starting build "817a1a52-a575-4855-a76e-e3e88c8c2931" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.144kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 3d710c687d00: Pulling fs layer Step #1: 5871c999bb7f: Pulling fs layer Step #1: 49000c630162: Pulling fs layer Step #1: 5392ce741eff: Pulling fs layer Step #1: 263734d12e9c: Pulling fs layer Step #1: 7306bd1f392c: Pulling fs layer Step #1: 4e4e8971c238: Pulling fs layer Step #1: ab58def3c482: Pulling fs layer Step #1: bf2fdf6c64d4: Pulling fs layer Step #1: 19538d0a2442: Pulling fs layer Step #1: 7810f4e9fe4d: Pulling fs layer Step #1: 9d66997e22ca: Pulling fs layer Step #1: 2ffeb66e248c: Pulling fs layer Step #1: e931b1039fcc: Pulling fs layer Step #1: 68e5052c5cfe: Pulling fs layer Step #1: 872fbc0da05e: Pulling fs layer Step #1: 4e4e8971c238: Waiting Step #1: 0c63282fb394: Pulling fs layer Step #1: bf2fdf6c64d4: Waiting Step #1: ab58def3c482: Waiting Step #1: 5392ce741eff: Waiting Step #1: 9e5473413b08: Pulling fs layer Step #1: 19538d0a2442: Waiting Step #1: e57b519feb8f: Pulling fs layer Step #1: 263734d12e9c: Waiting Step #1: 7bb19315c9db: Pulling fs layer Step #1: 7810f4e9fe4d: Waiting Step #1: 7ebdcf9f783d: Pulling fs layer Step #1: 68e5052c5cfe: Waiting Step #1: e931b1039fcc: Waiting Step #1: 9d66997e22ca: Waiting Step #1: ababc272d73e: Pulling fs layer Step #1: 9b86524e6f04: Pulling fs layer Step #1: 2ffeb66e248c: Waiting Step #1: b686b4d27010: Pulling fs layer Step #1: 41bd949d07dc: Pulling fs layer Step #1: 872fbc0da05e: Waiting Step #1: 752af61ae2bf: Pulling fs layer Step #1: 0c63282fb394: Waiting Step #1: 7306bd1f392c: Waiting Step #1: 9e5473413b08: Waiting Step #1: 9b3040955b60: Pulling fs layer Step #1: acb248606d61: Pulling fs layer Step #1: e57b519feb8f: Waiting Step #1: 4daa157fbf24: Pulling fs layer Step #1: a691504df577: Pulling fs layer Step #1: c4c6ca34d89b: Pulling fs layer Step #1: b94def7d434a: Pulling fs layer Step #1: 0e0d29e7e591: Pulling fs layer Step #1: 401e66b3862a: Pulling fs layer Step #1: 752af61ae2bf: Waiting Step #1: 9b3040955b60: Waiting Step #1: b94def7d434a: Waiting Step #1: ababc272d73e: Waiting Step #1: acb248606d61: Waiting Step #1: b686b4d27010: Waiting Step #1: 7ebdcf9f783d: Waiting Step #1: 9b86524e6f04: Waiting Step #1: 7bb19315c9db: Waiting Step #1: 4daa157fbf24: Waiting Step #1: a691504df577: Waiting Step #1: 0e0d29e7e591: Waiting Step #1: 401e66b3862a: Waiting Step #1: c4c6ca34d89b: Waiting Step #1: 5871c999bb7f: Verifying Checksum Step #1: 5871c999bb7f: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 49000c630162: Verifying Checksum Step #1: 49000c630162: Download complete Step #1: 5392ce741eff: Verifying Checksum Step #1: 5392ce741eff: Download complete Step #1: 263734d12e9c: Verifying Checksum Step #1: 263734d12e9c: Download complete Step #1: 4e4e8971c238: Verifying Checksum Step #1: 4e4e8971c238: Download complete Step #1: 3d710c687d00: Verifying Checksum Step #1: 3d710c687d00: Download complete Step #1: ab58def3c482: Verifying Checksum Step #1: ab58def3c482: Download complete Step #1: b549f31133a9: Pull complete Step #1: 19538d0a2442: Verifying Checksum Step #1: 19538d0a2442: Download complete Step #1: 7810f4e9fe4d: Verifying Checksum Step #1: 7810f4e9fe4d: Download complete Step #1: 9d66997e22ca: Verifying Checksum Step #1: 9d66997e22ca: Download complete Step #1: 