starting build "55f89ade-4f19-4e9e-8978-c79ad84452f7"

FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1
Step #1: Already have image (with digest): gcr.io/cloud-builders/docker
Step #1: Sending build context to Docker daemon  9.728kB

Step #1: Step 1/9 : FROM gcr.io/oss-fuzz-base/base-builder-go
Step #1: latest: Pulling from oss-fuzz-base/base-builder-go
Step #1: b549f31133a9: Pulling fs layer
Step #1: 800687449569: Pulling fs layer
Step #1: 67cc84ed39bf: Pulling fs layer
Step #1: 33c4464df317: Pulling fs layer
Step #1: 7a3d59ffed63: Pulling fs layer
Step #1: bc24bccd8f7c: Pulling fs layer
Step #1: 18d20619fb8d: Pulling fs layer
Step #1: 0ec212d79142: Pulling fs layer
Step #1: 0d731e844f5b: Pulling fs layer
Step #1: 03e6d4298870: Pulling fs layer
Step #1: 9cb6c9480ffe: Pulling fs layer
Step #1: 636367483a85: Pulling fs layer
Step #1: ab160a08f40f: Pulling fs layer
Step #1: d56fb1501120: Pulling fs layer
Step #1: 6e5ee80d4b76: Pulling fs layer
Step #1: 069b70ca1828: Pulling fs layer
Step #1: 082a5c4ba783: Pulling fs layer
Step #1: aeb889ce9374: Pulling fs layer
Step #1: b3c77a307741: Pulling fs layer
Step #1: 19afa95abd0d: Pulling fs layer
Step #1: 3331bfca5447: Pulling fs layer
Step #1: 7a3d59ffed63: Waiting
Step #1: bc24bccd8f7c: Waiting
Step #1: ca89507fe8d3: Pulling fs layer
Step #1: 093d0a8d4813: Pulling fs layer
Step #1: 18d20619fb8d: Waiting
Step #1: 562130e5e1f0: Pulling fs layer
Step #1: c78d65770fdc: Pulling fs layer
Step #1: 0ec212d79142: Waiting
Step #1: 03e6d4298870: Waiting
Step #1: d8a48a39f3bb: Pulling fs layer
Step #1: d547270a8392: Pulling fs layer
Step #1: cd72b15f7674: Pulling fs layer
Step #1: fed123fa2f8a: Pulling fs layer
Step #1: 39a8609a58c5: Pulling fs layer
Step #1: 636367483a85: Waiting
Step #1: ab160a08f40f: Waiting
Step #1: d942b3144a95: Pulling fs layer
Step #1: 30e6af2af1c7: Pulling fs layer
Step #1: d56fb1501120: Waiting
Step #1: a9e61f79d57c: Pulling fs layer
Step #1: 33c4464df317: Waiting
Step #1: 6e5ee80d4b76: Waiting
Step #1: 9cb6c9480ffe: Waiting
Step #1: 069b70ca1828: Waiting
Step #1: d547270a8392: Waiting
Step #1: 082a5c4ba783: Waiting
Step #1: 39a8609a58c5: Waiting
Step #1: 19afa95abd0d: Waiting
Step #1: cd72b15f7674: Waiting
Step #1: d942b3144a95: Waiting
Step #1: 3331bfca5447: Waiting
Step #1: fed123fa2f8a: Waiting
Step #1: aeb889ce9374: Waiting
Step #1: 30e6af2af1c7: Waiting
Step #1: b3c77a307741: Waiting
Step #1: c78d65770fdc: Waiting
Step #1: ca89507fe8d3: Waiting
Step #1: 562130e5e1f0: Waiting
Step #1: 0d731e844f5b: Waiting
Step #1: a9e61f79d57c: Waiting
Step #1: d8a48a39f3bb: Waiting
Step #1: 093d0a8d4813: Waiting
Step #1: 67cc84ed39bf: Download complete
Step #1: b549f31133a9: Verifying Checksum
Step #1: b549f31133a9: Download complete
Step #1: 33c4464df317: Verifying Checksum
Step #1: 33c4464df317: Download complete
Step #1: bc24bccd8f7c: Verifying Checksum
Step #1: bc24bccd8f7c: Download complete
Step #1: 7a3d59ffed63: Verifying Checksum
Step #1: 7a3d59ffed63: Download complete
Step #1: 0ec212d79142: Verifying Checksum
Step #1: 0ec212d79142: Download complete
Step #1: 0d731e844f5b: Verifying Checksum
Step #1: 0d731e844f5b: Download complete
Step #1: 800687449569: Verifying Checksum
Step #1: 800687449569: Download complete
Step #1: 9cb6c9480ffe: Verifying Checksum
Step #1: 9cb6c9480ffe: Download complete
Step #1: 636367483a85: Download complete
Step #1: ab160a08f40f: Verifying Checksum
Step #1: ab160a08f40f: Download complete
