starting build "3c838309-2dea-479f-887b-c31c989c873f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: 08c01a0ec47e: Pulling fs layer Step #1: d05a287432dd: Pulling fs layer Step #1: 232b127da3f0: Pulling fs layer Step #1: e7a839bb26fc: Pulling fs layer Step #1: 6534731cf05a: Pulling fs layer Step #1: 11a4699a2c89: Pulling fs layer Step #1: 1fa7d5e1485c: Pulling fs layer Step #1: 7381426b4d0e: Pulling fs layer Step #1: 3e277da4d6c9: Pulling fs layer Step #1: 9392aa08a03b: Pulling fs layer Step #1: 8cef76544e79: Pulling fs layer Step #1: 00afcfd20400: Pulling fs layer Step #1: 54bba30b1359: Pulling fs layer Step #1: e7a839bb26fc: Waiting Step #1: 0dc7b313bbff: Pulling fs layer Step #1: 6534731cf05a: Waiting Step #1: 007976612829: Pulling fs layer Step #1: a8623fd9fc0a: Pulling fs layer Step #1: 11a4699a2c89: Waiting Step #1: 19f382e797c5: Pulling fs layer Step #1: 7c4ee22b09b8: Pulling fs layer Step #1: edc7bac0d66b: Pulling fs layer Step #1: 1fa7d5e1485c: Waiting Step #1: ea290f2fae94: Pulling fs layer Step #1: 8cef76544e79: Waiting Step #1: 7eb88aff1635: Pulling fs layer Step #1: 751855f1915d: Pulling fs layer Step #1: 00afcfd20400: Waiting Step #1: 9392aa08a03b: Waiting Step #1: 2028ab55969c: Pulling fs layer Step #1: 54bba30b1359: Waiting Step #1: 7381426b4d0e: Waiting Step #1: 3e277da4d6c9: Waiting Step #1: 0dc7b313bbff: Waiting Step #1: a8623fd9fc0a: Waiting Step #1: 7c4ee22b09b8: Waiting Step #1: 19f382e797c5: Waiting Step #1: 007976612829: Waiting Step #1: edc7bac0d66b: Waiting Step #1: 7eb88aff1635: Waiting Step #1: 751855f1915d: Waiting Step #1: 2028ab55969c: Waiting Step #1: 232b127da3f0: Download complete Step #1: 08c01a0ec47e: Verifying Checksum Step #1: 08c01a0ec47e: Download complete Step #1: d05a287432dd: Verifying Checksum Step #1: d05a287432dd: Download complete Step #1: e7a839bb26fc: Verifying Checksum Step #1: e7a839bb26fc: Download complete Step #1: 11a4699a2c89: Download complete Step #1: 6534731cf05a: Verifying Checksum Step #1: 6534731cf05a: Download complete Step #1: 7381426b4d0e: Verifying Checksum Step #1: 7381426b4d0e: Download complete Step #1: 9392aa08a03b: Verifying Checksum Step #1: 9392aa08a03b: Download complete Step #1: 8cef76544e79: Verifying Checksum Step #1: 8cef76544e79: Download complete Step #1: 08c01a0ec47e: Pull complete Step #1: 00afcfd20400: Verifying Checksum Step #1: 00afcfd20400: Download complete Step #1: 54bba30b1359: Verifying Checksum Step #1: 54bba30b1359: Download complete Step #1: 0dc7b313bbff: Verifying Checksum Step #1: 0dc7b313bbff: Download complete Step #1: 007976612829: Download complete Step #1: a8623fd9fc0a: Verifying Checksum Step #1: a8623fd9fc0a: Download complete Step #1: 19f382e797c5: Verifying Checksum Step #1: 19f382e797c5: Download complete Step #1: 3e277da4d6c9: Verifying Checksum Step #1: 3e277da4d6c9: Download complete Step #1: 7c4ee22b09b8: Download complete Step #1: edc7bac0d66b: Verifying Checksum Step #1: edc7bac0d66b: Download complete Step #1: d05a287432dd: Pull complete Step #1: ea290f2fae94: Download complete Step #1: 7eb88aff1635: Verifying Checksum Step #1: 7eb88aff1635: Download complete Step #1: 1fa7d5e1485c: Verifying Checksum Step #1: 1fa7d5e1485c: Download complete Step #1: 232b127da3f0: Pull complete Step #1: 2028ab55969c: Verifying Checksum Step #1: 2028ab55969c: Download complete Step #1: e7a839bb26fc: Pull complete Step #1: 751855f1915d: Verifying Checksum Step #1: 751855f1915d: Download complete Step #1: 6534731cf05a: Pull complete Step #1: 11a4699a2c89: Pull complete Step #1: 1fa7d5e1485c: Pull complete Step #1: 7381426b4d0e: Pull complete Step #1: 3e277da4d6c9: Pull complete Step #1: 9392aa08a03b: Pull complete Step #1: 8cef76544e79: Pull complete Step #1: 00afcfd20400: Pull complete Step #1: 54bba30b1359: Pull complete Step #1: 0dc7b313bbff: Pull complete Step #1: 007976612829: Pull complete Step #1: a8623fd9fc0a: Pull complete Step #1: 19f382e797c5: Pull complete Step #1: 7c4ee22b09b8: Pull complete Step #1: edc7bac0d66b: Pull complete Step #1: ea290f2fae94: Pull complete Step #1: 7eb88aff1635: Pull complete Step #1: 751855f1915d: Pull complete Step #1: 2028ab55969c: Pull complete Step #1: Digest: sha256:1158739f14c585a86767556ea911164f94cedb2b7a6e3facb41b104ee01c2641 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> fbb8278abce8 