starting build "27fb918a-bb42-4e99-af78-41293c7b82c4" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 4.096kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 27a60affb188: Pulling fs layer Step #1: fe996ae7dc59: Pulling fs layer Step #1: 87e0e48e0cd6: Pulling fs layer Step #1: f835b9e0cf1c: Pulling fs layer Step #1: af789c137254: Pulling fs layer Step #1: aff0ac00717e: Pulling fs layer Step #1: 3b1039f9896d: Pulling fs layer Step #1: 03589768b946: Pulling fs layer Step #1: 476467ef4fc6: Pulling fs layer Step #1: 3c766dd49ffb: Pulling fs layer Step #1: cfbfe91f834e: Pulling fs layer Step #1: 0b187dafa8d3: Pulling fs layer Step #1: 345ac71c4767: Pulling fs layer Step #1: 7eadecc7791c: Pulling fs layer Step #1: dde9b3807101: Pulling fs layer Step #1: aa322f9d5179: Pulling fs layer Step #1: ed7ec7eeb8fb: Pulling fs layer Step #1: fcd3b4f5fe45: Pulling fs layer Step #1: 88e3f27d7c68: Pulling fs layer Step #1: 84249ace8dd9: Pulling fs layer Step #1: b48628b9660b: Pulling fs layer Step #1: af789c137254: Waiting Step #1: 560589aab225: Pulling fs layer Step #1: 8049d1ac7afb: Pulling fs layer Step #1: 9ca13435c3d5: Pulling fs layer Step #1: 03589768b946: Waiting Step #1: bdf125cfc8ec: Pulling fs layer Step #1: aff0ac00717e: Waiting Step #1: 479b0a7911fe: Pulling fs layer Step #1: 3b1039f9896d: Waiting Step #1: b33bd0575475: Pulling fs layer Step #1: 476467ef4fc6: Waiting Step #1: 58dcb60388c1: Pulling fs layer Step #1: 3c766dd49ffb: Waiting Step #1: b8e63fb00ce7: Pulling fs layer Step #1: d8ea79b21b9a: Pulling fs layer Step #1: 74524f23875e: Pulling fs layer Step #1: 8a3a946d5a7c: Pulling fs layer Step #1: 87e0e48e0cd6: Waiting Step #1: 8328a6d3718e: Pulling fs layer Step #1: 88e3f27d7c68: Waiting Step #1: 5cf1d6e2f591: Pulling fs layer Step #1: f835b9e0cf1c: Waiting Step #1: b48628b9660b: Waiting Step #1: 1c535dcf659d: Pulling fs layer Step #1: f611436a7c2a: Pulling fs layer Step #1: 8049d1ac7afb: Waiting Step #1: bdf125cfc8ec: Waiting Step #1: 479b0a7911fe: Waiting Step #1: b8e63fb00ce7: Waiting Step #1: d8ea79b21b9a: Waiting Step #1: 1c535dcf659d: Waiting Step #1: f611436a7c2a: Waiting Step #1: 74524f23875e: Waiting Step #1: dde9b3807101: Waiting Step #1: aa322f9d5179: Waiting Step #1: 8a3a946d5a7c: Waiting Step #1: 58dcb60388c1: Waiting Step #1: 0b187dafa8d3: Waiting Step #1: ed7ec7eeb8fb: Waiting Step #1: fcd3b4f5fe45: Waiting Step #1: 345ac71c4767: Waiting Step #1: 560589aab225: Waiting Step #1: 8328a6d3718e: Waiting Step #1: 5cf1d6e2f591: Waiting Step #1: fe996ae7dc59: Download complete Step #1: b549f31133a9: Download complete Step #1: f835b9e0cf1c: Verifying Checksum Step #1: f835b9e0cf1c: Download complete Step #1: af789c137254: Verifying Checksum Step #1: af789c137254: Download complete Step #1: 87e0e48e0cd6: Verifying Checksum Step #1: 87e0e48e0cd6: Download complete Step #1: 3b1039f9896d: Verifying Checksum Step #1: 3b1039f9896d: Download complete Step #1: 27a60affb188: Verifying Checksum Step #1: 27a60affb188: Download complete Step #1: 03589768b946: Verifying Checksum Step #1: 03589768b946: Download complete Step #1: b549f31133a9: Pull complete Step #1: 3c766dd49ffb: Verifying Checksum Step #1: 3c766dd49ffb: Download complete Step #1: cfbfe91f834e: Verifying Checksum Step #1: cfbfe91f834e: Download complete Step #1: 0b187dafa8d3: Verifying Checksum Step #1: 0b187dafa8d3: Download complete Step #1: 345ac71c4767: Verifying Checksum Step #1: 345ac71c4767: Download complete Step #1: 7eadecc7791c: Verifying Checksum Step #1: 7eadecc7791c: Download complete Step #1: dde9b3807101: Verifying Checksum Step #1: dde9b3807101: Download complete Step #1: 476467ef4fc6: Verifying Checksum Step #1: 476467ef4fc6: Download complete Step #1: aa322f9d5179: Verifying Checksum Step #1: aa322f9d5179: Download complete Step #1: ed7ec7eeb8fb: Verifying Checksum Step #1: ed7ec7eeb8fb: Download complete Step #1: fcd3b4f5fe45: Download complete Step #1: 88e3f27d7c68: Download complete Step #1: 84249ace8dd9: Verifying Checksum Step #1: 84249ace8dd9: Download complete Step #1: b48628b9660b: Verifying Checksum Step #1: b48628b9660b: Download complete Step #1: 560589aab225: Verifying Checksum Step #1: 560589aab225: Download complete Step #1: aff0ac00717e: Verifying Checksum Step #1: aff0ac00717e: Download complete Step #1: 8049d1ac7afb: Verifying Checksum Step #1: 8049d1ac7afb: Download complete Step #1: 9ca13435c3d5: Download complete Step #1: bdf125cfc8ec: Verifying Checksum Step #1: bdf125cfc8ec: Download complete Step #1: b33bd0575475: Verifying Checksum Step #1: b33bd0575475: Download complete Step #1: 479b0a7911fe: Verifying Checksum Step #1: 479b0a7911fe: Download complete Step #1: 58dcb60388c1: Verifying Checksum Step #1: 58dcb60388c1: Download complete Step #1: d8ea79b21b9a: Verifying Checksum Step #1: d8ea79b21b9a: Download complete Step #1: b8e63fb00ce7: Verifying Checksum Step #1: b8e63fb00ce7: Download complete Step #1: 74524f23875e: Verifying Checksum Step #1: 74524f23875e: Download complete Step #1: 8a3a946d5a7c: Download complete Step #1: 8328a6d3718e: Download complete Step #1: 5cf1d6e2f591: Download complete