starting build "f911892e-d96c-4944-86d3-475d0d092428" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.144kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 27a60affb188: Pulling fs layer Step #1: fe996ae7dc59: Pulling fs layer Step #1: 87e0e48e0cd6: Pulling fs layer Step #1: f835b9e0cf1c: Pulling fs layer Step #1: af789c137254: Pulling fs layer Step #1: aff0ac00717e: Pulling fs layer Step #1: 3b1039f9896d: Pulling fs layer Step #1: 03589768b946: Pulling fs layer Step #1: 476467ef4fc6: Pulling fs layer Step #1: 3c766dd49ffb: Pulling fs layer Step #1: cfbfe91f834e: Pulling fs layer Step #1: 0b187dafa8d3: Pulling fs layer Step #1: 345ac71c4767: Pulling fs layer Step #1: 7eadecc7791c: Pulling fs layer Step #1: dde9b3807101: Pulling fs layer Step #1: aa322f9d5179: Pulling fs layer Step #1: f835b9e0cf1c: Waiting Step #1: ed7ec7eeb8fb: Pulling fs layer Step #1: af789c137254: Waiting Step #1: aff0ac00717e: Waiting Step #1: fcd3b4f5fe45: Pulling fs layer Step #1: 87e0e48e0cd6: Waiting Step #1: 88e3f27d7c68: Pulling fs layer Step #1: 345ac71c4767: Waiting Step #1: 84249ace8dd9: Pulling fs layer Step #1: b48628b9660b: Pulling fs layer Step #1: 560589aab225: Pulling fs layer Step #1: 7eadecc7791c: Waiting Step #1: 8049d1ac7afb: Pulling fs layer Step #1: dde9b3807101: Waiting Step #1: 9ca13435c3d5: Pulling fs layer Step #1: bdf125cfc8ec: Pulling fs layer Step #1: 479b0a7911fe: Pulling fs layer Step #1: 3b1039f9896d: Waiting Step #1: b33bd0575475: Pulling fs layer Step #1: 58dcb60388c1: Pulling fs layer Step #1: aa322f9d5179: Waiting Step #1: 476467ef4fc6: Waiting Step #1: b8e63fb00ce7: Pulling fs layer Step #1: 88e3f27d7c68: Waiting Step #1: d8ea79b21b9a: Pulling fs layer Step #1: 03589768b946: Waiting Step #1: ed7ec7eeb8fb: Waiting Step #1: 84249ace8dd9: Waiting Step #1: fcd3b4f5fe45: Waiting Step #1: 3c766dd49ffb: Waiting Step #1: b48628b9660b: Waiting Step #1: cfbfe91f834e: Waiting Step #1: 74524f23875e: Pulling fs layer Step #1: 8049d1ac7afb: Waiting Step #1: 560589aab225: Waiting Step #1: 8a3a946d5a7c: Pulling fs layer Step #1: 58dcb60388c1: Waiting Step #1: 8328a6d3718e: Pulling fs layer Step #1: 9ca13435c3d5: Waiting Step #1: 0b187dafa8d3: Waiting Step #1: b8e63fb00ce7: Waiting Step #1: 5cf1d6e2f591: Pulling fs layer Step #1: d8ea79b21b9a: Waiting Step #1: 74524f23875e: Waiting Step #1: 479b0a7911fe: Waiting Step #1: 1c535dcf659d: Pulling fs layer Step #1: 8a3a946d5a7c: Waiting Step #1: f611436a7c2a: Pulling fs layer Step #1: 1c535dcf659d: Waiting Step #1: fe996ae7dc59: Verifying Checksum Step #1: fe996ae7dc59: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f835b9e0cf1c: Verifying Checksum Step #1: f835b9e0cf1c: Download complete Step #1: 87e0e48e0cd6: Verifying Checksum Step #1: 87e0e48e0cd6: Download complete Step #1: af789c137254: Download complete Step #1: 3b1039f9896d: Download complete Step #1: 27a60affb188: Verifying Checksum Step #1: 27a60affb188: Download complete Step #1: 03589768b946: Verifying Checksum Step #1: 03589768b946: Download complete Step #1: b549f31133a9: Pull complete Step #1: 3c766dd49ffb: Verifying Checksum Step #1: 3c766dd49ffb: Download complete Step #1: cfbfe91f834e: Verifying Checksum Step #1: cfbfe91f834e: Download complete Step #1: 0b187dafa8d3: Download complete Step #1: 345ac71c4767: Verifying Checksum Step #1: 345ac71c4767: Download complete Step #1: 7eadecc7791c: Verifying Checksum Step #1: 7eadecc7791c: Download complete Step #1: dde9b3807101: Verifying Checksum Step #1: dde9b3807101: Download complete Step #1: 476467ef4fc6: Verifying Checksum Step #1: 476467ef4fc6: Download complete Step #1: ed7ec7eeb8fb: Verifying Checksum