Step #1: Step 2/5 : RUN git clone https://github.com/google/gvisor Step #1: ---> Running in c69b5dae106f Step #1: Cloning into 'gvisor'... Step #1: Removing intermediate container c69b5dae106f Step #1: ---> d3c03d30b90b Step #1: Step 3/5 : COPY build.sh state_fuzzer.go $SRC/ Step #1: ---> f4f5d84cc7f7 Step #1: Step 4/5 : ENV GVISOR_ROOT $SRC/gvisor Step #1: ---> Running in d5dd46659abf Step #1: Removing intermediate container d5dd46659abf Step #1: ---> 7c794f9b9c98 Step #1: Step 5/5 : WORKDIR $GVISOR_ROOT Step #1: ---> Running in b5df763d5819 Step #1: Removing intermediate container b5df763d5819 Step #1: ---> 68e441911399 Step #1: Successfully built 68e441911399 Step #1: Successfully tagged gcr.io/oss-fuzz/gvisor:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gvisor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileH0ViIT Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gvisor/.git Step #2 - "srcmap": + GIT_DIR=/src/gvisor Step #2 - "srcmap": + cd /src/gvisor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gvisor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bcba5136d0d02b7a9b3c8979a886a452a9035ff7 Step #2 - "srcmap": + jq_inplace /tmp/fileH0ViIT '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "bcba5136d0d02b7a9b3c8979a886a452a9035ff7" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filesrb2gf Step #2 - "srcmap": + cat /tmp/fileH0ViIT Step #2 - "srcmap": + jq '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "bcba5136d0d02b7a9b3c8979a886a452a9035ff7" }' Step #2 - "srcmap": + mv /tmp/filesrb2gf /tmp/fileH0ViIT Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/aflplusplus/.git Step #2 - "srcmap": + GIT_DIR=/src/aflplusplus Step #2 - "srcmap": + cd /src/aflplusplus Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AFLplusplus/AFLplusplus.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=550ba4d77294e61597a5259d00769c61281e0042 Step #2 - "srcmap": + jq_inplace /tmp/fileH0ViIT '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "550ba4d77294e61597a5259d00769c61281e0042" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file3xpnOL Step #2 - "srcmap": + cat /tmp/fileH0ViIT Step #2 - "srcmap": + jq '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "550ba4d77294e61597a5259d00769c61281e0042" }' Step #2 - "srcmap": + mv /tmp/file3xpnOL /tmp/fileH0ViIT Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileH0ViIT Step #2 - "srcmap": + rm /tmp/fileH0ViIT Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gvisor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gvisor", Step #2 - "srcmap": "rev": "bcba5136d0d02b7a9b3c8979a886a452a9035ff7" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/aflplusplus": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AFLplusplus/AFLplusplus.git", Step #2 - "srcmap": "rev": "550ba4d77294e61597a5259d00769c61281e0042" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image: gcr.io/oss-fuzz/gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Zinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + git checkout go Step #3 - "compile-libfuzzer-coverage-x86_64": Switched to a new branch 'go' Step #3 - "compile-libfuzzer-coverage-x86_64": branch 'go' set up to track 'origin/go'. Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/state_fuzzer.go /src/gvisor/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer gvisor.dev/gvisor FuzzStateLoad state_load_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/gvisor.dev/gvisor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20211007075335-d3039528d8ac Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bazelbuild/rules_go v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.0.0-20191024005414-555d28b269f0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.0.3-0.20211123151946-c2389c3cb60a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.42.0-dev.0.20211020220737-f00baa6c3c84 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd v1.