starting build "d25a638a-abb1-40a9-9ed1-8bfb3dbcb873" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 5fc1849ea29a: Pulling fs layer Step #1: 5bca3ba2fc7d: Pulling fs layer Step #1: c3f8f264f82b: Pulling fs layer Step #1: 4beb7a10c8f4: Pulling fs layer Step #1: 0ca13ee436c2: Pulling fs layer Step #1: d11b53fc85fe: Pulling fs layer Step #1: 1cbdd3829a23: Pulling fs layer Step #1: 7f7781280c06: Pulling fs layer Step #1: 846994f6541d: Pulling fs layer Step #1: 83087fdbd323: Pulling fs layer Step #1: 5e20af423505: Pulling fs layer Step #1: 7e2d2d2efe99: Pulling fs layer Step #1: bae98e0cfe62: Pulling fs layer Step #1: 7c94181fc29a: Pulling fs layer Step #1: 4018e9ce42a6: Pulling fs layer Step #1: bf9219ec845b: Pulling fs layer Step #1: 71174894d930: Pulling fs layer Step #1: e04ddd5d972b: Pulling fs layer Step #1: bfb7b1a6728d: Pulling fs layer Step #1: 2e1d8e23a9a8: Pulling fs layer Step #1: c3f8f264f82b: Waiting Step #1: 153eacb0a891: Pulling fs layer Step #1: 83087fdbd323: Waiting Step #1: 4d7aa988bb31: Pulling fs layer Step #1: f93820478c87: Pulling fs layer Step #1: 5e20af423505: Waiting Step #1: 4beb7a10c8f4: Waiting Step #1: 038020a237ce: Pulling fs layer Step #1: 416ea49f7c22: Pulling fs layer Step #1: 9cdc40c52e67: Pulling fs layer Step #1: bee113eb3842: Pulling fs layer Step #1: 93286fa4d809: Pulling fs layer Step #1: 88a7cbc5ce33: Pulling fs layer Step #1: 5bdd6bc53e7b: Pulling fs layer Step #1: d84cd2be715d: Pulling fs layer Step #1: d171e73dd44a: Pulling fs layer Step #1: 9972794eff61: Pulling fs layer Step #1: 7e2d2d2efe99: Waiting Step #1: 88a7cbc5ce33: Waiting Step #1: 5bdd6bc53e7b: Waiting Step #1: 846994f6541d: Waiting Step #1: d84cd2be715d: Waiting Step #1: d171e73dd44a: Waiting Step #1: 2e1d8e23a9a8: Waiting Step #1: 4018e9ce42a6: Waiting Step #1: bf9219ec845b: Waiting Step #1: 416ea49f7c22: Waiting Step #1: 153eacb0a891: Waiting Step #1: 4d7aa988bb31: Waiting Step #1: 71174894d930: Waiting Step #1: e04ddd5d972b: Waiting Step #1: 9972794eff61: Waiting Step #1: 7c94181fc29a: Waiting Step #1: f93820478c87: Waiting Step #1: bee113eb3842: Waiting Step #1: 0ca13ee436c2: Waiting Step #1: 7f7781280c06: Waiting Step #1: 93286fa4d809: Waiting Step #1: d11b53fc85fe: Waiting Step #1: 9cdc40c52e67: Waiting Step #1: 5bca3ba2fc7d: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 4beb7a10c8f4: Download complete Step #1: c3f8f264f82b: Verifying Checksum Step #1: c3f8f264f82b: Download complete Step #1: 0ca13ee436c2: Download complete Step #1: 1cbdd3829a23: Verifying Checksum Step #1: 1cbdd3829a23: Download complete Step #1: 5fc1849ea29a: Verifying Checksum Step #1: 5fc1849ea29a: Download complete Step #1: 7f7781280c06: Verifying Checksum Step #1: 7f7781280c06: Download complete Step #1: b549f31133a9: Pull complete Step #1: 83087fdbd323: Verifying Checksum Step #1: 83087fdbd323: Download complete Step #1: 5e20af423505: Verifying Checksum Step #1: 5e20af423505: Download complete Step #1: 7e2d2d2efe99: Download complete Step #1: bae98e0cfe62: Verifying Checksum Step #1: bae98e0cfe62: Download complete Step #1: 7c94181fc29a: Verifying Checksum Step #1: 7c94181fc29a: Download complete Step #1: 4018e9ce42a6: Verifying Checksum Step #1: 4018e9ce42a6: Download complete Step #1: 846994f6541d: Verifying Checksum Step #1: 846994f6541d: Download complete Step #1: 71174894d930: Verifying Checksum Step #1: 71174894d930: Download complete Step #1: bf9219ec845b: Verifying Checksum Step #1: bf9219ec845b: Download complete Step #1: bfb7b1a6728d: Verifying Checksum Step #1: bfb7b1a6728d: Download complete Step #1: e04ddd5d972b: Verifying Checksum Step #1: e04ddd5d972b: Download complete Step #1: 2e1d8e23a9a8: Verifying Checksum Step #1: 2e1d8e23a9a8: Download complete Step #1: 153eacb0a891: Verifying Checksum Step #1: 153eacb0a891: Download complete Step #1: 4d7aa988bb31: Verifying Checksum Step #1: 4d7aa988bb31: Download complete Step #1: f93820478c87: Download complete Step #1: d11b53fc85fe: Verifying Checksum Step #1: d11b53fc85fe: Download complete Step #1: 038020a237ce: Verifying Checksum Step #1: 416ea49f7c22: Verifying Checksum Step #1: 416ea49f7c22: Download complete Step #1: 9cdc40c52e67: Verifying Checksum Step #1: 9cdc40c52e67: Download complete Step #1: 93286fa4d809: Verifying Checksum Step #1: 93286fa4d809: Download complete Step #1: bee113eb3842: Verifying Checksum Step #1: bee113eb3842: Download complete Step #1: 88a7cbc5ce33: Verifying Checksum Step #1: 88a7cbc5ce33: Download complete Step #1: 5bdd6bc53e7b: Verifying Checksum Step #1: 5bdd6bc53e7b: Download complete Step #1: d171e73dd44a: Verifying Checksum Step #1: d171e73dd44a: Download complete Step #1: d84cd2be715d: Download complete Step #1: 9972794eff61: Download complete Step #1: 5fc1849ea29a: Pull complete Step #1: 5bca3ba2fc7d: Pull complete Step #1: c3f8f264f82b: Pull complete Step #1: 4beb7a10c8f4: Pull complete Step #1: 0ca13ee436c2: Pull complete Step #1: d11b53fc85fe: Pull complete Step #1: 1cbdd3829a23: Pull complete Step #1: 7f7781280c06: Pull complete Step #1: 846994f6541d: Pull complete Step #1: 83087fdbd323: Pull complete Step #1: 5e20af423505: Pull complete Step #1: 7e2d2d2efe99: Pull complete Step #1: bae98e0cfe62: Pull complete Step #1: 7c94181fc29a: Pull complete Step #1: 4018e9ce42a6: Pull complete Step #1: bf9219ec845b: Pull complete Step #1: 71174894d930: Pull complete Step #1: e04ddd5d972b: Pull complete Step #1: bfb7b1a6728d: Pull complete