO analysis - extract_tests_from_directories: /src/openssl/test/pkcs7_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.886 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/programs/zeroize.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.886 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/random.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.886 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/x509/x509_time_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.887 INFO analysis - extract_tests_from_directories: /src/openssl/test/provider_pkey_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.887 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/pkcs8/pkcs8_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.888 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_client_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.888 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/random.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.888 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bytestring/bytestring_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.888 INFO analysis - extract_tests_from_directories: /src/openssl/test/sslapitest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.889 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_memleak_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.889 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/compiler_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.889 INFO analysis - extract_tests_from_directories: /src/openssl/test/hexstr_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.889 INFO analysis - extract_tests_from_directories: /src/openssl/test/fips_version_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.890 INFO analysis - extract_tests_from_directories: /src/openssl/test/conf_include_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.890 INFO analysis - extract_tests_from_directories: /src/openssl/test/provider_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.890 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/obj/obj_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.890 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/test_config.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.891 INFO analysis - extract_tests_from_directories: /src/openssl/test/rc2test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.891 INFO analysis - extract_tests_from_directories: /src/openssl/test/cipher_overhead_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.891 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/verify_certificate_chain_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.891 INFO analysis - extract_tests_from_directories: /src/openssl/test/cert_comp_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.892 INFO analysis - extract_tests_from_directories: /src/openssl/test/ext_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.892 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/handshake.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.892 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_key_agreement.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.892 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_fc_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.893 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/span_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.893 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/verify_certificate_chain_pkits_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.893 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic-openssl-docker/hq-interop/quic-hq-interop.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.893 INFO analysis - extract_tests_from_directories: /src/openssl/test/cipherlist_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.894 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/load.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.894 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_pkey_dparams_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.894 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/ocsp_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.894 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/base64/base64_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.895 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/driver.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.895 INFO analysis - extract_tests_from_directories: /src/openssl/test/cipherbytes_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.895 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/basic_output.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.895 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/bn/bn_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.896 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/bignum_codepath_check.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.896 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/benchmark.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.896 INFO analysis - extract_tests_from_directories: /src/openssl/test/ssl_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.897 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_txpim_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.897 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_fifd_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.897 INFO analysis - extract_tests_from_directories: /src/openssl/test/rsa_sp800_56b_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.897 INFO analysis - extract_tests_from_directories: /src/openssl/test/hmactest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.897 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/string_util_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.898 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/file_util.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.898 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_tserver_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.898 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/service_indicator/service_indicator_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.899 INFO analysis - extract_tests_from_directories: /src/openssl/test/radix/quic_ops.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.899 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/evp/evp_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.899 INFO analysis - extract_tests_from_directories: /src/openssl/test/ecdsatest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.899 INFO analysis - extract_tests_from_directories: /src/openssl/test/keymgmt_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.900 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/test_options.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.900 INFO analysis - extract_tests_from_directories: /src/openssl/test/mdc2test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.900 INFO analysis - extract_tests_from_directories: /src/openssl/test/rc4test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.900 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_txp_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.901 INFO analysis - extract_tests_from_directories: /src/openssl/test/crltest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.901 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_wire_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.901 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/crl_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.901 INFO analysis - extract_tests_from_directories: /src/openssl/test/upcallstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.901 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/curve25519/x25519_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.901 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/keccak/keccak_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.902 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/ec/ec_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.902 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_dgram_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.902 INFO analysis - extract_tests_from_directories: /src/openssl/test/ideatest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.902 INFO analysis - extract_tests_from_directories: /src/openssl/test/uitest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.902 INFO analysis - extract_tests_from_directories: /src/openssl/test/curve448_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.903 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_server_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.903 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.903 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/bignum_helpers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.903 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_time_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.904 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_cc_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.904 INFO analysis - extract_tests_from_directories: /src/openssl/test/slh_dsa_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.904 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_extra_test2.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.904 INFO analysis - extract_tests_from_directories: /src/openssl/test/confdump.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.904 INFO analysis - extract_tests_from_directories: /src/openssl/test/dtlstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.905 INFO analysis - extract_tests_from_directories: /src/openssl/test/membio_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.905 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_cfq_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.905 INFO analysis - extract_tests_from_directories: /src/openssl/test/fake_pipelineprov.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.905 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_stream_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.905 INFO analysis - extract_tests_from_directories: /src/openssl/test/exptest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.905 INFO analysis - extract_tests_from_directories: /src/openssl/test/pbelutest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.906 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/provider.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.906 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/gtest_main.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.906 INFO analysis - extract_tests_from_directories: /src/openssl/test/mdc2_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.906 INFO analysis - extract_tests_from_directories: /src/boringssl/util/bazel-example/example.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.906 INFO analysis - extract_tests_from_directories: /src/openssl/test/sm2_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.907 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/digest/digest_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.907 INFO analysis - extract_tests_from_directories: /src/openssl/test/http_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.907 INFO analysis - extract_tests_from_directories: /src/openssl/test/sparse_array_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.907 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/crypto_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.907 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/settings_writer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.907 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/test_driver_signature.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.908 INFO analysis - extract_tests_from_directories: /src/openssl/test/verify_extra_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.908 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/cpu_arm_linux_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.908 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/pkcs12.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.908 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/simple_path_builder_delegate_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.908 INFO analysis - extract_tests_from_directories: /src/mbedtls/tests/src/certs.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.909 INFO analysis - extract_tests_from_directories: /src/openssl/test/radix/quic_bindings.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.909 INFO analysis - extract_tests_from_directories: /src/openssl/test/sanitytest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.909 INFO analysis - extract_tests_from_directories: /src/openssl/crypto/self_test_core.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.909 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/cb.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.909 INFO analysis - extract_tests_from_directories: /src/openssl/test/simpledynamic.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.910 INFO analysis - extract_tests_from_directories: /src/openssl/test/ssl_cert_table_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.910 INFO analysis - extract_tests_from_directories: /src/openssl/test/pkey_meth_kdf_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.910 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/verify_name_match_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.910 INFO analysis - extract_tests_from_directories: /src/mbedtls/tests/src/test_helpers/ssl_helpers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.910 INFO analysis - extract_tests_from_directories: /src/openssl/test/rsa_x931_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.911 INFO analysis - extract_tests_from_directories: /src/openssl/util/check-format-test-positives.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.911 INFO analysis - extract_tests_from_directories: /src/openssl/test/tls13secretstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.911 INFO analysis - extract_tests_from_directories: /src/openssl/test/sysdefaulttest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.911 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_dsa_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.911 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/fake_random.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.912 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/evp/evp_extra_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.912 INFO analysis - extract_tests_from_directories: /src/openssl/test/prov_config_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.912 INFO analysis - extract_tests_from_directories: /src/openssl/test/p_minimal.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.912 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/self_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.912 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_record_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.913 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_check_cert_pkey_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.913 INFO analysis - extract_tests_from_directories: /src/openssl/test/sm4_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.913 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/file_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.913 INFO analysis - extract_tests_from_directories: /src/openssl/test/ciphername_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.913 INFO analysis - extract_tests_from_directories: /src/openssl/test/punycode_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.913 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/drivers/hash.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.914 INFO analysis - extract_tests_from_directories: /src/openssl/test/aesgcmtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.914 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/cipher/cipher_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.914 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bytestring/cbs.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.914 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/buf/buf_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.914 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/abi_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.915 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/rand/rand_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.915 INFO analysis - extract_tests_from_directories: /src/openssl/test/shlibloadtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.915 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/quictestlib.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.915 INFO analysis - extract_tests_from_directories: /src/boringssl/util/fipstools/test_fips.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.915 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/ssl/ssl_test_common_source.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.916 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/x509/x509_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.916 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_msg_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.916 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_qlog_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.917 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/stanza.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.917 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/name_constraints_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.917 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/tests.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.917 INFO analysis - extract_tests_from_directories: /src/openssl/test/ecstresstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.917 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_newcid_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.917 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/des/des_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.918 INFO analysis - extract_tests_from_directories: /src/openssl/test/safe_math_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.918 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/noisydgrambio.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.918 INFO analysis - extract_tests_from_directories: /src/openssl/test/algorithmid_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.918 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_callback_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.918 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/asn1_helpers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.919 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_vfy_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.919 INFO analysis - extract_tests_from_directories: /src/openssl/test/p_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.919 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/parse_certificate_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.919 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_ctx_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.919 INFO analysis - extract_tests_from_directories: /src/openssl/test/bn_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.920 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/wycheproof_util.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.920 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/pkcs8/pkcs12_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.920 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/err/err_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.920 INFO analysis - extract_tests_from_directories: /src/openssl/test/poly1305_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.920 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/cmp_testlib.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.921 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/curve25519/ed25519_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.921 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/parser_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.921 INFO analysis - extract_tests_from_directories: /src/openssl/test/ffc_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.921 INFO analysis - extract_tests_from_directories: /src/openssl/test/aborttest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.921 INFO analysis - extract_tests_from_directories: /src/openssl/test/user_property_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.921 INFO analysis - extract_tests_from_directories: /src/openssl/test/tls-provider.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.922 INFO analysis - extract_tests_from_directories: /src/openssl/test/radix/quic_tests.