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/BurntSushi/toml v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pty v1.1.4-0.20190131011033-7dc38fb350b1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff v1.1.1-0.20190506075156-2146c9339422 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.0.0-20210220032951-036812b2e83c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/subcommands v1.0.2-0.20190508160503-636abe8753b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gofrs/flock v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mohae/deepcopy v0.0.0-20170308212314-bb9b5e7adda9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20180916011248-d98352740cb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattbaird/jsonpatch v0.0.0-20171005235357-81af80346b1a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.16.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.16.14-rc.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.16.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.0.1-0.20190930145447-2ec5bdc52b86 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20210503060351-7fd8e65b6420 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.0-20211101163701-50045581ed74 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.8.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runc v1.0.0-rc90 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gnostic v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools v2.2.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.0.0-20190522114515-bc1a522cf7b1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20190801114015-581e00157fb1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.0.0-20211005180243-6b3c2da341f1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/appengine v1.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.11.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e Step #3 - "compile-libfuzzer-coverage-x86_64": gvisor.dev/gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": gvisor.dev/gvisor Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: 08c01a0ec47e: Already exists Step #4: d05a287432dd: Already exists Step #4: 232b127da3f0: Already exists Step #4: b117bc0090ca: Pulling fs layer Step #4: ebdff54b359d: Pulling fs layer Step #4: e3a7c2f25172: Pulling fs layer Step #4: 93cafedf955b: Pulling fs layer Step #4: 55c23f9fcdf3: Pulling fs layer Step #4: cdb707c18d4c: Pulling fs layer Step #4: ed13c2b32300: Pulling fs layer Step #4: 8e84566d633a: Pulling fs layer Step #4: 65854a4b67f6: Pulling fs layer Step #4: 478525dfd861: Pulling fs layer Step #4: 6e1f4af7308d: Pulling fs layer Step #4: 65854a4b67f6: Waiting Step #4: 55c23f9fcdf3: Waiting Step #4: 478525dfd861: Waiting Step #4: 6e1f4af7308d: Waiting Step #4: cdb707c18d4c: Waiting Step #4: 8e84566d633a: Waiting Step #4: 93cafedf955b: Waiting Step #4: b117bc0090ca: Verifying Checksum Step #4: ebdff54b359d: Verifying Checksum Step #4: ebdff54b359d: Download complete Step #4: 93cafedf955b: Verifying Checksum Step #4: 93cafedf955b: Download complete Step #4: b117bc0090ca: Pull complete Step #4: 55c23f9fcdf3: Verifying Checksum Step #4: 55c23f9fcdf3: Download complete Step #4: ed13c2b32300: Download complete Step #4: ebdff54b359d: Pull complete Step #4: 8e84566d633a: Verifying Checksum Step #4: 8e84566d633a: Download complete Step #4: e3a7c2f25172: Verifying Checksum Step #4: e3a7c2f25172: Download complete Step #4: 478525dfd861: Verifying Checksum Step #4: 478525dfd861: Download complete Step #4: 6e1f4af7308d: Download complete Step #4: 65854a4b67f6: Download complete Step #4: cdb707c18d4c: Verifying Checksum Step #4: cdb707c18d4c: Download complete Step #4: e3a7c2f25172: Pull complete Step #4: 93cafedf955b: Pull complete Step #4: 55c23f9fcdf3: Pull complete Step #4: cdb707c18d4c: Pull complete Step #4: ed13c2b32300: Pull complete Step #4: 8e84566d633a: Pull complete Step #4: 65854a4b67f6: Pull complete Step #4: 478525dfd861: Pull complete Step #4: 6e1f4af7308d: Pull complete Step #4: Digest: sha256:e3c677cff44307ea31d0b1502df443a9c2126e7ff18db6e9a993c2570565a559 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/state_load_fuzz.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/state_load_fuzz.zip or Step #5: /corpus/state_load_fuzz.zip.zip, and cannot find /corpus/state_load_fuzz.zip.ZIP, period. Step #5: Failed to unpack the corpus for state_load_fuzz. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image gvisor Step #5: python infra/helper.py build_fuzzers --sanitizer coverage gvisor Step #5: python infra/helper.py coverage gvisor Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1