Step #1: ed7ec7eeb8fb: Download complete Step #1: aa322f9d5179: Verifying Checksum Step #1: aa322f9d5179: Download complete Step #1: fcd3b4f5fe45: Verifying Checksum Step #1: fcd3b4f5fe45: Download complete Step #1: 88e3f27d7c68: Verifying Checksum Step #1: 88e3f27d7c68: Download complete Step #1: 84249ace8dd9: Verifying Checksum Step #1: 84249ace8dd9: Download complete Step #1: b48628b9660b: Verifying Checksum Step #1: b48628b9660b: Download complete Step #1: 8049d1ac7afb: Download complete Step #1: 560589aab225: Verifying Checksum Step #1: 560589aab225: Download complete Step #1: 9ca13435c3d5: Verifying Checksum Step #1: 9ca13435c3d5: Download complete Step #1: aff0ac00717e: Verifying Checksum Step #1: aff0ac00717e: Download complete Step #1: bdf125cfc8ec: Verifying Checksum Step #1: bdf125cfc8ec: Download complete Step #1: 479b0a7911fe: Verifying Checksum Step #1: 479b0a7911fe: Download complete Step #1: b33bd0575475: Verifying Checksum Step #1: b33bd0575475: Download complete Step #1: d8ea79b21b9a: Verifying Checksum Step #1: d8ea79b21b9a: Download complete Step #1: 58dcb60388c1: Verifying Checksum Step #1: 58dcb60388c1: Download complete Step #1: b8e63fb00ce7: Download complete Step #1: 8a3a946d5a7c: Verifying Checksum Step #1: 8a3a946d5a7c: Download complete Step #1: 74524f23875e: Verifying Checksum Step #1: 74524f23875e: Download complete Step #1: 8328a6d3718e: Download complete Step #1: f611436a7c2a: Download complete Step #1: 5cf1d6e2f591: Verifying Checksum Step #1: 5cf1d6e2f591: Download complete Step #1: 27a60affb188: Pull complete Step #1: fe996ae7dc59: Pull complete Step #1: 87e0e48e0cd6: Pull complete Step #1: f835b9e0cf1c: Pull complete Step #1: af789c137254: Pull complete Step #1: 1c535dcf659d: Verifying Checksum Step #1: 1c535dcf659d: Download complete Step #1: aff0ac00717e: Pull complete Step #1: 3b1039f9896d: Pull complete Step #1: 03589768b946: Pull complete Step #1: 476467ef4fc6: Pull complete Step #1: 3c766dd49ffb: Pull complete Step #1: cfbfe91f834e: Pull complete Step #1: 0b187dafa8d3: Pull complete Step #1: 345ac71c4767: Pull complete Step #1: 7eadecc7791c: Pull complete Step #1: dde9b3807101: Pull complete Step #1: aa322f9d5179: Pull complete Step #1: ed7ec7eeb8fb: Pull complete Step #1: fcd3b4f5fe45: Pull complete Step #1: 88e3f27d7c68: Pull complete Step #1: 84249ace8dd9: Pull complete Step #1: b48628b9660b: Pull complete Step #1: 560589aab225: Pull complete Step #1: 8049d1ac7afb: Pull complete Step #1: 9ca13435c3d5: Pull complete Step #1: bdf125cfc8ec: Pull complete Step #1: 479b0a7911fe: Pull complete Step #1: b33bd0575475: Pull complete Step #1: 58dcb60388c1: Pull complete Step #1: b8e63fb00ce7: Pull complete Step #1: d8ea79b21b9a: Pull complete Step #1: 74524f23875e: Pull complete Step #1: 8a3a946d5a7c: Pull complete Step #1: 8328a6d3718e: Pull complete Step #1: 5cf1d6e2f591: Pull complete Step #1: 1c535dcf659d: Pull complete Step #1: f611436a7c2a: Pull complete Step #1: Digest: sha256:fc82f871f962d86d3eaf641af959105188b030d2ba7cd522610ff2629fa62281 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 199904efe5ba Step #1: Step 2/5 : RUN git clone --depth 1 https://github.com/openconfig/ygot Step #1: ---> Running in 398fadd9d6f0 Step #1: Cloning into 'ygot'... Step #1: Removing intermediate container 398fadd9d6f0 Step #1: ---> 722fb0bc4739 Step #1: Step 3/5 : COPY build.sh $SRC/ Step #1: ---> f5f05c41e31a Step #1: Step 4/5 : COPY fuzz.go $SRC/ygot/exampleoc/ Step #1: ---> d804b049db66 Step #1: Step 5/5 : WORKDIR $SRC/ygot Step #1: ---> Running in 5f3aacbf46a9 Step #1: Removing intermediate container 5f3aacbf46a9 Step #1: ---> b566542e22af