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.922 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_readbuffer_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.922 INFO analysis - extract_tests_from_directories: /src/openssl/test/defltfips_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.922 INFO analysis - extract_tests_from_directories: /src/openssl/test/lms_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.922 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/mldsa/mldsa_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.923 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/aes/aes_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.923 INFO analysis - extract_tests_from_directories: /src/openssl/test/lhash_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.923 INFO analysis - extract_tests_from_directories: /src/openssl/test/ec_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.923 INFO analysis - extract_tests_from_directories: /src/openssl/test/ssl_old_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.923 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/async_bio.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.924 INFO analysis - extract_tests_from_directories: /src/openssl/test/params_api_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.924 INFO analysis - extract_tests_from_directories: /src/openssl/test/rsa_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.924 INFO analysis - extract_tests_from_directories: /src/openssl/test/nodefltctxtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.924 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/signature_algorithm_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.924 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/nist_pkits_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.925 INFO analysis - extract_tests_from_directories: /src/openssl/test/sslbuffertest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.925 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_pkey_dhkem_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.925 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/apps_shims.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.925 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.925 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/certificate_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.925 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/handshaker.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.926 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/pktsplitbio.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.926 INFO analysis - extract_tests_from_directories: /src/openssl/test/bioprinttest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.926 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/pkcs7/pkcs7_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.926 INFO analysis - extract_tests_from_directories: /src/openssl/test/constant_time_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.926 INFO analysis - extract_tests_from_directories: /src/openssl/test/wpackettest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.927 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/ssl_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.927 INFO analysis - extract_tests_from_directories: /src/openssl/test/radix/quic_radix.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.927 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/encode_values_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.927 INFO analysis - extract_tests_from_directories: /src/openssl/test/ct_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.928 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_asn_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.928 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_tfo_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.928 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/test_memory.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.928 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_kdf_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.928 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/parse_name_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.929 INFO analysis - extract_tests_from_directories: /src/mbedtls/tests/src/psa_test_wrappers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.929 INFO analysis - extract_tests_from_directories: /src/openssl/test/ml_dsa_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.929 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509_dup_cert_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.929 INFO analysis - extract_tests_from_directories: /src/openssl/test/pkey_meth_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.929 INFO analysis - extract_tests_from_directories: /src/openssl/test/dtlsv1listentest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.929 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/cmake_package/cmake_package.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.930 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_ackm_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.930 INFO analysis - extract_tests_from_directories: /src/openssl/test/afalgtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.930 INFO analysis - extract_tests_from_directories: /src/openssl/test/property_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.930 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/programs/query_compile_time_config.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.930 INFO analysis - extract_tests_from_directories: /src/openssl/test/destest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.931 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/extended_key_usage_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.931 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/output.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.931 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/cms/cms_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.931 INFO analysis - extract_tests_from_directories: /src/openssl/test/rand_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.931 INFO analysis - extract_tests_from_directories: /src/openssl/test/quicapitest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.932 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmsapitest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.932 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/rand/ctrdrbg_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.932 INFO analysis - extract_tests_from_directories: /src/openssl/engines/e_ossltest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.932 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/bio/bio_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.933 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/main.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.933 INFO analysis - extract_tests_from_directories: /src/boringssl/util/ar/testdata/sample/foo.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.933 INFO analysis - extract_tests_from_directories: /src/openssl/test/fake_cipherprov.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.933 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/trust_token/trust_token_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.933 INFO analysis - extract_tests_from_directories: /src/openssl/test/tls13groupselection_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.934 INFO analysis - extract_tests_from_directories: /src/openssl/test/d2i_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.934 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/ecdsa/ecdsa_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.934 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_client_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.934 INFO analysis - extract_tests_from_directories: /src/openssl/test/threadstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.934 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/psasim/test/server.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.935 INFO analysis - extract_tests_from_directories: /src/openssl/test/provider_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.935 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/fake_external_rng_for_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.935 INFO analysis - extract_tests_from_directories: /src/openssl/test/list_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.935 INFO analysis - extract_tests_from_directories: /src/openssl/test/bad_dtls_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.936 INFO analysis - extract_tests_from_directories: /src/openssl/test/cmp_protect_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.936 INFO analysis - extract_tests_from_directories: /src/openssl/test/cc_dummy.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.936 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/cfb/cfb_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.937 INFO analysis - extract_tests_from_directories: /src/boringssl/ssl/test/packeted_bio.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.937 INFO analysis - extract_tests_from_directories: /src/openssl/test/pkcs12_format_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.937 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/rand/getentropy_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.937 INFO analysis - extract_tests_from_directories: /src/openssl/providers/implementations/rands/test_rng.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.938 INFO analysis - extract_tests_from_directories: /src/openssl/test/rsa_complex.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.938 INFO analysis - extract_tests_from_directories: /src/openssl/test/ml_kem_evp_extra_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.938 INFO analysis - extract_tests_from_directories: /src/openssl/test/enginetest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.938 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/blake2/blake2_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.939 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_meth_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.939 INFO analysis - extract_tests_from_directories: /src/openssl/test/dtls_mtu_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.939 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/test_util.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.939 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/ripemd/ripemd_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.939 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/threading_helpers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.940 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/rsa/rsa_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.940 INFO analysis - extract_tests_from_directories: /src/openssl/test/secmemtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.940 INFO analysis - extract_tests_from_directories: /src/boringssl/decrepit/blowfish/blowfish_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.941 INFO analysis - extract_tests_from_directories: /src/openssl/test/tls13ccstest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.941 INFO analysis - extract_tests_from_directories: /src/openssl/test/ssl_test_ctx_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.941 INFO analysis - extract_tests_from_directories: /src/openssl/test/context_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.941 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_multistream_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.942 INFO analysis - extract_tests_from_directories: /src/openssl/util/check-format-test-negatives.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.942 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/path_builder_verify_certificate_chain_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.942 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/programs/metatest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.942 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/psa_exercise_key.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.942 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_pkey_provided_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.943 INFO analysis - extract_tests_from_directories: /src/openssl/test/endecode_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.943 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/cert_issuer_source_static_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.943 INFO analysis - extract_tests_from_directories: /src/openssl/test/asn1_string_table_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.943 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/psasim/test/client.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.944 INFO analysis - extract_tests_from_directories: /src/openssl/test/x509aux.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.944 INFO analysis - extract_tests_from_directories: /src/openssl/test/rpktest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.944 INFO analysis - extract_tests_from_directories: /src/openssl/fuzz/test-corpus.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.944 INFO analysis - extract_tests_from_directories: /src/openssl/test/namemap_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.945 INFO analysis - extract_tests_from_directories: /src/openssl/test/pairwise_fail_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.945 INFO analysis - extract_tests_from_directories: /src/openssl/test/helpers/predefined_dhparams.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.945 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/parsed_certificate_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.945 INFO analysis - extract_tests_from_directories: /src/openssl/test/stack_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.945 INFO analysis - extract_tests_from_directories: /src/openssl/test/rdcpu_sanitytest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.946 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/file_test_gtest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.946 INFO analysis - extract_tests_from_directories: /src/openssl/test/threadpool_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.946 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/ssl/ssl_test_lib.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.946 INFO analysis - extract_tests_from_directories: /src/mbedtls/programs/test/selftest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.947 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/test/test_data.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.947 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/general_names_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.947 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/mlkem/mlkem_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.947 INFO analysis - extract_tests_from_directories: /src/openssl/test/ca_internals_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.947 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/pem_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.948 INFO analysis - extract_tests_from_directories: /src/openssl/test/rsa_mp_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.948 INFO analysis - extract_tests_from_directories: /src/openssl/test/quic_lcidm_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.948 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/lhash/lhash_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.948 INFO analysis - extract_tests_from_directories: /src/openssl/test/sm3_internal_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.949 INFO analysis - extract_tests_from_directories: /src/openssl/test/time_offset_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.949 INFO analysis - extract_tests_from_directories: /src/openssl/test/bio_core_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.949 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/fipsmodule/sha/sha_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.949 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/path_builder_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.950 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/cipher/aead_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.950 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/parse_values_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.950 INFO analysis - extract_tests_from_directories: /src/openssl/test/srptest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.950 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_libctx_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.951 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/asn1/asn1_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.951 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/path_builder_pkits_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.951 INFO analysis - extract_tests_from_directories: /src/openssl/test/evp_byname_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.951 INFO analysis - extract_tests_from_directories: /src/mbedtls/framework/tests/src/psa_crypto_helpers.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.952 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/slhdsa/slhdsa_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.952 INFO analysis - extract_tests_from_directories: /src/boringssl/pki/trust_store_in_memory_unittest.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.952 INFO analysis - extract_tests_from_directories: /src/openssl/test/dhtest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.952 INFO analysis - extract_tests_from_directories: /src/openssl/test/testutil/testutil_init.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.953 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/stack/stack_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.953 INFO analysis - extract_tests_from_directories: /src/openssl/test/ocspapitest.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.954 INFO analysis - extract_tests_from_directories: /src/openssl/test/param_build_test.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:38.954 INFO analysis - extract_tests_from_directories: /src/boringssl/crypto/rand/fork_detect_test.cc Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": - cov report: /workspace/out/libfuzzer-introspector-x86_64/textcov_reports/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:39.730 INFO cli - main: Ending fuzz introspector post-processing Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:40.234 INFO cli - main: Running fuzz introspector post-processing Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:40.369 INFO oss_fuzz - analyse_folder: Found 3618 files to include in analysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:40.370 INFO oss_fuzz - analyse_folder: Going C/C++ route Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:17:40.370 INFO oss_fuzz - analyse_folder: Loading tree-sitter trees Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:23:24.175 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/openssl/fuzz/driver.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.465 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/crl_parse_issuing_distribution_point_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.485 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/verify_name_match_verifynameinsubtree_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.507 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/crl_parse_crl_tbscertlist_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.529 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/read_pem.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.570 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/session.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.612 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/bn_mod_exp.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.633 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/verify_name_match_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.653 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/parse_authority_key_identifier_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.673 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/crl_parse_crl_certificatelist_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.694 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/pkcs8.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.714 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/der_roundtrip.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.735 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/spki.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.754 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/server_no_fuzzer_mode.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.774 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/parse_certificate_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.795 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/conf.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.815 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/ocsp_parse_ocsp_response_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.835 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/ocsp_parse_ocsp_cert_id_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.857 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/pkcs12.