starting build "3e5bf6d3-694b-414c-bf24-2b33b75c95f4" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: dd0bbb17640b: Pulling fs layer Step #1: 62275a527176: Pulling fs layer Step #1: 111633040162: Pulling fs layer Step #1: 5bf7dd58428c: Pulling fs layer Step #1: 632c9b314f45: Pulling fs layer Step #1: 8ae501891266: Pulling fs layer Step #1: 3058f8e90c86: Pulling fs layer Step #1: c377fa4fb781: Pulling fs layer Step #1: 2336eb300fb9: Pulling fs layer Step #1: 09429854c898: Pulling fs layer Step #1: 71af8faf61ed: Pulling fs layer Step #1: 687fd097ee80: Pulling fs layer Step #1: 111633040162: Waiting Step #1: 7f1e63401161: Pulling fs layer Step #1: cf8b5802c762: Pulling fs layer Step #1: 5bf7dd58428c: Waiting Step #1: 0e6dab0925eb: Pulling fs layer Step #1: f4bced45a7b2: Pulling fs layer Step #1: 2707ad88823d: Pulling fs layer Step #1: af6705528e9c: Pulling fs layer Step #1: 4e1005e0a6aa: Pulling fs layer Step #1: 632c9b314f45: Waiting Step #1: 118105242bd8: Pulling fs layer Step #1: 2aa39f787b87: Pulling fs layer Step #1: 2336eb300fb9: Waiting Step #1: 8ae501891266: Waiting Step #1: d3f87be3762e: Pulling fs layer Step #1: 6fd806021fc2: Pulling fs layer Step #1: 3058f8e90c86: Waiting Step #1: 9d856dc172cd: Pulling fs layer Step #1: a987fc666fa1: Pulling fs layer Step #1: 233e05621483: Pulling fs layer Step #1: c377fa4fb781: Waiting Step #1: 09429854c898: Waiting Step #1: 0d3facbb2d8c: Pulling fs layer Step #1: 71af8faf61ed: Waiting Step #1: aa9066b95eb6: Pulling fs layer Step #1: 687fd097ee80: Waiting Step #1: ff11ed875e6f: Pulling fs layer Step #1: f4bced45a7b2: Waiting Step #1: 33f6a6d38c7e: Pulling fs layer Step #1: 5ecd2cf410de: Pulling fs layer Step #1: 702a45c3ae33: Pulling fs layer Step #1: df6fed191aed: Pulling fs layer Step #1: e322f8b94d88: Pulling fs layer Step #1: 0e6dab0925eb: Waiting Step #1: 7f1e63401161: Waiting Step #1: 2aa39f787b87: Waiting Step #1: d3f87be3762e: Waiting Step #1: 4e1005e0a6aa: Waiting Step #1: 0d3facbb2d8c: Waiting Step #1: 233e05621483: Waiting Step #1: 9d856dc172cd: Waiting Step #1: 702a45c3ae33: Waiting Step #1: a987fc666fa1: Waiting Step #1: 118105242bd8: Waiting Step #1: 2707ad88823d: Waiting Step #1: aa9066b95eb6: Waiting Step #1: cf8b5802c762: Waiting Step #1: af6705528e9c: Waiting Step #1: df6fed191aed: Waiting Step #1: 62275a527176: Verifying Checksum Step #1: 62275a527176: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 5bf7dd58428c: Download complete Step #1: 111633040162: Verifying Checksum Step #1: 111633040162: Download complete Step #1: 632c9b314f45: Verifying Checksum Step #1: 632c9b314f45: Download complete Step #1: 3058f8e90c86: Verifying Checksum Step #1: 3058f8e90c86: Download complete Step #1: dd0bbb17640b: Download complete Step #1: c377fa4fb781: Download complete Step #1: b549f31133a9: Pull complete Step #1: 09429854c898: Verifying Checksum Step #1: 09429854c898: Download complete Step #1: 71af8faf61ed: Verifying Checksum Step #1: 71af8faf61ed: Download complete Step #1: 687fd097ee80: Download complete Step #1: 7f1e63401161: Verifying Checksum Step #1: 7f1e63401161: Download complete Step #1: cf8b5802c762: Verifying Checksum Step #1: cf8b5802c762: Download complete Step #1: 0e6dab0925eb: Download complete Step #1: 2336eb300fb9: Verifying Checksum Step #1: 2336eb300fb9: Download complete Step #1: 2707ad88823d: Verifying Checksum Step #1: 2707ad88823d: Download complete Step #1: f4bced45a7b2: Verifying Checksum Step #1: f4bced45a7b2: Download complete Step #1: af6705528e9c: Verifying Checksum Step #1: af6705528e9c: Download complete Step #1: 4e1005e0a6aa: Verifying Checksum Step #1: 4e1005e0a6aa: Download complete Step #1: 2aa39f787b87: Verifying Checksum Step #1: 2aa39f787b87: Download complete Step #1: 118105242bd8: Verifying Checksum Step #1: 118105242bd8: Download complete Step #1: 6fd806021fc2: Verifying Checksum Step #1: 6fd806021fc2: Download complete Step #1: d3f87be3762e: Verifying Checksum Step #1: d3f87be3762e: Download complete Step #1: 9d856dc172cd: Download complete Step #1: 8ae501891266: Verifying Checksum Step #1: 8ae501891266: Download complete Step #1: a987fc666fa1: Verifying Checksum Step #1: a987fc666fa1: Download complete Step #1: 233e05621483: Verifying Checksum Step #1: 233e05621483: Download complete Step #1: 0d3facbb2d8c: Verifying Checksum Step #1: 0d3facbb2d8c: Download complete Step #1: aa9066b95eb6: Verifying Checksum Step #1: aa9066b95eb6: Download complete Step #1: 33f6a6d38c7e: Download complete Step #1: ff11ed875e6f: Verifying Checksum Step #1: ff11ed875e6f: Download complete Step #1: 5ecd2cf410de: Download complete Step #1: 702a45c3ae33: Download complete Step #1: df6fed191aed: Verifying Checksum Step #1: df6fed191aed: Download complete Step #1: dd0bbb17640b: Pull complete Step #1: 62275a527176: Pull complete Step #1: 111633040162: Pull complete Step #1: 5bf7dd58428c: Pull complete Step #1: e322f8b94d88: Verifying Checksum Step #1: e322f8b94d88: Download complete Step #1: 632c9b314f45: Pull complete Step #1: 8ae501891266: Pull complete Step #1: 3058f8e90c86: Pull complete Step #1: c377fa4fb781: Pull complete Step #1: 2336eb300fb9: Pull complete Step #1: 09429854c898: Pull complete Step #1: 71af8faf61ed: Pull complete Step #1: 687fd097ee80: Pull complete Step #1: 7f1e63401161: Pull complete Step #1: cf8b5802c762: Pull complete Step #1: 0e6dab0925eb: Pull complete Step #1: f4bced45a7b2: Pull complete Step #1: 2707ad88823d: Pull complete Step #1: af6705528e9c: Pull complete Step #1: 4e1005e0a6aa: Pull complete Step #1: 118105242bd8: Pull complete Step #1: 2aa39f787b87: Pull complete Step #1: d3f87be3762e: Pull complete Step #1: 6fd806021fc2: Pull complete Step #1: 9d856dc172cd: Pull complete Step #1: a987fc666fa1: Pull complete Step #1: 233e05621483: Pull complete Step #1: 0d3facbb2d8c: Pull complete Step #1: aa9066b95eb6: Pull complete Step #1: ff11ed875e6f: Pull complete Step #1: 33f6a6d38c7e: Pull complete Step #1: 5ecd2cf410de: Pull complete Step #1: 702a45c3ae33: Pull complete Step #1: df6fed191aed: Pull complete Step #1: e322f8b94d88: Pull complete Step #1: Digest: sha256:defc8ca827fb14827b3bc0d63ae100bbab10dbd76ba16fbf1cdf373c9fb55216 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> c9a62ad2ae6b Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/dtolnay/serde-yaml serde-yaml Step #1: ---> Running in b916024e1e47 Step #1: Cloning into 'serde-yaml'... Step #1: Removing intermediate container b916024e1e47 Step #1: ---> 852f67f36bb7 Step #1: Step 3/4 : WORKDIR $SRC Step #1: ---> Running in e414f3bc9474 Step #1: Removing intermediate container e414f3bc9474 Step #1: ---> 71c89c5791f8 Step #1: Step 4/4 : COPY build.sh $SRC/ Step #1: ---> 4c2ecf4504c7 Step #1: Successfully built 4c2ecf4504c7 Step #1: Successfully tagged gcr.io/oss-fuzz/serde-yaml:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/serde-yaml Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filep6bMCN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/serde-yaml/.git