Step #1: f611436a7c2a: Verifying Checksum Step #1: f611436a7c2a: Download complete Step #1: 27a60affb188: Pull complete Step #1: fe996ae7dc59: Pull complete Step #1: 87e0e48e0cd6: Pull complete Step #1: f835b9e0cf1c: Pull complete Step #1: af789c137254: Pull complete Step #1: 1c535dcf659d: Verifying Checksum Step #1: 1c535dcf659d: Download complete Step #1: aff0ac00717e: Pull complete Step #1: 3b1039f9896d: Pull complete Step #1: 03589768b946: Pull complete Step #1: 476467ef4fc6: Pull complete Step #1: 3c766dd49ffb: Pull complete Step #1: cfbfe91f834e: Pull complete Step #1: 0b187dafa8d3: Pull complete Step #1: 345ac71c4767: Pull complete Step #1: 7eadecc7791c: Pull complete Step #1: dde9b3807101: Pull complete Step #1: aa322f9d5179: Pull complete Step #1: ed7ec7eeb8fb: Pull complete Step #1: fcd3b4f5fe45: Pull complete Step #1: 88e3f27d7c68: Pull complete Step #1: 84249ace8dd9: Pull complete Step #1: b48628b9660b: Pull complete Step #1: 560589aab225: Pull complete Step #1: 8049d1ac7afb: Pull complete Step #1: 9ca13435c3d5: Pull complete Step #1: bdf125cfc8ec: Pull complete Step #1: 479b0a7911fe: Pull complete Step #1: b33bd0575475: Pull complete Step #1: 58dcb60388c1: Pull complete Step #1: b8e63fb00ce7: Pull complete Step #1: d8ea79b21b9a: Pull complete Step #1: 74524f23875e: Pull complete Step #1: 8a3a946d5a7c: Pull complete Step #1: 8328a6d3718e: Pull complete Step #1: 5cf1d6e2f591: Pull complete Step #1: 1c535dcf659d: Pull complete Step #1: f611436a7c2a: Pull complete Step #1: Digest: sha256:fc82f871f962d86d3eaf641af959105188b030d2ba7cd522610ff2629fa62281 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 199904efe5ba Step #1: Step 2/5 : RUN git clone --single-branch --depth=1 https://github.com/ethereum/go-ethereum $GOPATH/src/github.com/ethereum/go-ethereum Step #1: ---> Running in 3693eba4a474 Step #1: Cloning into '/root/go/src/github.com/ethereum/go-ethereum'... Step #1: Removing intermediate container 3693eba4a474 Step #1: ---> 9ad9f05f7203 Step #1: Step 3/5 : RUN (cd $GOPATH/src/github.com/ethereum/go-ethereum && go mod download) Step #1: ---> Running in a8bf51091bba Step #1: Removing intermediate container a8bf51091bba Step #1: ---> 6dd5120089da Step #1: Step 4/5 : RUN cp $GOPATH/src/github.com/ethereum/go-ethereum/oss-fuzz.sh $SRC/build.sh Step #1: ---> Running in 9295fcb5cdb2 Step #1: Removing intermediate container 9295fcb5cdb2 Step #1: ---> f35b01f6fbf4 Step #1: Step 5/5 : WORKDIR $SRC/ Step #1: ---> Running in c9712ca69d42 Step #1: Removing intermediate container c9712ca69d42 Step #1: ---> 4cf4c6d79eea Step #1: Successfully built 4cf4c6d79eea Step #1: Successfully tagged gcr.io/oss-fuzz/go-ethereum:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-ethereum Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file4B2HMM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/ethereum/go-ethereum/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": + cd /root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=53e8e1fdf2d41a93cd3355ccdad472cfea27289e Step #2 - "srcmap": + jq_inplace /tmp/file4B2HMM '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "53e8e1fdf2d41a93cd3355ccdad472cfea27289e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileuJGu1b Step #2 - "srcmap": + cat /tmp/file4B2HMM Step #2 - "srcmap": + jq '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "53e8e1fdf2d41a93cd3355ccdad472cfea27289e" }' Step #2 - "srcmap": + mv /tmp/fileuJGu1b /tmp/file4B2HMM Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file4B2HMM Step #2 - "srcmap": + rm /tmp/file4B2HMM Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/ethereum/go-ethereum": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ethereum/go-ethereum", Step #2 - "srcmap": "rev": "53e8e1fdf2d41a93cd3355ccdad472cfea27289e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + coverpkg=github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + go install github.com/holiman/gofuzz-shim@latest Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + repo=/root/go/src/github.com/ethereum/go-ethereum Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzAbi' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/decred/dcrd/crypto/blake256 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prysmaticlabs/gohashtree v0.0.1-alpha.0.20220714111606-acbb2962fb48 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leanovate/gopter v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dnaeon/go-vcr v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/datadriven v1.0.3-0.20230413201302-be42291fc80f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pingcap/errors v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=abi Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzABI/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/abi/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzABICorpus/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilEncoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEncoder/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEncoderCorpus/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzDecoder/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzDecoderCorpus/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzVmRuntime' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzVmRuntime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/runtime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzVmRuntimeCorpus/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts /root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzPrecompiledContracts' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=vm Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPrecompiledContracts/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/vm/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPrecompiledContractsCorpus/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp /root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzRlp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=types Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzRLP/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/types/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzRLPCorpus/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBlake2b' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/blake2b/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzKeystore' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPassword/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/keystore/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPasswordCorpus/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=/root/go/src/github.com/ethereum/go-ethereum/trie/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie /root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieCorpus/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie /root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzStackTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzStackTrie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzStackTrieCorpus/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_account_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzARange/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzARangeCorpus/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_storage_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzSRange/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzSRangeCorpus/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_byte_codes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzByteCodes/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzByteCodesCorpus/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_trie_nodes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrieNodes/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieNodesCorpus/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzAdd/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzAddCorpus/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMul/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMulCorpus/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Pair' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPair/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairCorpus/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTxfetcher' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/txfetcher/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1Add/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1AddCorpus/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1MultiExp/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1MultiExpCorpus/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2Add/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2AddCorpus/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2MultiExp/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2MultiExpCorpus/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPairing/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairingCorpus/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG1/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG1Corpus/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g2' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG2/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG2Corpus/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1Add/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1AddCorpus/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1MultiExp/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1MultiExpCorpus/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2Add/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2AddCorpus/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2MultiExp/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2MultiExpCorpus/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossPairing/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossPairingCorpus/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1SubgroupChecks/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1SubgroupChecksCorpus/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2SubgroupChecks/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2SubgroupChecksCorpus/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzSecp256k1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/secp256k1/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_eth_protocol_handlers' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=eth Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEthProtocolHandlers/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/eth/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEthProtocolHandlersCorpus/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 