Step #1: Successfully built b566542e22af Step #1: Successfully tagged gcr.io/oss-fuzz/ygot:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/ygot Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filetVHHWP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/ygot/.git Step #2 - "srcmap": + GIT_DIR=/src/ygot Step #2 - "srcmap": + cd /src/ygot Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/openconfig/ygot Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=051f611c08cba3f1d4e38f8fbd6b991957f42905 Step #2 - "srcmap": + jq_inplace /tmp/filetVHHWP '."/src/ygot" = { type: "git", url: "https://github.com/openconfig/ygot", rev: "051f611c08cba3f1d4e38f8fbd6b991957f42905" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file3cLcwb Step #2 - "srcmap": + cat /tmp/filetVHHWP Step #2 - "srcmap": + jq '."/src/ygot" = { type: "git", url: "https://github.com/openconfig/ygot", rev: "051f611c08cba3f1d4e38f8fbd6b991957f42905" }' Step #2 - "srcmap": + mv /tmp/file3cLcwb /tmp/filetVHHWP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filetVHHWP Step #2 - "srcmap": + rm /tmp/filetVHHWP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/ygot": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/openconfig/ygot", Step #2 - "srcmap": "rev": "051f611c08cba3f1d4e38f8fbd6b991957f42905" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/openconfig/ygot/exampleoc Fuzz fuzz_oc_unmarshall gofuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/openconfig/ygot/exampleoc: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.24.0 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/glog v1.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openconfig/gnmi v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openconfig/goyang v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/derekparker/trie v0.0.0-20230829180723-39f4de51ef7d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.70.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openconfig/gribi v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20250218142911-aa4b98e5adaa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/slog-shim v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.8.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/openconfig/ygot/exampleoc Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/openconfig/ygot/exampleoc Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 27a60affb188: Already exists Step #4: fe996ae7dc59: Already exists Step #4: 1fb60f76380f: Pulling fs layer Step #4: ceacc69a5eb6: Pulling fs layer Step #4: 56df53c7e92f: Pulling fs layer Step #4: 5b0678c590a1: Pulling fs layer Step #4: 643b93c5a493: Pulling fs layer Step #4: 3a053ccbe2fc: Pulling fs layer Step #4: 75399c9193ed: Pulling fs layer Step #4: 73b63ae67252: Pulling fs layer Step #4: 958e446b901c: Pulling fs layer Step #4: 596eac7a3fb3: Pulling fs layer Step #4: 3f5cabb069a2: Pulling fs layer Step #4: 82db9b94cb83: Pulling fs layer Step #4: c75b5213d1e6: Pulling fs layer Step #4: 09665408fcc1: Pulling fs layer Step #4: 512c6bb36969: Pulling fs layer Step #4: b8df1e8c820b: Pulling fs layer Step #4: 5b0678c590a1: Waiting Step #4: 643b93c5a493: Waiting Step #4: 3a053ccbe2fc: Waiting Step #4: 552a7107d98a: Pulling fs layer Step #4: 75399c9193ed: Waiting Step #4: eb6497a150eb: Pulling fs layer Step #4: 73b63ae67252: Waiting Step #4: 4e0ebe252713: Pulling fs layer Step #4: 958e446b901c: Waiting Step #4: a210141399dc: Pulling fs layer Step #4: 49e603669c49: Pulling fs layer Step #4: 596eac7a3fb3: Waiting Step #4: fd39327fd459: Pulling fs layer Step #4: 3f5cabb069a2: Waiting Step #4: 471f435a1c08: Pulling fs