Step #2 - "srcmap": + GIT_DIR=/src/serde-yaml Step #2 - "srcmap": + cd /src/serde-yaml Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/dtolnay/serde-yaml Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2009506d33767dfc88e979d6bc0d53d09f941c94 Step #2 - "srcmap": + jq_inplace /tmp/filep6bMCN '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filen8e12a Step #2 - "srcmap": + cat /tmp/filep6bMCN Step #2 - "srcmap": + jq '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": + mv /tmp/filen8e12a /tmp/filep6bMCN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filep6bMCN Step #2 - "srcmap": + rm /tmp/filep6bMCN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/serde-yaml": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/dtolnay/serde-yaml", Step #2 - "srcmap": "rev": "2009506d33767dfc88e979d6bc0d53d09f941c94" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Locking 20 packages to latest compatible versions Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v2.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.2.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.15.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.217 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.169 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.217 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.15.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v2.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.2.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_yaml v0.9.34+deprecated (/src/serde-yaml) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_yaml-fuzz v0.0.0 (/src/serde-yaml/fuzz) Step #3 - "compile-libfuzzer-coverage-x86_64":  Finished `dev` profile [unoptimized + debuginfo] target(s) in 4.46s Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_from_slice /workspace/out/libfuzzer-coverage-x86_64/ Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: dd0bbb17640b: Already exists Step #4: 62275a527176: Already exists Step #4: 5fd16084d27b: Pulling fs layer Step #4: 3b4a256e94e2: Pulling fs layer Step #4: 1193775e083f: Pulling fs layer Step #4: f727a9982adf: Pulling fs layer Step #4: f8d818a221e1: Pulling fs layer Step #4: b9c799c7d67c: Pulling fs layer Step #4: 2591e08b7318: Pulling fs layer Step #4: bce2b20ed137: Pulling fs layer Step #4: aa6e1a4c641d: Pulling fs layer Step #4: b2d84ef78605: Pulling fs layer Step #4: 51141030c98b: Pulling fs layer Step #4: 1352417c166b: Pulling fs layer Step #4: 3e559a118ced: Pulling fs layer Step #4: 5ee64ebc3e2d: Pulling fs layer Step #4: b8fbef88b43f: Pulling fs layer Step #4: bca5011b5d98: Pulling fs layer Step #4: 4e6d480500bd: Pulling fs layer Step #4: 5bf153eb29f2: Pulling fs layer Step #4: e5dd31db85a2: Pulling fs layer Step #4: 1dc362db725d: Pulling fs layer Step #4: 323475a2805d: Pulling fs layer Step #4: 9746f385c510: Pulling fs layer Step #4: 0bf176c5c5f0: Pulling fs layer Step #4: f8d818a221e1: Waiting Step #4: b9c799c7d67c: Waiting Step #4: 2591e08b7318: Waiting Step #4: bce2b20ed137: Waiting Step #4: aa6e1a4c641d: Waiting Step #4: b2d84ef78605: Waiting Step #4: 51141030c98b: Waiting Step #4: 1352417c166b: Waiting Step #4: 3e559a118ced: Waiting Step #4: 5ee64ebc3e2d: Waiting Step #4: b8fbef88b43f: Waiting Step #4: bca5011b5d98: Waiting Step #4: 4e6d480500bd: Waiting Step #4: f727a9982adf: Waiting Step #4: 