Step #1: d56fb1501120: Verifying Checksum
Step #1: d56fb1501120: Download complete
Step #1: 6e5ee80d4b76: Download complete
Step #1: 069b70ca1828: Verifying Checksum
Step #1: 069b70ca1828: Download complete
Step #1: b549f31133a9: Pull complete
Step #1: 082a5c4ba783: Verifying Checksum
Step #1: 082a5c4ba783: Download complete
Step #1: aeb889ce9374: Download complete
Step #1: b3c77a307741: Verifying Checksum
Step #1: b3c77a307741: Download complete
Step #1: 19afa95abd0d: Verifying Checksum
Step #1: 19afa95abd0d: Download complete
Step #1: 3331bfca5447: Download complete
Step #1: ca89507fe8d3: Verifying Checksum
Step #1: ca89507fe8d3: Download complete
Step #1: 03e6d4298870: Verifying Checksum
Step #1: 03e6d4298870: Download complete
Step #1: 093d0a8d4813: Verifying Checksum
Step #1: 093d0a8d4813: Download complete
Step #1: 562130e5e1f0: Verifying Checksum
Step #1: 562130e5e1f0: Download complete
Step #1: c78d65770fdc: Verifying Checksum
Step #1: c78d65770fdc: Download complete
Step #1: d8a48a39f3bb: Verifying Checksum
Step #1: d8a48a39f3bb: Download complete
Step #1: cd72b15f7674: Download complete
Step #1: d547270a8392: Download complete
Step #1: fed123fa2f8a: Verifying Checksum
Step #1: fed123fa2f8a: Download complete
Step #1: 39a8609a58c5: Verifying Checksum
Step #1: 39a8609a58c5: Download complete
Step #1: d942b3144a95: Verifying Checksum
Step #1: d942b3144a95: Download complete
Step #1: 18d20619fb8d: Verifying Checksum
Step #1: 18d20619fb8d: Download complete
Step #1: a9e61f79d57c: Download complete
Step #1: 800687449569: Pull complete
Step #1: 67cc84ed39bf: Pull complete
Step #1: 33c4464df317: Pull complete
Step #1: 30e6af2af1c7: Verifying Checksum
Step #1: 30e6af2af1c7: Download complete
Step #1: 7a3d59ffed63: Pull complete
Step #1: bc24bccd8f7c: Pull complete
Step #1: 18d20619fb8d: Pull complete
Step #1: 0ec212d79142: Pull complete
Step #1: 0d731e844f5b: Pull complete
Step #1: 03e6d4298870: Pull complete
Step #1: 9cb6c9480ffe: Pull complete
Step #1: 636367483a85: Pull complete
Step #1: ab160a08f40f: Pull complete
Step #1: d56fb1501120: Pull complete
Step #1: 6e5ee80d4b76: Pull complete
Step #1: 069b70ca1828: Pull complete
Step #1: 082a5c4ba783: Pull complete
Step #1: aeb889ce9374: Pull complete
Step #1: b3c77a307741: Pull complete
Step #1: 19afa95abd0d: Pull complete
Step #1: 3331bfca5447: Pull complete
Step #1: ca89507fe8d3: Pull complete
Step #1: 093d0a8d4813: Pull complete
Step #1: 562130e5e1f0: Pull complete
Step #1: c78d65770fdc: Pull complete
Step #1: d8a48a39f3bb: Pull complete
Step #1: d547270a8392: Pull complete
Step #1: cd72b15f7674: Pull complete
Step #1: fed123fa2f8a: Pull complete
Step #1: 39a8609a58c5: Pull complete
Step #1: d942b3144a95: Pull complete
Step #1: 30e6af2af1c7: Pull complete
Step #1: a9e61f79d57c: Pull complete
Step #1: Digest: sha256:641f59e60daf76531999fb869bce29997d9552e548e382710930b708cec43039
Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest
Step #1:  ---> 17ba2eb8a017
Step #1: Step 2/9 : RUN apt-get update && apt-get install -y protobuf-compiler libprotobuf-dev binutils cmake    ninja-build liblzma-dev libz-dev pkg-config autoconf libtool
Step #1:  ---> Running in 135e22c98266
Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease
Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB]
Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease
Step #1: Fetched 114 kB in 1s (109 kB/s)
Step #1: Reading package lists...