27a60affb188: Already exists Step #4: fe996ae7dc59: Already exists Step #4: 1fb60f76380f: Pulling fs layer Step #4: ceacc69a5eb6: Pulling fs layer Step #4: 56df53c7e92f: Pulling fs layer Step #4: 5b0678c590a1: Pulling fs layer Step #4: 643b93c5a493: Pulling fs layer Step #4: 3a053ccbe2fc: Pulling fs layer Step #4: 75399c9193ed: Pulling fs layer Step #4: 73b63ae67252: Pulling fs layer Step #4: 958e446b901c: Pulling fs layer Step #4: 596eac7a3fb3: Pulling fs layer Step #4: 3f5cabb069a2: Pulling fs layer Step #4: 82db9b94cb83: Pulling fs layer Step #4: c75b5213d1e6: Pulling fs layer Step #4: 09665408fcc1: Pulling fs layer Step #4: 512c6bb36969: Pulling fs layer Step #4: b8df1e8c820b: Pulling fs layer Step #4: 552a7107d98a: Pulling fs layer Step #4: eb6497a150eb: Pulling fs layer Step #4: 4e0ebe252713: Pulling fs layer Step #4: a210141399dc: Pulling fs layer Step #4: 49e603669c49: Pulling fs layer Step #4: fd39327fd459: Pulling fs layer Step #4: 471f435a1c08: Pulling fs layer Step #4: 3a053ccbe2fc: Waiting Step #4: 75399c9193ed: Waiting Step #4: 73b63ae67252: Waiting Step #4: 958e446b901c: Waiting Step #4: 596eac7a3fb3: Waiting Step #4: 3f5cabb069a2: Waiting Step #4: 82db9b94cb83: Waiting Step #4: c75b5213d1e6: Waiting Step #4: 09665408fcc1: Waiting Step #4: 512c6bb36969: Waiting Step #4: 5b0678c590a1: Waiting Step #4: b8df1e8c820b: Waiting Step #4: 552a7107d98a: Waiting Step #4: eb6497a150eb: Waiting Step #4: 471f435a1c08: Waiting Step #4: 49e603669c49: Waiting Step #4: fd39327fd459: Waiting Step #4: 56df53c7e92f: Verifying Checksum Step #4: 56df53c7e92f: Download complete Step #4: ceacc69a5eb6: Verifying Checksum Step #4: ceacc69a5eb6: Download complete Step #4: 1fb60f76380f: Download complete Step #4: 5b0678c590a1: Verifying Checksum Step #4: 5b0678c590a1: Download complete Step #4: 643b93c5a493: Verifying Checksum Step #4: 643b93c5a493: Download complete Step #4: 1fb60f76380f: Pull complete Step #4: 73b63ae67252: Verifying Checksum Step #4: 73b63ae67252: Download complete Step #4: 75399c9193ed: Download complete Step #4: 958e446b901c: Download complete Step #4: ceacc69a5eb6: Pull complete Step #4: 3a053ccbe2fc: Verifying Checksum Step #4: 3a053ccbe2fc: Download complete Step #4: 56df53c7e92f: Pull complete Step #4: 3f5cabb069a2: Verifying Checksum Step #4: 3f5cabb069a2: Download complete Step #4: 82db9b94cb83: Verifying Checksum Step #4: 82db9b94cb83: Download complete Step #4: 5b0678c590a1: Pull complete Step #4: c75b5213d1e6: Download complete Step #4: 643b93c5a493: Pull complete Step #4: 512c6bb36969: Verifying Checksum Step #4: 512c6bb36969: Download complete Step #4: 09665408fcc1: Verifying Checksum Step #4: 09665408fcc1: Download complete Step #4: 596eac7a3fb3: Verifying Checksum Step #4: 596eac7a3fb3: Download complete Step #4: 552a7107d98a: Verifying Checksum Step #4: eb6497a150eb: Verifying Checksum Step #4: eb6497a150eb: Download complete Step #4: 4e0ebe252713: Verifying Checksum Step #4: 4e0ebe252713: Download complete Step #4: 3a053ccbe2fc: Pull complete Step #4: a210141399dc: Verifying Checksum Step #4: a210141399dc: Download complete Step #4: 75399c9193ed: Pull complete Step #4: 49e603669c49: Verifying Checksum Step #4: 49e603669c49: Download complete Step #4: b8df1e8c820b: Verifying Checksum Step #4: b8df1e8c820b: Download complete Step #4: fd39327fd459: Download complete Step #4: 73b63ae67252: Pull complete Step #4: 471f435a1c08: Verifying Checksum Step #4: 471f435a1c08: Download complete Step #4: 958e446b901c: Pull complete Step #4: 596eac7a3fb3: Pull complete Step #4: 3f5cabb069a2: Pull complete Step #4: 82db9b94cb83: Pull complete Step #4: c75b5213d1e6: Pull complete Step #4: 09665408fcc1: Pull complete Step #4: 512c6bb36969: Pull complete Step #4: b8df1e8c820b: Pull complete Step #4: 552a7107d98a: Pull complete Step #4: eb6497a150eb: Pull complete Step #4: 4e0ebe252713: Pull complete Step #4: a210141399dc: Pull complete Step #4: 49e603669c49: Pull complete Step #4: fd39327fd459: Pull complete Step #4: 471f435a1c08: Pull complete Step #4: Digest: sha256:6380368e5a1bcc9a8c85c797794b7522f246f2693da3edf42319530441784b00 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/02/21 06:03:49 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2025/02/21 06:03:49 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/02/21 06:03:49 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: CommandException: No URLs matched. Do the files you're operating on exist? Finished Step #9 ERROR ERROR: build step 9 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1