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.878 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/dtls_client.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.898 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/server.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.918 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/decode_client_hello_inner.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.938 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/client.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.958 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/privkey.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.979 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/cert.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:42.999 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/crl_getcrlstatusforcert_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.020 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/bn_div.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.040 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/arm_cpuinfo.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.060 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/ocsp_parse_ocsp_response_data_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.150 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/ssl_ctx_api.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.168 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/dtls_server.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.187 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/client_no_fuzzer_mode.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.209 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/parse_crldp_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.230 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/ocsp_parse_ocsp_single_response_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:26:43.251 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/boringssl/fuzz/verify_name_match_normalizename_fuzzer.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:57.736 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_x509crt.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:57.758 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_dtlsserver.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:57.779 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_dtlsclient.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:57.935 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_client.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:57.956 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_pkcs7.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:57.980 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_server.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:58.000 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_x509csr.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:58.020 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_x509crl.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:58.044 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_pubkey.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:34:58.084 INFO frontend_c_cpp - load_treesitter_trees: harness: /src/mbedtls/programs/fuzz/fuzz_privkey.c Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:36:05.839 INFO oss_fuzz - analyse_folder: Dump methods for driver Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 10:36:05.839 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:29:18.644 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:29:22.645 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:29:22.645 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:29:51.648 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:29:51.755 INFO oss_fuzz - analyse_folder: Extracting calltree for driver Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.202 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.205 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.302 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.304 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.384 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.384 INFO oss_fuzz - analyse_folder: Dump methods for crl_parse_issuing_distribution_point_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:47.384 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:49.662 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:52.314 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:30:52.315 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:24.169 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:24.290 INFO oss_fuzz - analyse_folder: Extracting calltree for crl_parse_issuing_distribution_point_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:34.907 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:34.910 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:35.048 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:35.050 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:35.134 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:35.135 INFO oss_fuzz - analyse_folder: Dump methods for verify_name_match_verifynameinsubtree_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:35.135 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:37.471 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:40.026 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:31:40.026 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:09.059 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:09.169 INFO oss_fuzz - analyse_folder: Extracting calltree for verify_name_match_verifynameinsubtree_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.583 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.585 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.700 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.702 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.794 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.794 INFO oss_fuzz - analyse_folder: Dump methods for crl_parse_crl_tbscertlist_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:21.795 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:24.111 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:26.687 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:26.687 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:54.040 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:32:54.161 INFO oss_fuzz - analyse_folder: Extracting calltree for crl_parse_crl_tbscertlist_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.207 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.209 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.341 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.344 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.439 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.439 INFO oss_fuzz - analyse_folder: Dump methods for read_pem Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:02.439 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:06.184 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:08.807 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:08.807 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:36.544 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:33:36.652 INFO oss_fuzz - analyse_folder: Extracting calltree for read_pem Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.281 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.283 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.406 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.408 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.495 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.496 INFO oss_fuzz - analyse_folder: Dump methods for session Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:07.496 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:09.764 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:13.764 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:13.764 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:42.120 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:34:42.245 INFO oss_fuzz - analyse_folder: Extracting calltree for session Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.166 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.169 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.310 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.312 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.413 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.413 INFO oss_fuzz - analyse_folder: Dump methods for bn_mod_exp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:37.413 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:39.740 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:42.328 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:37:42.328 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:13.517 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:13.636 INFO oss_fuzz - analyse_folder: Extracting calltree for bn_mod_exp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.691 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.693 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.820 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.822 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.910 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.910 INFO oss_fuzz - analyse_folder: Dump methods for verify_name_match_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:52.910 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:55.236 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:57.811 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:38:57.811 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:26.059 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:26.180 INFO oss_fuzz - analyse_folder: Extracting calltree for verify_name_match_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.236 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.238 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.355 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.357 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.456 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.456 INFO oss_fuzz - analyse_folder: Dump methods for parse_authority_key_identifier_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:38.456 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:40.773 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:43.400 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:39:43.400 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:14.335 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:14.443 INFO oss_fuzz - analyse_folder: Extracting calltree for parse_authority_key_identifier_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.367 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.370 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.485 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.487 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.561 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.561 INFO oss_fuzz - analyse_folder: Dump methods for crl_parse_crl_certificatelist_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:20.561 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:22.876 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:25.450 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:25.450 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:53.681 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:53.805 INFO oss_fuzz - analyse_folder: Extracting calltree for crl_parse_crl_certificatelist_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:40:59.999 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:00.001 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:00.133 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:00.135 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:00.220 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:00.220 INFO oss_fuzz - analyse_folder: Dump methods for pkcs8 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:00.220 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:02.585 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:05.154 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:05.154 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:37.055 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:41:37.170 INFO oss_fuzz - analyse_folder: Extracting calltree for pkcs8 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:41.854 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:41.857 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:41.967 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:41.969 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:42.046 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:42.046 INFO oss_fuzz - analyse_folder: Dump methods for der_roundtrip Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:42.046 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:44.381 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:46.953 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:44:46.953 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:16.064 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:16.195 INFO oss_fuzz - analyse_folder: Extracting calltree for der_roundtrip Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.340 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.342 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.493 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.495 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.592 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.592 INFO oss_fuzz - analyse_folder: Dump methods for spki Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:22.592 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:24.873 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:27.545 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:27.545 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:55.313 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:45:55.418 INFO oss_fuzz - analyse_folder: Extracting calltree for spki Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.069 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.071 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.186 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.188 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.269 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.269 INFO oss_fuzz - analyse_folder: Dump methods for server_no_fuzzer_mode Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:43.270 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:45.632 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:49.681 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:48:49.681 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.312 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.442 INFO oss_fuzz - analyse_folder: Extracting calltree for server_no_fuzzer_mode Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.493 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.495 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.632 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.634 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.741 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.741 INFO oss_fuzz - analyse_folder: Dump methods for parse_certificate_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:18.742 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:21.058 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:23.681 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:23.681 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:55.557 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:49:55.668 INFO oss_fuzz - analyse_folder: Extracting calltree for parse_certificate_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.632 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.635 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.770 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.772 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.868 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.868 INFO oss_fuzz - analyse_folder: Dump methods for conf Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:01.868 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:04.251 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:06.872 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:06.872 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:36.381 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:55:36.513 INFO oss_fuzz - analyse_folder: Extracting calltree for conf Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:37.881 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:37.884 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:38.037 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:38.040 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:38.119 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:38.119 INFO oss_fuzz - analyse_folder: Dump methods for ocsp_parse_ocsp_response_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:38.119 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:40.518 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:43.189 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:58:43.189 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:59:12.120 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 15:59:12.233 INFO oss_fuzz - analyse_folder: Extracting calltree for ocsp_parse_ocsp_response_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.378 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.380 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.499 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.501 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.578 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.579 INFO oss_fuzz - analyse_folder: Dump methods for ocsp_parse_ocsp_cert_id_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:16.579 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:18.893 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:21.489 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:21.489 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:53.007 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:00:53.136 INFO oss_fuzz - analyse_folder: Extracting calltree for ocsp_parse_ocsp_cert_id_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:55.823 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:55.826 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:55.938 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:55.940 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:56.035 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:56.035 INFO oss_fuzz - analyse_folder: Dump methods for pkcs12 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:56.035 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:03:58.392 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:04:00.969 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:04:00.969 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:04:29.204 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:04:29.314 INFO oss_fuzz - analyse_folder: Extracting calltree for pkcs12 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.409 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.412 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.518 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.520 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.596 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.596 INFO oss_fuzz - analyse_folder: Dump methods for dtls_client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:04.596 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:06.878 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:09.438 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:09.438 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.270 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.398 INFO oss_fuzz - analyse_folder: Extracting calltree for dtls_client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.446 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.448 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.561 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.563 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.661 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.661 INFO oss_fuzz - analyse_folder: Dump methods for server Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:40.661 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:42.938 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:45.504 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:07:45.504 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.331 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.443 INFO oss_fuzz - analyse_folder: Extracting calltree for server Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.495 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.498 