Step #1: 2e1d8e23a9a8: Pull complete Step #1: 153eacb0a891: Pull complete Step #1: 4d7aa988bb31: Pull complete Step #1: f93820478c87: Pull complete Step #1: 038020a237ce: Pull complete Step #1: 416ea49f7c22: Pull complete Step #1: 9cdc40c52e67: Pull complete Step #1: bee113eb3842: Pull complete Step #1: 93286fa4d809: Pull complete Step #1: 88a7cbc5ce33: Pull complete Step #1: 5bdd6bc53e7b: Pull complete Step #1: d84cd2be715d: Pull complete Step #1: d171e73dd44a: Pull complete Step #1: 9972794eff61: Pull complete Step #1: Digest: sha256:a2f870afb8e148c5cfc32450b790335c008e4a0c77e210bbb8adf0c60caae5c6 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> dd198c39e8a6 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y make cmake Step #1: ---> Running in 1e3d1f5fb65b Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (345 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: Suggested packages: Step #1: cmake-doc ninja-build lrzip Step #1: The following NEW packages will be installed: Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 15.0 MB of archives. Step #1: After this operation, 65.0 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.4 [327 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 15.0 MB in 2s (9249 kB/s) Step #1: Selecting previously unselected package libicu66:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.4_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 1e3d1f5fb65b Step #1: ---> 013f067051e6 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/sctplab/usrsctp usrsctp Step #1: ---> Running in 3b29edcec6f0 Step #1: Cloning into 'usrsctp'... Step #1: Removing intermediate container 3b29edcec6f0 Step #1: ---> d8cb098e2149 Step #1: Step 4/5 : WORKDIR usrsctp Step #1: ---> Running in dd39df0e3a20 Step #1: Removing intermediate container dd39df0e3a20 Step #1: ---> 0e8e7d47d833 Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> 56707ab14116 Step #1: Successfully built 56707ab14116 Step #1: Successfully tagged gcr.io/oss-fuzz/usrsctp:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/usrsctp Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileyAY7pN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/usrsctp/.git Step #2 - "srcmap": + GIT_DIR=/src/usrsctp Step #2 - "srcmap": + cd /src/usrsctp Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sctplab/usrsctp Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2e1ab1050bbb6c710f6a475f1601acf1ae7ecb78 Step #2 - "srcmap": + jq_inplace /tmp/fileyAY7pN '."/src/usrsctp" = { type: "git", url: "https://github.com/sctplab/usrsctp", rev: "2e1ab1050bbb6c710f6a475f1601acf1ae7ecb78" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filebXuMw9 Step #2 - "srcmap": + cat /tmp/fileyAY7pN Step #2 - "srcmap": + jq '."/src/usrsctp" = { type: "git", url: "https://github.com/sctplab/usrsctp", rev: "2e1ab1050bbb6c710f6a475f1601acf1ae7ecb78" }' Step #2 - "srcmap": + mv /tmp/filebXuMw9 /tmp/fileyAY7pN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileyAY7pN Step #2 - "srcmap": + rm /tmp/fileyAY7pN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/usrsctp": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sctplab/usrsctp", Step #2 - "srcmap": "rev": "2e1ab1050bbb6c710f6a475f1601acf1ae7ecb78" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -Dsctp_build_programs=0 -Dsctp_debug=0 -Dsctp_invariants=1 -Dsctp_build_fuzzer=1 -DCMAKE_BUILD_TYPE=RelWithDebInfo . Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning (dev) at CMakeLists.txt:32 (project): Step #3 - "compile-libfuzzer-coverage-x86_64": cmake_minimum_required() should be called prior to this top-level project() Step #3 - "compile-libfuzzer-coverage-x86_64": call. Please see the cmake-commands(7) manual for usage documentation of Step #3 - "compile-libfuzzer-coverage-x86_64": both commands. Step #3 - "compile-libfuzzer-coverage-x86_64": This warning is for project developers. Use -Wno-dev to suppress it. Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Deprecation Warning at CMakeLists.txt:33 (cmake_minimum_required): Step #3 - "compile-libfuzzer-coverage-x86_64": Compatibility with CMake < 3.5 will be removed from a future version of Step #3 - "compile-libfuzzer-coverage-x86_64": CMake. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Update the VERSION argument value or use a ... suffix to tell Step #3 - "compile-libfuzzer-coverage-x86_64": CMake that the project does not need compatibility with older versions. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include file sys/queue.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include file sys/queue.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include files sys/socket.h, linux/if_addr.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include files sys/socket.h, linux/if_addr.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include files sys/socket.h, linux/rtnetlink.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include files sys/socket.h, linux/rtnetlink.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 4 include files sys/types.h, ..., netinet/ip_icmp.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 4 include files sys/types.h, ..., netinet/ip_icmp.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 3 include files sys/types.h, ..., net/route.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 3 include files sys/types.h, ..., net/route.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include file stdatomic.