Step #1: Reading package lists...
Step #1: Building dependency tree...
Step #1: Reading state information...
Step #1: binutils is already the newest version (2.34-6ubuntu1.6).
Step #1: The following additional packages will be installed:
Step #1:   automake autotools-dev cmake-data file libarchive13 libglib2.0-0
Step #1:   libglib2.0-data libicu66 libjsoncpp1 libltdl-dev libltdl7 libmagic-mgc
Step #1:   libmagic1 libprotobuf-lite17 libprotobuf17 libprotoc17 librhash0 libsigsegv2
Step #1:   libuv1 libxml2 m4 shared-mime-info xdg-user-dirs
Step #1: Suggested packages:
Step #1:   autoconf-archive gnu-standards autoconf-doc gettext cmake-doc lrzip
Step #1:   libtool-doc liblzma-doc gfortran | fortran95-compiler gcj-jdk m4-doc python3
Step #1: The following NEW packages will be installed:
Step #1:   autoconf automake autotools-dev cmake cmake-data file libarchive13
Step #1:   libglib2.0-0 libglib2.0-data libicu66 libjsoncpp1 libltdl-dev libltdl7
Step #1:   liblzma-dev libmagic-mgc libmagic1 libprotobuf-dev libprotobuf-lite17
Step #1:   libprotobuf17 libprotoc17 librhash0 libsigsegv2 libtool libuv1 libxml2 m4
Step #1:   ninja-build pkg-config protobuf-compiler shared-mime-info xdg-user-dirs
Step #1:   zlib1g-dev
Step #1: 0 upgraded, 32 newly installed, 0 to remove and 0 not upgraded.
Step #1: Need to get 21.8 MB of archives.
Step #1: After this operation, 104 MB of additional disk space will be used.
Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB]
Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB]
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB]
Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB]
Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.6 [6032 B]
Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB]
Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB]
Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB]
Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB]
Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.3 [80.8 kB]
Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB]
Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB]
Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB]
Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB]
Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB]
Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB]
Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.2 [327 kB]
Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB]
Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB]
Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB]
Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB]
Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB]
Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf-lite17 amd64 3.6.1.3-2ubuntu5.2 [132 kB]
Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf17 amd64 3.6.1.3-2ubuntu5.2 [798 kB]
Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotoc17 amd64 3.6.1.3-2ubuntu5.2 [646 kB]
Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB]
Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB]
Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB]
Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB]
Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 liblzma-dev amd64 5.2.4-1ubuntu1.1 [147 kB]
Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf-dev amd64 3.6.1.3-2ubuntu5.2 [1156 kB]
Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 protobuf-compiler amd64 3.6.1.3-2ubuntu5.2 [27.6 kB]
Step #1: debconf: delaying package configuration, since apt-utils is not installed
Step #1: Fetched 21.8 MB in 4s (5121 kB/s)
Step #1: Selecting previously unselected package libmagic-mgc.
Step #1: (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 17382 files and directories currently installed.)
Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ...
Step #1: Unpacking libmagic-mgc (1:5.38-4) ...
Step #1: Selecting previously unselected package libmagic1:amd64.
Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ...
Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ...
Step #1: Selecting previously unselected package file.
Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ...
Step #1: Unpacking file (1:5.38-4) ...