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.624 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.626 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.719 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.719 INFO oss_fuzz - analyse_folder: Dump methods for decode_client_hello_inner Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:13.719 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:17.497 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:20.016 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:20.016 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:47.735 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:08:47.863 INFO oss_fuzz - analyse_folder: Extracting calltree for decode_client_hello_inner Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.000 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.003 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.131 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.133 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.217 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.217 INFO oss_fuzz - analyse_folder: Dump methods for client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:08.217 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:10.511 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:13.065 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:13.065 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.030 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.140 INFO oss_fuzz - analyse_folder: Extracting calltree for client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.190 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.192 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.307 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.309 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.403 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.403 INFO oss_fuzz - analyse_folder: Dump methods for privkey Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:43.403 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:45.696 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:48.245 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:13:48.245 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:14:15.494 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:14:15.619 INFO oss_fuzz - analyse_folder: Extracting calltree for privkey Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.616 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.620 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.798 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.800 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.907 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.908 INFO oss_fuzz - analyse_folder: Dump methods for cert Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:03.908 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:07.943 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:11.042 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:11.042 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:46.507 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:18:46.619 INFO oss_fuzz - analyse_folder: Extracting calltree for cert Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.591 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.594 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.712 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.714 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.799 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.799 INFO oss_fuzz - analyse_folder: Dump methods for crl_getcrlstatusforcert_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:16.799 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:19.217 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:23.309 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:23.309 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:52.335 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:22:52.467 INFO oss_fuzz - analyse_folder: Extracting calltree for crl_getcrlstatusforcert_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.727 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.730 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.880 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.882 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.967 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.967 INFO oss_fuzz - analyse_folder: Dump methods for bn_div Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:35.968 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:38.273 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:40.952 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:25:40.952 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:13.817 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:13.931 INFO oss_fuzz - analyse_folder: Extracting calltree for bn_div Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.026 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.028 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.159 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.161 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.251 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.251 INFO oss_fuzz - analyse_folder: Dump methods for arm_cpuinfo Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:27.251 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:29.555 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:32.175 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:26:32.175 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.138 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.272 INFO oss_fuzz - analyse_folder: Extracting calltree for arm_cpuinfo Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.760 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.762 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.898 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.901 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.995 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.995 INFO oss_fuzz - analyse_folder: Dump methods for ocsp_parse_ocsp_response_data_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:02.995 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:05.311 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:07.954 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:07.954 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:36.678 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:36.793 INFO oss_fuzz - analyse_folder: Extracting calltree for ocsp_parse_ocsp_response_data_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:45.780 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:45.782 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:45.919 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:45.922 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:46.004 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:46.004 INFO oss_fuzz - analyse_folder: Dump methods for ssl_ctx_api Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:46.004 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:48.321 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:51.030 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:27:51.030 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:28:22.768 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:28:22.903 INFO oss_fuzz - analyse_folder: Extracting calltree for ssl_ctx_api Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.518 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.521 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.660 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.662 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.754 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.754 INFO oss_fuzz - analyse_folder: Dump methods for dtls_server Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:20.754 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:23.064 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:25.708 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:25.709 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.244 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.358 INFO oss_fuzz - analyse_folder: Extracting calltree for dtls_server Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.410 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.412 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.531 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.533 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.618 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.618 INFO oss_fuzz - analyse_folder: Dump methods for client_no_fuzzer_mode Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:54.618 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:56.837 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:59.516 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:33:59.516 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:30.785 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:30.922 INFO oss_fuzz - analyse_folder: Extracting calltree for client_no_fuzzer_mode Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:30.970 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:30.972 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:31.112 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:31.114 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:31.199 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:31.199 INFO oss_fuzz - analyse_folder: Dump methods for parse_crldp_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:31.200 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:33.559 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:36.216 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:34:36.216 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:35:04.703 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:35:04.820 INFO oss_fuzz - analyse_folder: Extracting calltree for parse_crldp_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.434 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.436 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.561 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.563 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.640 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.640 INFO oss_fuzz - analyse_folder: Dump methods for ocsp_parse_ocsp_single_response_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:09.640 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:11.920 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:16.253 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:16.253 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:46.165 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:46.296 INFO oss_fuzz - analyse_folder: Extracting calltree for ocsp_parse_ocsp_single_response_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.344 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.346 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.480 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.482 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.565 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.565 INFO oss_fuzz - analyse_folder: Dump methods for verify_name_match_normalizename_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:54.565 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:56.800 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:59.363 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:36:59.363 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:37:31.589 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:37:31.699 INFO oss_fuzz - analyse_folder: Extracting calltree for verify_name_match_normalizename_fuzzer Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.171 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.173 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.302 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.304 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.386 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.387 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_x509crt Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:35.387 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:37.649 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:40.306 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:38:40.307 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:39:09.934 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:39:10.074 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_x509crt Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.463 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.465 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.591 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.593 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.676 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.677 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_dtlsserver Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:21.677 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:24.014 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:26.520 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:26.521 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:54.912 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:40:55.022 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_dtlsserver Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.016 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.019 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.135 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.137 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.214 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.214 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_dtlsclient Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:13.214 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:15.540 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:18.175 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:18.175 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:49.202 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:44:49.339 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_dtlsclient Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.611 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.615 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.766 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.768 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.859 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.859 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:47:58.859 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:48:01.145 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:48:03.786 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:48:03.786 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:48:31.925 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:48:32.039 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.148 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.151 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.270 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.272 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.362 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.363 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_pkcs7 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:43.363 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:45.585 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:48.222 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:51:48.222 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:18.779 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:18.913 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_pkcs7 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.323 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.325 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.441 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.444 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.534 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.534 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_server Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:43.534 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:45.753 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:48.356 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:52:48.357 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:53:20.993 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:53:21.104 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_server Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:55.990 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:55.994 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:56.135 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:56.137 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:56.218 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:56.218 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_x509csr Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:56.218 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:56:58.539 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:57:01.246 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:57:01.246 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:57:37.709 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:57:37.844 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_x509csr Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.284 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.287 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.407 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.409 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.499 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.500 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_x509crl Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:45.500 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:47.720 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:50.235 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:58:50.235 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:59:19.164 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 16:59:19.275 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_x509crl Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.548 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.551 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.675 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.677 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.767 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.768 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_pubkey Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:07.768 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:10.052 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:12.655 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:12.655 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:40.462 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:00:40.596 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_pubkey Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.366 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.369 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.508 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.510 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.595 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.596 INFO oss_fuzz - analyse_folder: Dump methods for fuzz_privkey Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:42.596 INFO datatypes - dump_module_logic: Generating report Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:46.274 INFO datatypes - dump_module_logic: Report generated Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:48.860 INFO datatypes - dump_module_logic: Dumping project-wide logic. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:01:48.860 INFO datatypes - dump_module_logic: Using safe yaml safe C dumper. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:02:16.986 INFO datatypes - dump_module_logic: Dumped Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:02:17.099 INFO oss_fuzz - analyse_folder: Extracting calltree for fuzz_privkey Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:41.929 INFO oss_fuzz - analyse_folder: Calltree extracted Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:41.931 INFO datatypes - dump_type_definition: Dumping custom type definitions. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.046 INFO datatypes - dump_type_definition: Custom type definitions dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.048 INFO datatypes - dump_macro_block_info: Dumping macro blocks information. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.127 INFO datatypes - dump_macro_block_info: Macro blocks information dumping completed. Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.129 INFO commands - analyse_end_to_end: No harness list at place Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.129 INFO commands - run_analysis_on_dir: Running analysis Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.181 INFO analysis - load_data_files: Loading profiles using files Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.181 INFO data_loader - load_all_profiles: Loading profiles from /src/inspector Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.239 INFO data_loader - load_all_profiles: [] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.239 INFO data_loader - load_all_profiles: - found 45 profiles to load Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.286 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-pkcs8.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.287 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-pkcs8.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.287 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.290 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_client.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.291 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_client.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.291 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.295 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-dtls_client.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.296 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-dtls_client.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.296 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.305 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-pkcs12.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.305 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-pkcs12.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.306 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.307 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-crl_getcrlstatusforcert_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.308 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-crl_getcrlstatusforcert_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.308 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.311 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-server_no_fuzzer_mode.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.312 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-server_no_fuzzer_mode.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:03:42.312 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:42.998 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:43.067 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:43.072 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:43.088 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:43.089 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:44.300 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:44.331 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:44.343 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:44.357 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:44.361 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:45.630 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-privkey.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:45.630 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-privkey.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:45.630 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.081 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-decode_client_hello_inner.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.081 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-decode_client_hello_inner.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.081 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.479 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_dtlsclient.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.479 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_dtlsclient.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.480 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.869 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-der_roundtrip.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.869 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-der_roundtrip.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:49.869 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:50.304 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_x509crt.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:50.304 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_x509crt.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:04:50.304 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:35.811 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:37.076 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:38.499 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-client.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:38.499 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-client.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:38.500 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:40.141 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:40.251 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:40.376 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:40.538 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:41.403 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:41.543 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:41.651 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:41.864 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:42.691 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_pubkey.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:42.692 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_pubkey.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:42.693 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:46.633 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-cert.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:46.634 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-cert.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:46.634 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:47.022 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_pkcs7.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:47.023 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_pkcs7.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:47.023 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:47.455 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_response_data_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:47.455 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_response_data_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:05:47.456 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:29.302 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:30.561 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:31.703 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_x509csr.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:31.704 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_x509csr.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:31.704 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:32.895 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:34.158 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:35.407 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-parse_crldp_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:35.407 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-parse_crldp_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:35.408 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:37.649 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:37.893 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:38.568 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:38.983 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:39.168 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:39.863 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:40.294 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_x509crl.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:40.295 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_x509crl.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:40.295 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:40.691 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-session.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:40.692 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-session.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:40.692 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:46.390 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-spki.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:46.391 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-spki.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:06:46.391 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:22.995 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:24.340 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:25.597 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-driver.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:25.598 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-driver.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:25.598 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:26.072 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:27.386 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:28.667 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_privkey.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:28.668 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_privkey.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:28.668 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:30.994 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:31.851 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:32.288 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:33.215 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:33.634 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-crl_parse_issuing_distribution_point_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:33.635 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-crl_parse_issuing_distribution_point_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:33.635 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:34.722 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_single_response_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:34.723 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_single_response_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:34.723 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:37.775 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:39.062 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:40.410 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-bn_div.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:40.410 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-bn_div.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:07:40.411 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:17.582 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:18.889 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:20.060 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:20.164 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-arm_cpuinfo.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:20.164 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-arm_cpuinfo.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:20.164 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:21.393 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:22.981 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-crl_parse_crl_certificatelist_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:22.982 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-crl_parse_crl_certificatelist_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:22.982 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:25.117 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:25.725 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:26.440 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:26.989 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:32.188 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:33.503 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:34.415 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-server.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:34.416 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-server.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:34.416 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:34.806 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-parse_certificate_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:34.807 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-parse_certificate_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:34.807 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:35.343 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-bn_mod_exp.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:35.344 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-bn_mod_exp.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:08:35.344 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:12.189 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:13.518 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:14.689 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-crl_parse_crl_tbscertlist_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:14.689 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-crl_parse_crl_tbscertlist_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:14.689 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:14.800 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:16.031 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:17.212 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-parse_authority_key_identifier_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:17.212 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-parse_authority_key_identifier_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:17.212 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:26.431 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:26.771 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:26.976 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:27.715 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:28.041 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:28.323 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:28.886 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_cert_id_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:28.889 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_cert_id_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:28.889 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:29.385 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-read_pem.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:29.386 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-read_pem.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:29.386 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:30.081 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-client_no_fuzzer_mode.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:30.082 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-client_no_fuzzer_mode.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:09:30.082 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:07.185 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:08.518 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:09.279 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:09.745 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-verify_name_match_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:09.746 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-verify_name_match_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:09.746 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:10.571 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:11.798 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-dtls_server.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:11.799 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-dtls_server.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:11.799 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:21.961 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:22.024 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:22.152 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:23.257 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:23.319 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:23.410 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:24.605 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-ssl_ctx_api.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:24.605 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-ssl_ctx_api.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:24.605 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:34.132 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_dtlsserver.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:34.132 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_dtlsserver.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:34.133 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:34.537 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-verify_name_match_normalizename_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:34.538 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-verify_name_match_normalizename_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:10:34.538 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:01.682 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:02.978 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:04.053 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:04.173 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_response_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:04.173 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-ocsp_parse_ocsp_response_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:04.173 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:05.382 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:06.610 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-verify_name_match_verifynameinsubtree_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:06.610 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-verify_name_match_verifynameinsubtree_fuzzer.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:06.611 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:16.048 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:17.365 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:18.829 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-fuzz_server.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:18.830 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-fuzz_server.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:18.832 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:26.477 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:26.668 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:27.775 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:27.989 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:29.203 INFO data_loader - read_fuzzer_data_file_to_profile: - loading /src/inspector/fuzzerLogFile-conf.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:29.203 INFO data_loader - read_fuzzer_data_file_to_profile: target data f: /src/inspector/fuzzerLogFile-conf.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:29.203 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:55.970 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:57.263 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:58.142 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:11:59.449 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:12:10.221 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:12:11.518 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:12:21.129 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:12:22.424 INFO data_loader - read_fuzzer_data_file_to_profile: Returning profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.303 INFO analysis - load_data_files: Found 44 profiles Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.305 INFO utils - data_file_read_yaml: Set base loader to use CSafeLoader Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.324 INFO utils - data_file_read_yaml: Loaded single yaml module Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.324 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_client.data with fuzzerLogFile-fuzz_client.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.325 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_x509crt.data with fuzzerLogFile-fuzz_x509crt.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.325 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_dtlsclient.data with fuzzerLogFile-fuzz_dtlsclient.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.326 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_pubkey.data with fuzzerLogFile-fuzz_pubkey.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.326 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_pkcs7.data with fuzzerLogFile-fuzz_pkcs7.