2ffeb66e248c: Verifying Checksum Step #1: 2ffeb66e248c: Download complete Step #1: e931b1039fcc: Download complete Step #1: 68e5052c5cfe: Verifying Checksum Step #1: 68e5052c5cfe: Download complete Step #1: bf2fdf6c64d4: Verifying Checksum Step #1: bf2fdf6c64d4: Download complete Step #1: 872fbc0da05e: Verifying Checksum Step #1: 872fbc0da05e: Download complete Step #1: 0c63282fb394: Verifying Checksum Step #1: 0c63282fb394: Download complete Step #1: e57b519feb8f: Verifying Checksum Step #1: e57b519feb8f: Download complete Step #1: 9e5473413b08: Verifying Checksum Step #1: 9e5473413b08: Download complete Step #1: 7306bd1f392c: Verifying Checksum Step #1: 7306bd1f392c: Download complete Step #1: 7bb19315c9db: Verifying Checksum Step #1: 7bb19315c9db: Download complete Step #1: ababc272d73e: Verifying Checksum Step #1: ababc272d73e: Download complete Step #1: 9b86524e6f04: Verifying Checksum Step #1: 7ebdcf9f783d: Verifying Checksum Step #1: 7ebdcf9f783d: Download complete Step #1: b686b4d27010: Verifying Checksum Step #1: b686b4d27010: Download complete Step #1: 752af61ae2bf: Verifying Checksum Step #1: 752af61ae2bf: Download complete Step #1: 41bd949d07dc: Verifying Checksum Step #1: 41bd949d07dc: Download complete Step #1: 9b3040955b60: Verifying Checksum Step #1: 9b3040955b60: Download complete Step #1: 4daa157fbf24: Download complete Step #1: 3d710c687d00: Pull complete Step #1: acb248606d61: Verifying Checksum Step #1: acb248606d61: Download complete Step #1: a691504df577: Verifying Checksum Step #1: a691504df577: Download complete Step #1: c4c6ca34d89b: Download complete Step #1: 5871c999bb7f: Pull complete Step #1: 401e66b3862a: Download complete Step #1: b94def7d434a: Verifying Checksum Step #1: b94def7d434a: Download complete Step #1: 49000c630162: Pull complete Step #1: 5392ce741eff: Pull complete Step #1: 263734d12e9c: Pull complete Step #1: 0e0d29e7e591: Verifying Checksum Step #1: 0e0d29e7e591: Download complete Step #1: 7306bd1f392c: Pull complete Step #1: 4e4e8971c238: Pull complete Step #1: ab58def3c482: Pull complete Step #1: bf2fdf6c64d4: Pull complete Step #1: 19538d0a2442: Pull complete Step #1: 7810f4e9fe4d: Pull complete Step #1: 9d66997e22ca: Pull complete Step #1: 2ffeb66e248c: Pull complete Step #1: e931b1039fcc: Pull complete Step #1: 68e5052c5cfe: Pull complete Step #1: 872fbc0da05e: Pull complete Step #1: 0c63282fb394: Pull complete Step #1: 9e5473413b08: Pull complete Step #1: e57b519feb8f: Pull complete Step #1: 7bb19315c9db: Pull complete Step #1: 7ebdcf9f783d: Pull complete Step #1: ababc272d73e: Pull complete Step #1: 9b86524e6f04: Pull complete Step #1: b686b4d27010: Pull complete Step #1: 41bd949d07dc: Pull complete Step #1: 752af61ae2bf: Pull complete Step #1: 9b3040955b60: Pull complete Step #1: acb248606d61: Pull complete Step #1: 4daa157fbf24: Pull complete Step #1: a691504df577: Pull complete Step #1: c4c6ca34d89b: Pull complete Step #1: b94def7d434a: Pull complete Step #1: 0e0d29e7e591: Pull complete Step #1: 401e66b3862a: Pull complete Step #1: Digest: sha256:3b51b1207e7518ac41c7ff761618cb4ff02d98fb081a86d365d3d2cd2a4dcdad Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> d3da11f92b6d Step #1: Step 2/5 : RUN git clone --depth 1 https://github.com/openconfig/ygot Step #1: ---> Running in df99a2db8120 Step #1: Cloning into 'ygot'... Step #1: Removing