0bf176c5c5f0: Waiting Step #4: 5bf153eb29f2: Waiting Step #4: e5dd31db85a2: Waiting Step #4: 9746f385c510: Waiting Step #4: 1dc362db725d: Waiting Step #4: 1193775e083f: Verifying Checksum Step #4: 1193775e083f: Download complete Step #4: 5fd16084d27b: Verifying Checksum Step #4: 5fd16084d27b: Download complete Step #4: f8d818a221e1: Verifying Checksum Step #4: f8d818a221e1: Download complete Step #4: 3b4a256e94e2: Verifying Checksum Step #4: 3b4a256e94e2: Download complete Step #4: 5fd16084d27b: Pull complete Step #4: f727a9982adf: Verifying Checksum Step #4: f727a9982adf: Download complete Step #4: 2591e08b7318: Download complete Step #4: bce2b20ed137: Verifying Checksum Step #4: bce2b20ed137: Download complete Step #4: 3b4a256e94e2: Pull complete Step #4: aa6e1a4c641d: Download complete Step #4: 1193775e083f: Pull complete Step #4: b9c799c7d67c: Verifying Checksum Step #4: b9c799c7d67c: Download complete Step #4: 51141030c98b: Verifying Checksum Step #4: 51141030c98b: Download complete Step #4: f727a9982adf: Pull complete Step #4: 1352417c166b: Verifying Checksum Step #4: 1352417c166b: Download complete Step #4: 3e559a118ced: Verifying Checksum Step #4: 3e559a118ced: Download complete Step #4: f8d818a221e1: Pull complete Step #4: b8fbef88b43f: Verifying Checksum Step #4: b8fbef88b43f: Download complete Step #4: b2d84ef78605: Verifying Checksum Step #4: b2d84ef78605: Download complete Step #4: 5ee64ebc3e2d: Verifying Checksum Step #4: 5ee64ebc3e2d: Download complete Step #4: 4e6d480500bd: Verifying Checksum Step #4: 4e6d480500bd: Download complete Step #4: 5bf153eb29f2: Verifying Checksum Step #4: 5bf153eb29f2: Download complete Step #4: e5dd31db85a2: Verifying Checksum Step #4: e5dd31db85a2: Download complete Step #4: 323475a2805d: Verifying Checksum Step #4: 323475a2805d: Download complete Step #4: 9746f385c510: Verifying Checksum Step #4: 9746f385c510: Download complete Step #4: b9c799c7d67c: Pull complete Step #4: 1dc362db725d: Verifying Checksum Step #4: 1dc362db725d: Download complete Step #4: bca5011b5d98: Verifying Checksum Step #4: bca5011b5d98: Download complete Step #4: 2591e08b7318: Pull complete Step #4: 0bf176c5c5f0: Verifying Checksum Step #4: 0bf176c5c5f0: Download complete Step #4: bce2b20ed137: Pull complete Step #4: aa6e1a4c641d: Pull complete Step #4: b2d84ef78605: Pull complete Step #4: 51141030c98b: Pull complete Step #4: 1352417c166b: Pull complete Step #4: 3e559a118ced: Pull complete Step #4: 5ee64ebc3e2d: Pull complete Step #4: b8fbef88b43f: Pull complete Step #4: bca5011b5d98: Pull complete Step #4: 4e6d480500bd: Pull complete Step #4: 5bf153eb29f2: Pull complete Step #4: e5dd31db85a2: Pull complete Step #4: 1dc362db725d: Pull complete Step #4: 323475a2805d: Pull complete Step #4: 9746f385c510: Pull complete Step #4: 0bf176c5c5f0: Pull complete Step #4: Digest: sha256:0f990cc1311f94fde83d4a8a4c39464ca2bb422b54915be66a43e132a6eab309 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_from_slice.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_from_slice.zip or Step #5: /corpus/fuzz_from_slice.zip.zip, and cannot find /corpus/fuzz_from_slice.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_from_slice. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image serde-yaml Step #5: python infra/helper.py build_fuzzers --sanitizer coverage serde-yaml Step #5: python infra/helper.py coverage serde-yaml Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1