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.327 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_x509csr.data with fuzzerLogFile-fuzz_x509csr.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.327 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_x509crl.data with fuzzerLogFile-fuzz_x509crl.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.327 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_privkey.data with fuzzerLogFile-fuzz_privkey.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.328 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_dtlsserver.data with fuzzerLogFile-fuzz_dtlsserver.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.328 INFO fuzzer_profile - correlate_executable_name: Correlated fuzzerLogFile-fuzz_server.data with fuzzerLogFile-fuzz_server.data.data Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.329 INFO analysis - load_data_files: [+] Accummulating profiles Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.329 INFO analysis - load_data_files: Accummulating using multiprocessing Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:27.917 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/dtls_client.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:28.071 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:28.217 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:28.377 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:28.546 INFO fuzzer_profile - accummulate_profile: fuzz_client: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:28.713 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:28.882 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:29.057 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:29.233 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:29.405 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: propagating functions reached Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:37.631 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:37.631 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.218 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.218 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.218 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target fuzz_dtlsclient Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.403 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.403 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsclient.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.403 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.485 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.507 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.587 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.588 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.616 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.650 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.675 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.710 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.764 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.764 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.770 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.835 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.874 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.874 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.930 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.930 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.930 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.930 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.931 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.931 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.947 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.954 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.956 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.957 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:38.999 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:39.004 INFO fuzzer_profile - accummulate_profile: fuzz_dtlsclient: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:44.564 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/dtls_client.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:44.571 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/dtls_client.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:44.590 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/dtls_client.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:44.590 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:44.590 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/dtls_client.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.063 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.068 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.085 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.085 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.085 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/pkcs12.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.149 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.149 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.162 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.162 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.162 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/server_no_fuzzer_mode.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.253 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.253 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.253 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsserver.covreport', '/src/inspector/usepsa-fuzz_privkey.covreport', '/src/inspector/fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_pubkey.covreport', '/src/inspector/usepsa-fuzz_server.covreport', '/src/inspector/fuzz_x509csr.covreport', '/src/inspector/usepsa-fuzz_x509crl.covreport', '/src/inspector/usepsa-fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_dtlsclient.covreport', '/src/inspector/fuzz_client.covreport', '/src/inspector/usepsa-fuzz_dtlsserver.covreport', '/src/inspector/fuzz_x509crl.covreport', '/src/inspector/fuzz_server.covreport', '/src/inspector/usepsa-fuzz_client.covreport', '/src/inspector/fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_x509csr.covreport', '/src/inspector/fuzz_dtlsclient.covreport', '/src/inspector/fuzz_privkey.covreport', '/src/inspector/fuzz_pubkey.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.253 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.253 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsserver.covreport', '/src/inspector/usepsa-fuzz_privkey.covreport', '/src/inspector/fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_pubkey.covreport', '/src/inspector/usepsa-fuzz_server.covreport', '/src/inspector/fuzz_x509csr.covreport', '/src/inspector/usepsa-fuzz_x509crl.covreport', '/src/inspector/usepsa-fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_dtlsclient.covreport', '/src/inspector/fuzz_client.covreport', '/src/inspector/usepsa-fuzz_dtlsserver.covreport', '/src/inspector/fuzz_x509crl.covreport', '/src/inspector/fuzz_server.covreport', '/src/inspector/usepsa-fuzz_client.covreport', '/src/inspector/fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_x509csr.covreport', '/src/inspector/fuzz_dtlsclient.covreport', '/src/inspector/fuzz_privkey.covreport', '/src/inspector/fuzz_pubkey.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.253 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.264 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.264 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.323 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.323 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.344 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.344 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.380 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.381 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.381 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/pkcs8.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.393 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.393 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsserver.covreport', '/src/inspector/usepsa-fuzz_privkey.covreport', '/src/inspector/fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_pubkey.covreport', '/src/inspector/usepsa-fuzz_server.covreport', '/src/inspector/fuzz_x509csr.covreport', '/src/inspector/usepsa-fuzz_x509crl.covreport', '/src/inspector/usepsa-fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_dtlsclient.covreport', '/src/inspector/fuzz_client.covreport', '/src/inspector/usepsa-fuzz_dtlsserver.covreport', '/src/inspector/fuzz_x509crl.covreport', '/src/inspector/fuzz_server.covreport', '/src/inspector/usepsa-fuzz_client.covreport', '/src/inspector/fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_x509csr.covreport', '/src/inspector/fuzz_dtlsclient.covreport', '/src/inspector/fuzz_privkey.covreport', '/src/inspector/fuzz_pubkey.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.393 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.401 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.453 INFO fuzzer_profile - accummulate_profile: fuzz_client: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.454 INFO fuzzer_profile - accummulate_profile: fuzz_client: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.467 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.500 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.507 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.525 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.530 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.532 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.537 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.545 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.553 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.576 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.584 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.600 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.601 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.601 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.601 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.601 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.602 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.611 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.611 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.611 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.612 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.612 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.612 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.630 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.641 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.654 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.656 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.665 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.680 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.685 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.689 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.694 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.695 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.699 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.700 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.705 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.705 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.708 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.711 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.732 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.740 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.741 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.741 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/privkey.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.754 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 12| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.754 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 50| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.755 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 49| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.755 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 61| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.755 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 100| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.755 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.756 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 69| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.756 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsserver.covreport', '/src/inspector/usepsa-fuzz_privkey.covreport', '/src/inspector/fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_pubkey.covreport', '/src/inspector/usepsa-fuzz_server.covreport', '/src/inspector/fuzz_x509csr.covreport', '/src/inspector/usepsa-fuzz_x509crl.covreport', '/src/inspector/usepsa-fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_dtlsclient.covreport', '/src/inspector/fuzz_client.covreport', '/src/inspector/usepsa-fuzz_dtlsserver.covreport', '/src/inspector/fuzz_x509crl.covreport', '/src/inspector/fuzz_server.covreport', '/src/inspector/usepsa-fuzz_client.covreport', '/src/inspector/fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_x509csr.covreport', '/src/inspector/fuzz_dtlsclient.covreport', '/src/inspector/fuzz_privkey.covreport', '/src/inspector/fuzz_pubkey.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.756 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.756 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.757 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.757 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.757 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.757 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.757 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.762 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 12| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.763 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 50| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.763 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 49| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.763 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 61| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.763 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 100| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.764 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 69| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.777 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.785 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.785 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.801 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.809 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.810 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.812 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.812 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.819 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.826 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.826 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.828 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.831 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.832 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.835 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.838 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.840 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.844 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.856 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.887 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.892 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.894 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.898 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.901 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.902 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 12| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.902 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 50| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.902 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 49| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.902 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 61| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.903 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 100| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.903 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 69| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.904 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.925 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.948 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.955 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.955 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.957 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.957 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.960 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.962 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.965 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.970 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.975 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.996 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:46.997 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.006 INFO fuzzer_profile - accummulate_profile: fuzz_client: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.006 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.006 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target fuzz_client Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.014 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.015 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.015 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target fuzz_x509crt Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.019 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.019 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_client.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.019 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.023 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.025 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.025 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.025 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.027 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.027 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.028 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.028 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_x509crt.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.028 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.029 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.032 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.033 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.039 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.047 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.051 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.051 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.056 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.057 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.061 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.073 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.076 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.080 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.086 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.088 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.091 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.093 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.093 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.099 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.099 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.116 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.112 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:47.114 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.396 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.401 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.397 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.402 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.417 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.418 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.418 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.418 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.419 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.419 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.424 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.425 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.430 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.434 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.449 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.454 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.463 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.468 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.468 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.472 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.481 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.489 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.490 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.495 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.495 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.495 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.496 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.496 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.496 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.500 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.501 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.505 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.507 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.509 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.509 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.509 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/der_roundtrip.