intermediate container df99a2db8120 Step #1: ---> 825c95bc9fb9 Step #1: Step 3/5 : COPY build.sh $SRC/ Step #1: ---> 55f7a528847a Step #1: Step 4/5 : COPY fuzz.go $SRC/ygot/exampleoc/ Step #1: ---> 5db11bf642ab Step #1: Step 5/5 : WORKDIR $SRC/ygot Step #1: ---> Running in 3cd58f6521c3 Step #1: Removing intermediate container 3cd58f6521c3 Step #1: ---> 83cf5ac311de Step #1: Successfully built 83cf5ac311de Step #1: Successfully tagged gcr.io/oss-fuzz/ygot:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/ygot Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filesCbr0P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/ygot/.git Step #2 - "srcmap": + GIT_DIR=/src/ygot Step #2 - "srcmap": + cd /src/ygot Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/openconfig/ygot Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=100bd44fc21215ffcc4862f37d90f7c257b5fa2b Step #2 - "srcmap": + jq_inplace /tmp/filesCbr0P '."/src/ygot" = { type: "git", url: "https://github.com/openconfig/ygot", rev: "100bd44fc21215ffcc4862f37d90f7c257b5fa2b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileKMC65b Step #2 - "srcmap": + cat /tmp/filesCbr0P Step #2 - "srcmap": + jq '."/src/ygot" = { type: "git", url: "https://github.com/openconfig/ygot", rev: "100bd44fc21215ffcc4862f37d90f7c257b5fa2b" }' Step #2 - "srcmap": + mv /tmp/fileKMC65b /tmp/filesCbr0P Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filesCbr0P Step #2 - "srcmap": + rm /tmp/filesCbr0P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/ygot": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/openconfig/ygot", Step #2 - "srcmap": "rev": "100bd44fc21215ffcc4862f37d90f7c257b5fa2b" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/openconfig/ygot/exampleoc Fuzz fuzz_oc_unmarshall gofuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/openconfig/ygot/exampleoc: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.4 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.34.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openconfig/gnmi v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openconfig/goyang v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/glog v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/derekparker/trie v0.0.0-20221221181808-1424fce0c981 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.65.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230905200255-921286631fa9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openconfig/gribi v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/slog-shim v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.8.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/atomic v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240528184218-531527333157 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/openconfig/ygot/exampleoc Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/openconfig/ygot/exampleoc Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 3d710c687d00: Already exists Step #4: 5871c999bb7f: Already exists Step #4: ad204a766461: Pulling fs layer Step #4: aa4d922892b9: Pulling fs layer Step #4: c20c0e93a575: Pulling fs layer Step #4: c3498e8f92bf: Pulling fs layer Step #4: ea12bf4d758c: Pulling fs layer Step #4: 1c528096599d: Pulling fs layer Step #4: 22eae4685097: Pulling fs layer Step #4: 0b0b70aeae3e: Pulling fs layer Step #4: a11f70ce01e7: Pulling fs layer Step #4: 7864dd364e73: Pulling fs layer Step #4: 677db1e5ca03: Pulling fs layer Step #4: a5be37c75947: Pulling fs layer Step #4: c074acbeeb6b: Pulling fs layer Step #4: 815b2ed18259: Pulling fs layer Step #4: 4065e4da32a0: Pulling fs layer Step #4: a5114ccc782f: Pulling fs layer Step #4: 2e062109d3b1: Pulling fs layer Step #4: ea12bf4d758c: Waiting Step #4: a11f70ce01e7: Waiting Step #4: 1c528096599d: Waiting Step #4: 7864dd364e73: Waiting Step #4: 677db1e5ca03: Waiting Step #4: 22eae4685097: Waiting Step #4: a5be37c75947: Waiting Step #4: 0b0b70aeae3e: Waiting Step #4: c074acbeeb6b: Waiting Step #4: 815b2ed18259: Waiting Step #4: 4065e4da32a0: Waiting Step #4: a5114ccc782f: Waiting Step #4: 2e062109d3b1: Waiting Step #4: c3498e8f92bf: Waiting Step #4: c20c0e93a575: Verifying Checksum Step #4: c20c0e93a575: Download complete Step #4: ad204a766461: Verifying Checksum Step #4: ad204a766461: Download complete Step #4: aa4d922892b9: Verifying Checksum Step #4: aa4d922892b9: Download complete Step #4: ad204a766461: Pull complete Step #4: ea12bf4d758c: Verifying Checksum Step #4: ea12bf4d758c: Download complete Step #4: 1c528096599d: Verifying Checksum Step #4: 1c528096599d: Download complete Step #4: 22eae4685097: Verifying Checksum Step #4: 22eae4685097: Download complete Step #4: aa4d922892b9: Pull complete Step #4: c20c0e93a575: Pull complete Step #4: a11f70ce01e7: Download complete Step #4: 0b0b70aeae3e: Verifying Checksum Step #4: 0b0b70aeae3e: Download complete Step #4: c3498e8f92bf: Verifying Checksum Step #4: c3498e8f92bf: Download complete Step #4: a5be37c75947: Verifying Checksum Step #4: a5be37c75947: Download complete Step #4: 677db1e5ca03: Verifying Checksum Step #4: 677db1e5ca03: Download complete Step #4: c074acbeeb6b: Verifying Checksum Step #4: c074acbeeb6b: Download complete Step #4: 7864dd364e73: Verifying Checksum Step #4: 7864dd364e73: Download complete Step #4: 815b2ed18259: Verifying Checksum Step #4: 815b2ed18259: Download complete Step #4: a5114ccc782f: Verifying Checksum Step #4: a5114ccc782f: Download complete Step #4: 2e062109d3b1: Download complete Step #4: 4065e4da32a0: Verifying Checksum Step #4: 4065e4da32a0: Download complete Step #4: c3498e8f92bf: Pull complete Step #4: ea12bf4d758c: Pull complete Step #4: 1c528096599d: Pull complete Step #4: 22eae4685097: Pull complete Step #4: 0b0b70aeae3e: Pull complete Step #4: a11f70ce01e7: Pull complete Step #4: 7864dd364e73: Pull complete Step #4: 677db1e5ca03: Pull complete Step #4: a5be37c75947: Pull complete Step #4: c074acbeeb6b: Pull complete Step #4: 815b2ed18259: Pull complete Step #4: 4065e4da32a0: Pull complete Step #4: a5114ccc782f: Pull complete Step #4: 2e062109d3b1: Pull complete Step #4: Digest: sha256:76043b923f3c4981587d31e2bac9d2d15c5e61786163ddce20c96e78a301caa7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_oc_unmarshall.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_oc_unmarshall.zip or Step #5: /corpus/fuzz_oc_unmarshall.zip.zip, and cannot find /corpus/fuzz_oc_unmarshall.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_oc_unmarshall. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image ygot Step #5: python infra/helper.py build_fuzzers --sanitizer coverage ygot Step #5: python infra/helper.py coverage ygot Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1