starting build "2b2be386-7e9d-4a34-a839-7ec37794b7f9" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 4.096kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 69a4d646b31b: Pulling fs layer Step #1: 582bb720fb86: Pulling fs layer Step #1: a5f7635192c6: Pulling fs layer Step #1: e18eaadd8f1e: Pulling fs layer Step #1: 326cf4c5752a: Pulling fs layer Step #1: 29eeb58280b5: Pulling fs layer Step #1: d8c797fcc3e3: Pulling fs layer Step #1: 24fc4518d032: Pulling fs layer Step #1: ad1f927adcf8: Pulling fs layer Step #1: a6b6cf059117: Pulling fs layer Step #1: 6a9934a5ed88: Pulling fs layer Step #1: 912ceae91f5f: Pulling fs layer Step #1: 3bb06ca6f84d: Pulling fs layer Step #1: f001df7f2ab2: Pulling fs layer Step #1: 56e7a511e3b5: Pulling fs layer Step #1: adced5351c5b: Pulling fs layer Step #1: 14f222b4d885: Pulling fs layer Step #1: 752580a4392e: Pulling fs layer Step #1: a01adf8937c6: Pulling fs layer Step #1: f2a427ddc792: Pulling fs layer Step #1: e56937436f45: Pulling fs layer Step #1: 085ee5938b9a: Pulling fs layer Step #1: 88c9ac235257: Pulling fs layer Step #1: 1b54664d5d8e: Pulling fs layer Step #1: c99515e6fbc2: Pulling fs layer Step #1: 04c569c33e1d: Pulling fs layer Step #1: f3aed5655f6d: Pulling fs layer Step #1: 326cf4c5752a: Waiting Step #1: 29eeb58280b5: Waiting Step #1: d8c797fcc3e3: Waiting Step #1: 24fc4518d032: Waiting Step #1: ad1f927adcf8: Waiting Step #1: a6b6cf059117: Waiting Step #1: 6a9934a5ed88: Waiting Step #1: 912ceae91f5f: Waiting Step #1: 3bb06ca6f84d: Waiting Step #1: f001df7f2ab2: Waiting Step #1: 56e7a511e3b5: Waiting Step #1: adced5351c5b: Waiting Step #1: 14f222b4d885: Waiting Step #1: 752580a4392e: Waiting Step #1: a01adf8937c6: Waiting Step #1: f2a427ddc792: Waiting Step #1: e56937436f45: Waiting Step #1: 085ee5938b9a: Waiting Step #1: a5f7635192c6: Waiting Step #1: e18eaadd8f1e: Waiting Step #1: 88c9ac235257: Waiting Step #1: 1b54664d5d8e: Waiting Step #1: c99515e6fbc2: Waiting Step #1: 04c569c33e1d: Waiting Step #1: f3aed5655f6d: Waiting Step #1: 582bb720fb86: Verifying Checksum Step #1: 582bb720fb86: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: a5f7635192c6: Verifying Checksum Step #1: a5f7635192c6: Download complete Step #1: 326cf4c5752a: Verifying Checksum Step #1: 326cf4c5752a: Download complete Step #1: e18eaadd8f1e: Download complete Step #1: d8c797fcc3e3: Verifying Checksum Step #1: d8c797fcc3e3: Download complete Step #1: 24fc4518d032: Verifying Checksum Step #1: 24fc4518d032: Download complete Step #1: 69a4d646b31b: Verifying Checksum Step #1: 69a4d646b31b: Download complete Step #1: a6b6cf059117: Verifying Checksum Step #1: a6b6cf059117: Download complete Step #1: 6a9934a5ed88: Download complete Step #1: b549f31133a9: Pull complete Step #1: 912ceae91f5f: Verifying Checksum Step #1: 912ceae91f5f: Download complete Step #1: 3bb06ca6f84d: Download complete Step #1: f001df7f2ab2: Download complete Step #1: ad1f927adcf8: Verifying Checksum Step #1: ad1f927adcf8: Download complete Step #1: adced5351c5b: Verifying Checksum Step #1: adced5351c5b: Download complete Step #1: 14f222b4d885: Verifying Checksum Step #1: 14f222b4d885: Download complete Step #1: 56e7a511e3b5: Verifying Checksum Step #1: 56e7a511e3b5: Download complete Step #1: a01adf8937c6: Verifying Checksum Step #1: a01adf8937c6: Download complete Step #1: 752580a4392e: Verifying Checksum Step #1: f2a427ddc792: Verifying Checksum Step #1: f2a427ddc792: Download complete Step #1: 085ee5938b9a: Verifying Checksum Step #1: 085ee5938b9a: Download complete Step #1: e56937436f45: Download complete Step #1: 29eeb58280b5: Verifying Checksum Step #1: 29eeb58280b5: Download complete Step #1: 88c9ac235257: Verifying Checksum Step #1: 88c9ac235257: Download complete Step #1: 1b54664d5d8e: Download complete Step #1: c99515e6fbc2: Verifying Checksum Step #1: c99515e6fbc2: Download complete Step #1: f3aed5655f6d: Verifying Checksum Step #1: f3aed5655f6d: Download complete Step #1: 69a4d646b31b: Pull complete Step #1: 582bb720fb86: Pull complete Step #1: 04c569c33e1d: Verifying Checksum Step #1: 04c569c33e1d: Download complete Step #1: a5f7635192c6: Pull complete Step #1: e18eaadd8f1e: Pull complete Step #1: 326cf4c5752a: Pull complete Step #1: 29eeb58280b5: Pull complete Step #1: d8c797fcc3e3: Pull complete Step #1: 24fc4518d032: Pull complete Step #1: ad1f927adcf8: Pull complete Step #1: a6b6cf059117: Pull complete Step #1: 6a9934a5ed88: Pull complete Step #1: 912ceae91f5f: Pull complete Step #1: 3bb06ca6f84d: Pull complete Step #1: f001df7f2ab2: Pull complete Step #1: 56e7a511e3b5: Pull complete Step #1: adced5351c5b: Pull complete Step #1: 14f222b4d885: Pull complete Step #1: 752580a4392e: Pull complete Step #1: a01adf8937c6: Pull complete Step #1: f2a427ddc792: Pull complete Step #1: e56937436f45: Pull complete Step #1: 085ee5938b9a: Pull complete Step #1: 88c9ac235257: Pull complete Step #1: 1b54664d5d8e: Pull complete Step #1: c99515e6fbc2: Pull complete Step #1: 04c569c33e1d: Pull complete Step #1: f3aed5655f6d: Pull complete Step #1: Digest: sha256:2f56e6dbb391ad167666be6828d0d30421636bcc95552f5c1b15dbe73cbd3a71 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 301d4bb3a17a Step #1: Step 2/5 : RUN git clone --single-branch --depth=1 https://github.com/ethereum/go-ethereum $GOPATH/src/github.com/ethereum/go-ethereum Step #1: ---> Running in 8083f722ee5a Step #1: Cloning into '/root/go/src/github.com/ethereum/go-ethereum'... Step #1: Removing intermediate container 8083f722ee5a Step #1: ---> 85a6f15833d3 Step #1: Step 3/5 : RUN (cd $GOPATH/src/github.com/ethereum/go-ethereum && go mod download) Step #1: ---> Running in 327c7a779136 Step #1: Removing intermediate container 327c7a779136 Step #1: ---> e1bec57a0046 Step #1: Step 4/5 : RUN cp $GOPATH/src/github.com/ethereum/go-ethereum/oss-fuzz.sh $SRC/build.sh Step #1: ---> Running in 03eeb8bd2aa9 Step #1: Removing intermediate container 03eeb8bd2aa9 Step #1: ---> 123f6d4433b8 Step #1: Step 5/5 : WORKDIR $SRC/ Step #1: ---> Running in 26fcb2403156 Step #1: Removing intermediate container 26fcb2403156 Step #1: ---> cb211e2df91d Step #1: Successfully built cb211e2df91d Step #1: Successfully tagged gcr.io/oss-fuzz/go-ethereum:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-ethereum Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file5ic9BO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/ethereum/go-ethereum/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": + cd /root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=241cf62b5c8b70b1a4206587fa42606ad5de024a Step #2 - "srcmap": + jq_inplace /tmp/file5ic9BO '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "241cf62b5c8b70b1a4206587fa42606ad5de024a" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file7HPws9 Step #2 - "srcmap": + cat /tmp/file5ic9BO Step #2 - "srcmap": + jq '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "241cf62b5c8b70b1a4206587fa42606ad5de024a" }' Step #2 - "srcmap": + mv /tmp/file7HPws9 /tmp/file5ic9BO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file5ic9BO Step #2 - "srcmap": + rm /tmp/file5ic9BO Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/ethereum/go-ethereum": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ethereum/go-ethereum", Step #2 - "srcmap": "rev": "241cf62b5c8b70b1a4206587fa42606ad5de024a" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + coverpkg=github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/bitutil Fuzz fuzzBitutilCompress Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bitutil Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzBitutilCompress Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzBitutilCompress' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzBitutilCompress Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bitutil Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzBitutilCompress.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzBitutilCompress.a -o /workspace/out/libfuzzer-address-x86_64/fuzzBitutilCompress Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bitutil/testdata/fuzzBitutilCompress_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bitutil/testdata/fuzzBitutilCompress_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/bn256 FuzzAdd fuzzBn256Add Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-address-x86_64": + func=FuzzAdd Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzBn256Add' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzBn256Add Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func FuzzAdd -o /work/fuzzBn256Add.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzBn256Add.a -o /workspace/out/libfuzzer-address-x86_64/fuzzBn256Add Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/bn256 FuzzMul fuzzBn256Mul Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-address-x86_64": + func=FuzzMul Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzBn256Mul' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzBn256Mul Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func FuzzMul -o /work/fuzzBn256Mul.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzBn256Mul.a -o /workspace/out/libfuzzer-address-x86_64/fuzzBn256Mul Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/bn256 FuzzPair fuzzBn256Pair Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-address-x86_64": + func=FuzzPair Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzBn256Pair' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzBn256Pair Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func FuzzPair -o /work/fuzzBn256Pair.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzBn256Pair.a -o /workspace/out/libfuzzer-address-x86_64/fuzzBn256Pair Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/runtime Fuzz fuzzVmRuntime Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/runtime Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzVmRuntime' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzVmRuntime Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/runtime Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzVmRuntime.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzVmRuntime.a -o /workspace/out/libfuzzer-address-x86_64/fuzzVmRuntime Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/runtime/testdata/fuzzVmRuntime_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/runtime/testdata/fuzzVmRuntime_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/keystore Fuzz fuzzKeystore Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/keystore Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzKeystore' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzKeystore Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/keystore Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzKeystore.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzKeystore.a -o /workspace/out/libfuzzer-address-x86_64/fuzzKeystore Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/keystore/testdata/fuzzKeystore_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/keystore/testdata/fuzzKeystore_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/txfetcher Fuzz fuzzTxfetcher Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzTxfetcher' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzTxfetcher Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzTxfetcher.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzTxfetcher.a -o /workspace/out/libfuzzer-address-x86_64/fuzzTxfetcher Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/rlp Fuzz fuzzRlp Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/rlp Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzRlp' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzRlp Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/rlp Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzRlp.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzRlp.a -o /workspace/out/libfuzzer-address-x86_64/fuzzRlp Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/rlp/testdata/fuzzRlp_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/rlp/testdata/fuzzRlp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/trie Fuzz fuzzTrie Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/trie Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzTrie' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzTrie Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/trie Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzTrie.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzTrie.a -o /workspace/out/libfuzzer-address-x86_64/fuzzTrie Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/trie/testdata/fuzzTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/trie/testdata/fuzzTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/stacktrie Fuzz fuzzStackTrie Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/stacktrie Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzStackTrie' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzStackTrie Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/stacktrie Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzStackTrie.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzStackTrie.a -o /workspace/out/libfuzzer-address-x86_64/fuzzStackTrie Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/stacktrie/testdata/fuzzStackTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/stacktrie/testdata/fuzzStackTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/difficulty Fuzz fuzzDifficulty Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/difficulty Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzDifficulty Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzDifficulty' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzDifficulty Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/difficulty Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzDifficulty.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzDifficulty.a -o /workspace/out/libfuzzer-address-x86_64/fuzzDifficulty Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/difficulty/testdata/fuzzDifficulty_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/difficulty/testdata/fuzzDifficulty_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/abi Fuzz fuzzAbi Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/abi Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzAbi' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzAbi Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/abi Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzAbi.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzAbi.a -o /workspace/out/libfuzzer-address-x86_64/fuzzAbi Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/abi/testdata/fuzzAbi_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/abi/testdata/fuzzAbi_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/les Fuzz fuzzLes Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/les Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzLes Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzLes' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzLes Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/les Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzLes.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzLes.a -o /workspace/out/libfuzzer-address-x86_64/fuzzLes Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/les/testdata/fuzzLes_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/les/testdata/fuzzLes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-address-x86_64": + func=Fuzz Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzSecp256k1' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzSecp256k1 Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func Fuzz -o /work/fuzzSecp256k1.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzSecp256k1.a -o /workspace/out/libfuzzer-address-x86_64/fuzzSecp256k1 Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/vflux FuzzClientPool fuzzClientPool Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/vflux Step #3 - "compile-libfuzzer-address-x86_64": + func=FuzzClientPool Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzzClientPool Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzzClientPool' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzzClientPool Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/vflux Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func FuzzClientPool -o /work/fuzzClientPool.a . Step #3 - "compile-libfuzzer-address-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=fuzzer /work/fuzzClientPool.a -o /workspace/out/libfuzzer-address-x86_64/fuzzClientPool Step #3 - "compile-libfuzzer-address-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/vflux/testdata/fuzzClientPool_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/vflux/testdata/fuzzClientPool_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzer tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add Step #3 - "compile-libfuzzer-address-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-address-x86_64": + func=FuzzG1Add Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building fuzz_g1_add' Step #3 - "compile-libfuzzer-address-x86_64": Building fuzz_g1_add Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-address-x86_64": + go-fuzz -func FuzzG1Add -o /work/fuzz_g1_add.a . Step #3 - "compile-libfuzzer-address-x86_64": # github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-address-x86_64": ./bls12381_fuzz.go:201:42: gnarkScalar.SetBigInt(s).FromMont undefined (type *fr.Element has no field or method FromMont) Step #3 - "compile-libfuzzer-address-x86_64": ./bls12381_fuzz.go:220:27: not enough arguments in call to cp.MultiExp Step #3 - "compile-libfuzzer-address-x86_64": have ([]"github.com/consensys/gnark-crypto/ecc/bls12-381".G1Affine, []fr.Element) Step #3 - "compile-libfuzzer-address-x86_64": want ([]"github.com/consensys/gnark-crypto/ecc/bls12-381".G1Affine, []fr.Element, ecc.MultiExpConfig) Step #3 - "compile-libfuzzer-address-x86_64": 2023/02/11 06:11:04 failed to build packages:exit status 2 Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image go-ethereum Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 go-ethereum Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1