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.518 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.519 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting reached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.519 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting unreached funcs Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.526 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.528 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.528 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.529 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.530 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.549 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.561 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 12| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.561 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 50| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.562 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 49| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.562 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 61| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.562 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 100| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.562 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 69| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.562 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: loading coverage Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.563 INFO fuzzer_profile - _load_coverage: Loading coverage of type c-cpp Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.563 INFO code_coverage - load_llvm_coverage: Loading LLVM coverage for target /src/boringssl/fuzz/decode_client_hello_inner.cc Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.577 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.579 INFO fuzzer_profile - accummulate_profile: fuzz_x509crt: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.580 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.584 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.585 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.591 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.598 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.603 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.609 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.609 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.619 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.628 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.634 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.640 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.645 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.661 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.664 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.680 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.684 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.684 INFO code_coverage - load_llvm_coverage: Found 20 coverage reports Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.684 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsserver.covreport', '/src/inspector/usepsa-fuzz_privkey.covreport', '/src/inspector/fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_pubkey.covreport', '/src/inspector/usepsa-fuzz_server.covreport', '/src/inspector/fuzz_x509csr.covreport', '/src/inspector/usepsa-fuzz_x509crl.covreport', '/src/inspector/usepsa-fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_dtlsclient.covreport', '/src/inspector/fuzz_client.covreport', '/src/inspector/usepsa-fuzz_dtlsserver.covreport', '/src/inspector/fuzz_x509crl.covreport', '/src/inspector/fuzz_server.covreport', '/src/inspector/usepsa-fuzz_client.covreport', '/src/inspector/fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_x509csr.covreport', '/src/inspector/fuzz_dtlsclient.covreport', '/src/inspector/fuzz_privkey.covreport', '/src/inspector/fuzz_pubkey.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.684 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.684 INFO code_coverage - load_llvm_coverage: Using the following coverages ['/src/inspector/fuzz_dtlsserver.covreport', '/src/inspector/usepsa-fuzz_privkey.covreport', '/src/inspector/fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_pubkey.covreport', '/src/inspector/usepsa-fuzz_server.covreport', '/src/inspector/fuzz_x509csr.covreport', '/src/inspector/usepsa-fuzz_x509crl.covreport', '/src/inspector/usepsa-fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_dtlsclient.covreport', '/src/inspector/fuzz_client.covreport', '/src/inspector/usepsa-fuzz_dtlsserver.covreport', '/src/inspector/fuzz_x509crl.covreport', '/src/inspector/fuzz_server.covreport', '/src/inspector/usepsa-fuzz_client.covreport', '/src/inspector/fuzz_pkcs7.covreport', '/src/inspector/usepsa-fuzz_x509crt.covreport', '/src/inspector/usepsa-fuzz_x509csr.covreport', '/src/inspector/fuzz_dtlsclient.covreport', '/src/inspector/fuzz_privkey.covreport', '/src/inspector/fuzz_pubkey.covreport'] Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.684 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.685 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.694 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.701 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.703 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.707 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.707 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.714 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.719 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.724 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.727 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.727 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.744 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.746 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.756 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.760 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.760 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.760 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.762 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.764 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.764 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.765 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.765 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.767 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.776 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.788 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.788 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.788 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.792 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.800 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.809 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.814 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.815 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.828 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.829 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.831 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.837 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.839 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.853 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.857 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.858 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.859 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.862 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.875 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.880 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.887 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.888 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.898 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.898 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.898 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.898 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.903 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.906 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.923 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.927 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.932 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.932 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.937 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.945 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.947 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.953 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.956 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.965 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.966 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.981 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.986 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.991 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.992 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.992 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.992 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.993 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:53.995 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.001 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.011 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.018 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.031 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.031 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.032 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.035 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.035 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.038 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.038 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.038 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.038 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.038 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.039 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.040 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.043 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.051 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.056 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.056 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.057 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.057 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.057 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.057 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.058 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.066 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.066 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 811| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.066 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 4.74k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.067 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 1.17k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.067 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 1.10k| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.067 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 369| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.075 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.083 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.083 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.083 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.083 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.084 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.084 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.085 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.094 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.095 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.097 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.103 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.108 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.109 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.110 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.115 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.118 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.120 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.121 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.133 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.133 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.133 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.135 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.138 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.146 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.150 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.150 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.154 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.157 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.161 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.162 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.172 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.173 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.180 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.182 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.182 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.183 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.183 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.183 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.183 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.188 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.194 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 12| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.194 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 50| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.194 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 49| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.195 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 61| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.195 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 100| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.195 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 69| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.196 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.202 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.204 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.205 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.206 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 12| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.206 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 50| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.206 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 49| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.207 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 61| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.207 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 100| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.207 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 69| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.208 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.210 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.216 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.219 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.219 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.221 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.224 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.225 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.225 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.228 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.232 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.238 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.250 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.250 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.252 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.252 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.256 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.261 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.266 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.267 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.267 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.267 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.267 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.267 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.267 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.270 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.272 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.276 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs12.cc: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.276 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.277 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.289 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.290 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.301 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.303 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.312 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.315 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.316 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.318 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.318 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/server_no_fuzzer_mode.cc: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.324 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.329 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.329 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.335 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.337 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.340 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.346 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.357 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.360 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.365 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.366 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.366 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.383 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.383 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.383 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.388 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.392 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.392 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.397 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.412 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.418 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/pkcs8.cc: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.425 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.425 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.425 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.430 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.435 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_dtlsserver.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.451 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.455 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.461 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_x509crl.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.464 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.475 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.483 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.484 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_server.