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include file stdatomic.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for usrsctp.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for usrsctp.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sa_len Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sa_len - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sin_len Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sin_len - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sin6_len Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sin6_len - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sconn_len Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test have_sconn_len - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wfloat_equal Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wfloat_equal - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wshadow Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wshadow - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wpointer_aritih Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wpointer_aritih - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wunreachable_code Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wunreachable_code - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_winit_self Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_winit_self - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_unused_function Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_unused_function - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_unused_parameter Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_unused_parameter - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_unreachable_code Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_unreachable_code - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wstrict_prototypes Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wstrict_prototypes - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Compiler flags (CMAKE_C_FLAGS): -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -std=c99 -pedantic -Wall -Wextra -Wfloat-equal -Wshadow -Wpointer-arith -Wunreachable-code -Winit-self -Wno-unused-function -Wno-unused-parameter -Wno-unreachable-code -Wstrict-prototypes -Werror -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_address_of_packed_member Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_address_of_packed_member - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_deprecated_declarations Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test has_wno_deprecated_declarations - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Threads: TRUE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (2.5s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/usrsctp Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_asconf.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_auth.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_bsd_addr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_callout.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_cc_functions.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_crc32.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_indata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_output.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_input.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_pcb.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_peeloff.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_sha1.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_ss_functions.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_sysctl.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_timer.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_userspace.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctp_usrreq.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet/sctputil.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/netinet6/sctp6_usrreq.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/user_mbuf.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/user_recv_thread.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/user_socket.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 58%] Building C object usrsctplib/CMakeFiles/usrsctp.dir/user_environment.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Linking C static library libusrsctp.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Built target usrsctp Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building C object fuzzer/CMakeFiles/fuzzer_listen.dir/fuzzer_listen.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building C object fuzzer/CMakeFiles/fuzzer_listen.dir/__/programs/programs_helper.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building C object fuzzer/CMakeFiles/fuzzer_listen_verbose.dir/fuzzer_listen.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building C object fuzzer/CMakeFiles/fuzzer_fragment.dir/fuzzer_fragment.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building C object fuzzer/CMakeFiles/fuzzer_listen_verbose.dir/__/programs/programs_helper.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building C object fuzzer/CMakeFiles/fuzzer_fragment.dir/__/programs/programs_helper.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building C object fuzzer/CMakeFiles/fuzzer_connect_multi.dir/fuzzer_connect.