layer Step #4: 82db9b94cb83: Waiting Step #4: b8df1e8c820b: Waiting Step #4: c75b5213d1e6: Waiting Step #4: 552a7107d98a: Waiting Step #4: a210141399dc: Waiting Step #4: eb6497a150eb: Waiting Step #4: 09665408fcc1: Waiting Step #4: 49e603669c49: Waiting Step #4: 4e0ebe252713: Waiting Step #4: 471f435a1c08: Waiting Step #4: fd39327fd459: Waiting Step #4: 512c6bb36969: Waiting Step #4: 56df53c7e92f: Verifying Checksum Step #4: 56df53c7e92f: Download complete Step #4: 1fb60f76380f: Download complete Step #4: ceacc69a5eb6: Verifying Checksum Step #4: ceacc69a5eb6: Download complete Step #4: 643b93c5a493: Verifying Checksum Step #4: 643b93c5a493: Download complete Step #4: 1fb60f76380f: Pull complete Step #4: 5b0678c590a1: Verifying Checksum Step #4: 5b0678c590a1: Download complete Step #4: 75399c9193ed: Verifying Checksum Step #4: 75399c9193ed: Download complete Step #4: 73b63ae67252: Verifying Checksum Step #4: 73b63ae67252: Download complete Step #4: ceacc69a5eb6: Pull complete Step #4: 958e446b901c: Download complete Step #4: 56df53c7e92f: Pull complete Step #4: 3a053ccbe2fc: Verifying Checksum Step #4: 3a053ccbe2fc: Download complete Step #4: 3f5cabb069a2: Verifying Checksum Step #4: 3f5cabb069a2: Download complete Step #4: 5b0678c590a1: Pull complete Step #4: 82db9b94cb83: Verifying Checksum Step #4: 82db9b94cb83: Download complete Step #4: c75b5213d1e6: Verifying Checksum Step #4: c75b5213d1e6: Download complete Step #4: 643b93c5a493: Pull complete Step #4: 512c6bb36969: Verifying Checksum Step #4: 512c6bb36969: Download complete Step #4: 596eac7a3fb3: Verifying Checksum Step #4: 596eac7a3fb3: Download complete Step #4: 09665408fcc1: Verifying Checksum Step #4: 09665408fcc1: Download complete Step #4: 552a7107d98a: Verifying Checksum Step #4: 552a7107d98a: Download complete Step #4: eb6497a150eb: Verifying Checksum Step #4: eb6497a150eb: Download complete Step #4: 4e0ebe252713: Verifying Checksum Step #4: 4e0ebe252713: Download complete Step #4: a210141399dc: Verifying Checksum Step #4: a210141399dc: Download complete Step #4: fd39327fd459: Download complete Step #4: 3a053ccbe2fc: Pull complete Step #4: 49e603669c49: Verifying Checksum Step #4: 49e603669c49: Download complete Step #4: 75399c9193ed: Pull complete Step #4: b8df1e8c820b: Verifying Checksum Step #4: b8df1e8c820b: Download complete Step #4: 471f435a1c08: Verifying Checksum Step #4: 471f435a1c08: Download complete Step #4: 73b63ae67252: Pull complete Step #4: 958e446b901c: Pull complete Step #4: 596eac7a3fb3: Pull complete Step #4: 3f5cabb069a2: Pull complete Step #4: 82db9b94cb83: Pull complete Step #4: c75b5213d1e6: Pull complete Step #4: 09665408fcc1: Pull complete Step #4: 512c6bb36969: Pull complete Step #4: b8df1e8c820b: Pull complete Step #4: 552a7107d98a: Pull complete Step #4: eb6497a150eb: Pull complete Step #4: 4e0ebe252713: Pull complete Step #4: a210141399dc: Pull complete Step #4: 49e603669c49: Pull complete Step #4: fd39327fd459: Pull complete Step #4: 471f435a1c08: Pull complete Step #4: Digest: sha256:6380368e5a1bcc9a8c85c797794b7522f246f2693da3edf42319530441784b00 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_oc_unmarshall.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_oc_unmarshall.zip or Step #5: /corpus/fuzz_oc_unmarshall.zip.zip, and cannot find /corpus/fuzz_oc_unmarshall.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_oc_unmarshall. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image ygot Step #5: python infra/helper.py build_fuzzers --sanitizer coverage ygot Step #5: python infra/helper.py coverage ygot Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1