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.485 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.493 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.503 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.511 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.511 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.519 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.520 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.520 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.528 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.535 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.548 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.556 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.568 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.568 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.569 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.569 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.569 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.569 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.569 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.576 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.582 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.587 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.604 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.638 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.640 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.647 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.662 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.689 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.691 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.705 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.738 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.748 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.758 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:54.758 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.157 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_client.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.161 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.169 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.176 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.177 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.177 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.180 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.223 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.232 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pkcs7.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.235 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.242 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/privkey.cc: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.246 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.249 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509crt.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.270 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.271 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/usepsa-fuzz_x509csr.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.293 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.293 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_dtlsclient.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.311 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.311 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.329 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.329 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.351 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.351 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1624| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.352 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.352 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1675| | /* AEAD case: check length before passing on to shared function */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.376 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.377 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 719| | * Common case: P == 0 Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.398 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.400 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.418 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.420 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.445 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.447 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1117| | /* General case: no options */ Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.488 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.488 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.490 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 709| | * TLS 1.2 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.490 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 715| | * TLS 1.3 case: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.493 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.495 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 60| | * case host_name: HostName; Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.548 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.548 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 4236| | * stated in section 4.2.10 of RFC 8446 (second case): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.585 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.585 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.586 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7874| 0| case MBEDTLS_ERR_X509_ALLOC_FAILED: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.586 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 7878| 23| case MBEDTLS_ERR_X509_UNKNOWN_VERSION: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.634 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.634 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.634 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.634 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.635 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.635 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1404| 67| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_OTHER_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.635 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.635 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1423| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.635 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1436| 26| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DNS_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.635 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1448| 28| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_IP_ADDRESS): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.636 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1464| 22| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_RFC822_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.636 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1474| 24| case (MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_X509_SAN_DIRECTORY_NAME): Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.648 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.648 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_privkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.654 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.655 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.671 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.672 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.704 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.704 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 1614| | * Trivial cases: P == 0 or Q == 0 (case 1) Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.728 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.728 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.752 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.752 INFO code_coverage - load_llvm_coverage: Reading coverage report: /src/inspector/fuzz_pubkey.covreport Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.756 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.756 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 215| | * There is an edge case when the output is empty: in this case, Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.768 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.768 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 468| | * If that's not the case, we swap these round: this turns what would be Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.798 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.798 INFO code_coverage - load_llvm_coverage: found case outside a switch?! Step #6 - "compile-libfuzzer-introspector-x86_64": 5152| | /* Worst case for the size of M is when mbedtls_mpi_uint is 16 bits: Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.812 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.812 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting file targets Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.812 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.813 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.813 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.819 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting total basic blocks Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.820 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting cyclomatic complexity Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.820 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting fd cache Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.863 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.870 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/der_roundtrip.cc: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.871 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: setting reached funcs in runtime Step #6 - "compile-libfuzzer-introspector-x86_64": 2025-07-23 17:13:56.877 INFO fuzzer_profile - accummulate_profile: /src/boringssl/fuzz/decode_client_hello_inner.cc: finished accummulating profile Step #6 - "compile-libfuzzer-introspector-x86_64": Process Process-56: Step #6 - "compile-libfuzzer-introspector-x86_64": Process Process-53: Step #6 - "compile-libfuzzer-introspector-x86_64": Process Process-57: Step #6 - "compile-libfuzzer-introspector-x86_64": Process Process-50: Step #6 - "compile-libfuzzer-introspector-x86_64": Process Process-51: Step #6 - "compile-libfuzzer-introspector-x86_64": Process Process-54: Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 814, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": conn = self._tls.connection Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 814, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": conn = self._tls.connection Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 814, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": conn = self._tls.connection Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": AttributeError: 'ForkAwareLocal' object has no attribute 'connection' Step #6 - "compile-libfuzzer-introspector-x86_64": AttributeError: 'ForkAwareLocal' object has no attribute 'connection' Step #6 - "compile-libfuzzer-introspector-x86_64": AttributeError: 'ForkAwareLocal' object has no attribute 'connection' Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": During handling of the above exception, another exception occurred: Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": During handling of the above exception, another exception occurred: Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": During handling of the above exception, another exception occurred: Step #6 - "compile-libfuzzer-introspector-x86_64": Step #6 - "compile-libfuzzer-introspector-x86_64": Traceback (most recent call last): Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 314, in _bootstrap Step #6 - "compile-libfuzzer-introspector-x86_64": self.run() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 108, in run Step #6 - "compile-libfuzzer-introspector-x86_64": self._target(*self._args, **self._kwargs) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/fuzz-introspector/src/fuzz_introspector/datatypes/fuzzer_profile.py", line 388, in accummulate_profile Step #6 - "compile-libfuzzer-introspector-x86_64": return_dict[uniq_id] = self Step #6 - "compile-libfuzzer-introspector-x86_64": ~~~~~~~~~~~^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 314, in _bootstrap Step #6 - "compile-libfuzzer-introspector-x86_64": self.run() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 314, in _bootstrap Step #6 - "compile-libfuzzer-introspector-x86_64": self.run() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 108, in run Step #6 - "compile-libfuzzer-introspector-x86_64": self._target(*self._args, **self._kwargs) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 108, in run Step #6 - "compile-libfuzzer-introspector-x86_64": self._target(*self._args, **self._kwargs) Step #6 - "compile-libfuzzer-introspector-x86_64": File "", line 2, in __setitem__ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/fuzz-introspector/src/fuzz_introspector/datatypes/fuzzer_profile.py", line 388, in accummulate_profile Step #6 - "compile-libfuzzer-introspector-x86_64": return_dict[uniq_id] = self Step #6 - "compile-libfuzzer-introspector-x86_64": ~~~~~~~~~~~^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/fuzz-introspector/src/fuzz_introspector/datatypes/fuzzer_profile.py", line 388, in accummulate_profile Step #6 - "compile-libfuzzer-introspector-x86_64": return_dict[uniq_id] = self Step #6 - "compile-libfuzzer-introspector-x86_64": ~~~~~~~~~~~^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 821, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": conn.send((self._id, methodname, args, kwds)) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 206, in send Step #6 - "compile-libfuzzer-introspector-x86_64": self._send_bytes(_ForkingPickler.dumps(obj)) Step #6 - "compile-libfuzzer-introspector-x86_64": File "", line 2, in __setitem__ Step #6 - "compile-libfuzzer-introspector-x86_64": File "", line 2, in __setitem__ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 421, in _send_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": self._send(buf) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 822, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": kind, result = conn.recv() Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 821, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": conn.send((self._id, methodname, args, kwds)) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 384, in _send Step #6 - "compile-libfuzzer-introspector-x86_64": n = write(self._handle, buf) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 250, in recv Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv_bytes() Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 206, in send Step #6 - "compile-libfuzzer-introspector-x86_64": self._send_bytes(_ForkingPickler.dumps(obj)) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 430, in _recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv(4) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 399, in _recv Step #6 - "compile-libfuzzer-introspector-x86_64": raise EOFError Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 421, in _send_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": self._send(buf) Step #6 - "compile-libfuzzer-introspector-x86_64": BrokenPipeError: [Errno 32] Broken pipe Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 384, in _send Step #6 - "compile-libfuzzer-introspector-x86_64": n = write(self._handle, buf) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": EOFError Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 314, in _bootstrap Step #6 - "compile-libfuzzer-introspector-x86_64": self.run() Step #6 - "compile-libfuzzer-introspector-x86_64": BrokenPipeError: [Errno 32] Broken pipe Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 108, in run Step #6 - "compile-libfuzzer-introspector-x86_64": self._target(*self._args, **self._kwargs) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/fuzz-introspector/src/fuzz_introspector/datatypes/fuzzer_profile.py", line 388, in accummulate_profile Step #6 - "compile-libfuzzer-introspector-x86_64": return_dict[uniq_id] = self Step #6 - "compile-libfuzzer-introspector-x86_64": ~~~~~~~~~~~^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "", line 2, in __setitem__ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 818, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": self._connect() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 805, in _connect Step #6 - "compile-libfuzzer-introspector-x86_64": conn = self._Client(self._token.address, authkey=self._authkey) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 525, in Client Step #6 - "compile-libfuzzer-introspector-x86_64": answer_challenge(c, authkey) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 769, in answer_challenge Step #6 - "compile-libfuzzer-introspector-x86_64": message = connection.recv_bytes(256) # reject large message Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 314, in _bootstrap Step #6 - "compile-libfuzzer-introspector-x86_64": self.run() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 216, in recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv_bytes(maxlength) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 430, in _recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv(4) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 108, in run Step #6 - "compile-libfuzzer-introspector-x86_64": self._target(*self._args, **self._kwargs) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 395, in _recv Step #6 - "compile-libfuzzer-introspector-x86_64": chunk = read(handle, remaining) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/fuzz-introspector/src/fuzz_introspector/datatypes/fuzzer_profile.py", line 388, in accummulate_profile Step #6 - "compile-libfuzzer-introspector-x86_64": return_dict[uniq_id] = self Step #6 - "compile-libfuzzer-introspector-x86_64": ~~~~~~~~~~~^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "", line 2, in __setitem__ Step #6 - "compile-libfuzzer-introspector-x86_64": ConnectionResetError: [Errno 104] Connection reset by peer Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 818, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": self._connect() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 314, in _bootstrap Step #6 - "compile-libfuzzer-introspector-x86_64": self.run() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 805, in _connect Step #6 - "compile-libfuzzer-introspector-x86_64": conn = self._Client(self._token.address, authkey=self._authkey) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/process.py", line 108, in run Step #6 - "compile-libfuzzer-introspector-x86_64": self._target(*self._args, **self._kwargs) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 525, in Client Step #6 - "compile-libfuzzer-introspector-x86_64": answer_challenge(c, authkey) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 769, in answer_challenge Step #6 - "compile-libfuzzer-introspector-x86_64": message = connection.recv_bytes(256) # reject large message Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/fuzz-introspector/src/fuzz_introspector/datatypes/fuzzer_profile.py", line 388, in accummulate_profile Step #6 - "compile-libfuzzer-introspector-x86_64": return_dict[uniq_id] = self Step #6 - "compile-libfuzzer-introspector-x86_64": ~~~~~~~~~~~^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 216, in recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv_bytes(maxlength) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "", line 2, in __setitem__ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 430, in _recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv(4) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 818, in _callmethod Step #6 - "compile-libfuzzer-introspector-x86_64": self._connect() Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 395, in _recv Step #6 - "compile-libfuzzer-introspector-x86_64": chunk = read(handle, remaining) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/managers.py", line 805, in _connect Step #6 - "compile-libfuzzer-introspector-x86_64": conn = self._Client(self._token.address, authkey=self._authkey) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": ConnectionResetError: [Errno 104] Connection reset by peer Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 525, in Client Step #6 - "compile-libfuzzer-introspector-x86_64": answer_challenge(c, authkey) Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 769, in answer_challenge Step #6 - "compile-libfuzzer-introspector-x86_64": message = connection.recv_bytes(256) # reject large message Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 216, in recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv_bytes(maxlength) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 430, in _recv_bytes Step #6 - "compile-libfuzzer-introspector-x86_64": buf = self._recv(4) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": File "/usr/local/lib/python3.11/multiprocessing/connection.py", line 395, in _recv Step #6 - "compile-libfuzzer-introspector-x86_64": chunk = read(handle, remaining) Step #6 - "compile-libfuzzer-introspector-x86_64": ^^^^^^^^^^^^^^^^^^^^^^^ Step #6 - "compile-libfuzzer-introspector-x86_64": ConnectionResetError: [Errno 104] Connection reset by peer TIMEOUT ERROR: context deadline exceeded