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building C object fuzzer/CMakeFiles/fuzzer_connect_multi_verbose.dir/fuzzer_connect.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building C object fuzzer/CMakeFiles/fuzzer_connect_multi.dir/__/programs/programs_helper.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building C object fuzzer/CMakeFiles/fuzzer_connect_multi_verbose.dir/__/programs/programs_helper.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Linking C executable fuzzer_connect_multi Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Linking C executable fuzzer_listen_verbose Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Linking C executable fuzzer_connect_multi_verbose Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Linking C executable fuzzer_listen Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable fuzzer_fragment Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzzer_connect_multi Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzzer_fragment Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzzer_listen Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzzer_listen_verbose Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzzer_connect_multi_verbose Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + TARGETS='fuzzer_connect fuzzer_listen fuzzer_fragment' Step #3 - "compile-libfuzzer-coverage-x86_64": + CORPUS='CORPUS_CONNECT CORPUS_LISTEN CORPUS_FRAGMENT' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n 'fuzzer_connect fuzzer_listen fuzzer_fragment' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'fuzzer_connect fuzzer_listen fuzzer_fragment' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d ' ' -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + target=fuzzer_connect Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'fuzzer_connect fuzzer_listen fuzzer_fragment' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/[^ ]* *\(.*\)$/\1/' Step #3 - "compile-libfuzzer-coverage-x86_64": + TARGETS='fuzzer_listen fuzzer_fragment' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'CORPUS_CONNECT CORPUS_LISTEN CORPUS_FRAGMENT' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d ' ' -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus=CORPUS_CONNECT Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'CORPUS_CONNECT CORPUS_LISTEN CORPUS_FRAGMENT' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/[^ ]* *\(.*\)$/\1/' Step #3 - "compile-libfuzzer-coverage-x86_64": + CORPUS='CORPUS_LISTEN CORPUS_FRAGMENT' Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_STAGE=0 -I . -I ../usrsctplib/ -c fuzzer_connect.c -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer_connect.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer_connect /workspace/out/libfuzzer-coverage-x86_64/fuzzer_connect.o -fsanitize=fuzzer ../usrsctplib/libusrsctp.a Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -f /workspace/out/libfuzzer-coverage-x86_64/fuzzer_connect.o Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -jr fuzzer_connect_seed_corpus.zip CORPUS_CONNECT/ Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000009 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000011 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000002 (deflated 25%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5764087333519360 (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000009 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5686965006761984 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000001 (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5688015225094144 (deflated 88%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000010 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-27ffd53d682a7908bf7569e32d904f049066b5d6 (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000006 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000001 (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000007 (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: asconf-002 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000011 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000003 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000008 (deflated 4%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5675883720867840 (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000007 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5737686959915008 (deflated 93%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5703269247352832 (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-4651341199966208 (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000000 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5645105154752512 (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-0a63175dc6b51474dc08197431ec36d11db5e77b (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: ecn-cwr-000001 (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000016 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000018 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000011-dropped (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5631536029499392 (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000004 (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-4790592673153024 (deflated 23%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000005 (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: shutdown-1.bin (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5204536192401408 (deflated 91%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000002 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000003 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000009 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-4706780001861632 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5649768725872640 (deflated 99%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000004 (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000002 (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000003 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000005-sack-express (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: forward-tsn-000001 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000010 (deflated 3%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: asconf-ack-002 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000009 (deflated 4%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000000 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: timeout-00b96dd43f1251438bb44daa0a5a24ae4df5bce5 (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5667542357245952 (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000006 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000010 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000007 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: asconf-ack-001 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000005 (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5741506257747968 (deflated 83%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5638658568224768 (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-4750230994812928 (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5141658569277440 (deflated 96%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5649242005176320 (deflated 5%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000005 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5676652788449280 (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000004 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: dummy-01 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000017 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000008 (deflated 5%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5736809862004736 (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5738321340006400 (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: init-ack-01 (deflated 9%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000010 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5989617778819072.fuzz (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-4790592673153024 (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000013 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000005-dopped (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: asconf-ack-003 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000005 (deflated 90%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: shutdown-ack-1.bin (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000014 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000004 (deflated 92%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000012 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: asconf-001 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5722044720742400 (deflated 87%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000002 (deflated 27%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000006 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000005-sack (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-05e67e673bace8eba6b1b2498e734133c98e3674 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_unconnected-5639391992610816 (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-4524087830118400 (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: heartbeat-ack-0002 (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000001 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000007 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: data-1.bin (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5734997805236224 (deflated 93%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000015 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: heartbeat-ack-0001 (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5759310927233024 (deflated 73%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000001 (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: leak-00bd871f5ce0596083fe8642c803c97f424b0c70 (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: init-ack-1.bin (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5686965006761984 (deflated 98%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-5631709814456320 (deflated 42%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: shutdown-complete-1.bin (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5634380847906816 (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-4846769996562432 (deflated 96%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-5127495803469824 (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: leak-4e7e4f4a8318a1da7e35d9907d49e78d4a34dfc8 (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000000-dropped (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000000 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000006 (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: addip-000000 (deflated 16%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000015-dropped (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_unconnected-5767885871382528 (deflated 97%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: ecn-echo-000001 (deflated 7%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: shutdown-000001 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-000008 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: rtcweb-000003 (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tsctp-i-data-000008 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-fuzzer_connect-4750230994812928 (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: clusterfuzz-testcase-minimized-fuzzer_connect-4630702305050624 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzzer_connect_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n 'fuzzer_listen fuzzer_fragment' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'fuzzer_listen fuzzer_fragment' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d ' ' -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + target=fuzzer_listen Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'fuzzer_listen fuzzer_fragment' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/[^ ]* *\(.*\)$/\1/' Step #3 - "compile-libfuzzer-coverage-x86_64": + TARGETS=fuzzer_fragment Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'CORPUS_LISTEN CORPUS_FRAGMENT' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d ' ' -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus=CORPUS_LISTEN Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo 'CORPUS_LISTEN CORPUS_FRAGMENT' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/[^ ]* *\(.*\)$/\1/' Step #3 - "compile-libfuzzer-coverage-x86_64": + CORPUS=CORPUS_FRAGMENT Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_STAGE=0 -I . -I ../usrsctplib/ -c fuzzer_listen.c -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer_listen.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer_listen /workspace/out/libfuzzer-coverage-x86_64/fuzzer_listen.o -fsanitize=fuzzer ../usrsctplib/libusrsctp.a Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -f /workspace/out/libfuzzer-coverage-x86_64/fuzzer_listen.o Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -jr fuzzer_listen_seed_corpus.zip CORPUS_LISTEN/ Step #3 - "compile-libfuzzer-coverage-x86_64": adding: init-1.bin (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: crash-05a51aa145847f45c22aff604a670abba80063aa (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzzer_listen_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n fuzzer_fragment ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fuzzer_fragment Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d ' ' -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + target=fuzzer_fragment Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fuzzer_fragment Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/[^ ]* *\(.*\)$/\1/' Step #3 - "compile-libfuzzer-coverage-x86_64": + TARGETS= Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo CORPUS_FRAGMENT Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d ' ' -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpus=CORPUS_FRAGMENT Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo CORPUS_FRAGMENT Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/[^ ]* *\(.*\)$/\1/' Step #3 - "compile-libfuzzer-coverage-x86_64": + CORPUS= Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_STAGE=0 -I . -I ../usrsctplib/ -c fuzzer_fragment.c -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer_fragment.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer_fragment /workspace/out/libfuzzer-coverage-x86_64/fuzzer_fragment.o -fsanitize=fuzzer ../usrsctplib/libusrsctp.a Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -f /workspace/out/libfuzzer-coverage-x86_64/fuzzer_fragment.o Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -jr fuzzer_fragment_seed_corpus.zip CORPUS_FRAGMENT/ Step #3 - "compile-libfuzzer-coverage-x86_64": adding: sackfile-002 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-idata-0001 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: sackfile-006 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-005 (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: sackfile-001 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-data-0003 (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-006 (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-007 (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: sackfile-005 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-idata-0004 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-idata-0003 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-idata-0005 (deflated 93%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-data-0001 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-data-0002 (deflated 95%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-001 (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-data-0005 (deflated 93%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-002 (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-008 (deflated 82%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-data-0004 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-003 (deflated 32%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: sackfile-003 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: sackfile-004 (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: fragment-idata-0002 (deflated 94%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: nrsackfile-004 (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzzer_fragment_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n '' ']' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 5fc1849ea29a: Already exists Step #4: 5bca3ba2fc7d: Already exists Step #4: fae44f6c4afb: Pulling fs layer Step #4: 6bb086a76dac: Pulling fs layer Step #4: 93d27c16d33e: Pulling fs layer Step #4: 2ed907c114e3: Pulling fs layer Step #4: c356b7427c88: Pulling fs layer Step #4: e8d856c3fdca: Pulling fs layer Step #4: 3931eca29f39: Pulling fs layer Step #4: b76e3f62a0ba: Pulling fs layer Step #4: 7bfd5336ece5: Pulling fs layer Step #4: e0b08c0fdc11: Pulling fs layer Step #4: 2846796a4416: Pulling fs layer Step #4: 6cc7e05a106e: Pulling fs layer Step #4: 6c44541c6a30: Pulling fs layer Step #4: 110ea339d19c: Pulling fs layer Step #4: 080996c25b34: Pulling fs layer Step #4: 4c9dcebec043: Pulling fs layer Step #4: 5e63b9addfd0: Pulling fs layer Step #4: 7606710857f8: Pulling fs layer Step #4: 47b62b419d91: Pulling fs layer Step #4: e8d856c3fdca: Waiting Step #4: 3931eca29f39: Waiting Step #4: be88441f6a95: Pulling fs layer Step #4: b76e3f62a0ba: Waiting Step #4: 6e1d3dc39f27: Pulling fs layer Step #4: 7bfd5336ece5: Waiting Step #4: e0b08c0fdc11: Waiting Step #4: 2846796a4416: Waiting Step #4: 8fd9caca2676: Pulling fs layer Step #4: 10ceb6aa6ab4: Pulling fs layer Step #4: 6cc7e05a106e: Waiting Step #4: 080996c25b34: Waiting Step #4: 47b62b419d91: Waiting Step #4: 6c44541c6a30: Waiting Step #4: 4c9dcebec043: Waiting Step #4: be88441f6a95: Waiting Step #4: 6e1d3dc39f27: Waiting Step #4: 8fd9caca2676: Waiting Step #4: 10ceb6aa6ab4: Waiting Step #4: 110ea339d19c: Waiting Step #4: 2ed907c114e3: Waiting Step #4: 93d27c16d33e: Download complete Step #4: fae44f6c4afb: Verifying Checksum Step #4: fae44f6c4afb: Download complete Step #4: 6bb086a76dac: Verifying Checksum Step #4: 6bb086a76dac: Download complete Step #4: c356b7427c88: Verifying Checksum Step #4: c356b7427c88: Download complete Step #4: 2ed907c114e3: Verifying Checksum Step #4: 2ed907c114e3: Download complete Step #4: fae44f6c4afb: Pull complete Step #4: 3931eca29f39: Verifying Checksum Step #4: 3931eca29f39: Download complete Step #4: b76e3f62a0ba: Download complete Step #4: 7bfd5336ece5: Verifying Checksum Step #4: 7bfd5336ece5: Download complete Step #4: 6bb086a76dac: Pull complete Step #4: e8d856c3fdca: Verifying Checksum Step #4: e8d856c3fdca: Download complete Step #4: 2846796a4416: Verifying Checksum Step #4: 2846796a4416: Download complete Step #4: 93d27c16d33e: Pull complete Step #4: 6cc7e05a106e: Verifying Checksum Step #4: 6cc7e05a106e: Download complete Step #4: 6c44541c6a30: Verifying Checksum Step #4: 6c44541c6a30: Download complete Step #4: 2ed907c114e3: Pull complete Step #4: 080996c25b34: Download complete Step #4: c356b7427c88: Pull complete Step #4: e0b08c0fdc11: Verifying Checksum Step #4: e0b08c0fdc11: Download complete Step #4: 110ea339d19c: Verifying Checksum Step #4: 110ea339d19c: Download complete Step #4: 5e63b9addfd0: Verifying Checksum Step #4: 5e63b9addfd0: Download complete Step #4: 7606710857f8: Download complete Step #4: 47b62b419d91: Verifying Checksum Step #4: 47b62b419d91: Download complete Step #4: be88441f6a95: Verifying Checksum Step #4: be88441f6a95: Download complete Step #4: 6e1d3dc39f27: Verifying Checksum Step #4: 6e1d3dc39f27: Download complete Step #4: 8fd9caca2676: Verifying Checksum Step #4: 8fd9caca2676: Download complete Step #4: 10ceb6aa6ab4: Verifying Checksum Step #4: 10ceb6aa6ab4: Download complete Step #4: e8d856c3fdca: Pull complete Step #4: 4c9dcebec043: Verifying Checksum Step #4: 4c9dcebec043: Download complete Step #4: 3931eca29f39: Pull complete Step #4: b76e3f62a0ba: Pull complete Step #4: 7bfd5336ece5: Pull complete Step #4: e0b08c0fdc11: Pull complete Step #4: 2846796a4416: Pull complete Step #4: 6cc7e05a106e: Pull complete Step #4: 6c44541c6a30: Pull complete Step #4: 110ea339d19c: Pull complete Step #4: 080996c25b34: Pull complete Step #4: 4c9dcebec043: Pull complete Step #4: 5e63b9addfd0: Pull complete Step #4: 7606710857f8: Pull complete Step #4: 47b62b419d91: Pull complete Step #4: be88441f6a95: Pull complete Step #4: 6e1d3dc39f27: Pull complete Step #4: 8fd9caca2676: Pull complete Step #4: 10ceb6aa6ab4: Pull complete Step #4: Digest: sha256:dc299f69dfed0a7c14bd3c39c65c153824e6f98156f34438d47c59f39aa939bf Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzzer_connect.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzzer_connect.zip or Step #5: /corpus/fuzzer_connect.zip.zip, and cannot find /corpus/fuzzer_connect.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzzer_connect. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzzer_listen.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzzer_listen.zip or Step #5: /corpus/fuzzer_listen.zip.zip, and cannot find /corpus/fuzzer_listen.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzzer_listen. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image usrsctp Step #5: python infra/helper.py build_fuzzers --sanitizer coverage usrsctp Step #5: python infra/helper.py coverage usrsctp Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1