Step #1: Selecting previously unselected package libglib2.0-0:amd64.
Step #1: Preparing to unpack .../03-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ...
Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ...
Step #1: Selecting previously unselected package libglib2.0-data.
Step #1: Preparing to unpack .../04-libglib2.0-data_2.64.6-1~ubuntu20.04.6_all.deb ...
Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.6) ...
Step #1: Selecting previously unselected package libicu66:amd64.
Step #1: Preparing to unpack .../05-libicu66_66.1-2ubuntu2.1_amd64.deb ...
Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ...
Step #1: Selecting previously unselected package libxml2:amd64.
Step #1: Preparing to unpack .../06-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ...
Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ...
Step #1: Selecting previously unselected package shared-mime-info.
Step #1: Preparing to unpack .../07-shared-mime-info_1.15-1_amd64.deb ...
Step #1: Unpacking shared-mime-info (1.15-1) ...
Step #1: Selecting previously unselected package xdg-user-dirs.
Step #1: Preparing to unpack .../08-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ...
Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ...
Step #1: Selecting previously unselected package libuv1:amd64.
Step #1: Preparing to unpack .../09-libuv1_1.34.2-1ubuntu1.3_amd64.deb ...
Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.3) ...
Step #1: Selecting previously unselected package libsigsegv2:amd64.
Step #1: Preparing to unpack .../10-libsigsegv2_2.12-2_amd64.deb ...
Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ...
Step #1: Selecting previously unselected package m4.
Step #1: Preparing to unpack .../11-m4_1.4.18-4_amd64.deb ...
Step #1: Unpacking m4 (1.4.18-4) ...
Step #1: Selecting previously unselected package autoconf.
Step #1: Preparing to unpack .../12-autoconf_2.69-11.1_all.deb ...
Step #1: Unpacking autoconf (2.69-11.1) ...
Step #1: Selecting previously unselected package autotools-dev.
Step #1: Preparing to unpack .../13-autotools-dev_20180224.1_all.deb ...
Step #1: Unpacking autotools-dev (20180224.1) ...
Step #1: Selecting previously unselected package automake.
Step #1: Preparing to unpack .../14-automake_1%3a1.16.1-4ubuntu6_all.deb ...
Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ...
Step #1: Selecting previously unselected package cmake-data.
Step #1: Preparing to unpack .../15-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ...
Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Selecting previously unselected package libarchive13:amd64.
Step #1: Preparing to unpack .../16-libarchive13_3.4.0-2ubuntu1.2_amd64.deb ...
Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.2) ...
Step #1: Selecting previously unselected package libjsoncpp1:amd64.
Step #1: Preparing to unpack .../17-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ...
Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ...
Step #1: Selecting previously unselected package librhash0:amd64.
Step #1: Preparing to unpack .../18-librhash0_1.3.9-1_amd64.deb ...
Step #1: Unpacking librhash0:amd64 (1.3.9-1) ...
Step #1: Selecting previously unselected package cmake.
Step #1: Preparing to unpack .../19-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ...
Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Selecting previously unselected package libltdl7:amd64.
Step #1: Preparing to unpack .../20-libltdl7_2.4.6-14_amd64.deb ...
Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ...
Step #1: Selecting previously unselected package libltdl-dev:amd64.
Step #1: Preparing to unpack .../21-libltdl-dev_2.4.6-14_amd64.deb ...
Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ...
Step #1: Selecting previously unselected package libprotobuf-lite17:amd64.
Step #1: Preparing to unpack .../22-libprotobuf-lite17_3.6.1.3-2ubuntu5.2_amd64.deb ...
Step #1: Unpacking libprotobuf-lite17:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Selecting previously unselected package libprotobuf17:amd64.
Step #1: Preparing to unpack .../23-libprotobuf17_3.6.1.3-2ubuntu5.2_amd64.deb ...
Step #1: Unpacking libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Selecting previously unselected package libprotoc17:amd64.
Step #1: Preparing to unpack .../24-libprotoc17_3.6.1.3-2ubuntu5.2_amd64.deb ...
Step #1: Unpacking libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Selecting previously unselected package libtool.
Step #1: Preparing to unpack .../25-libtool_2.4.6-14_all.deb ...
Step #1: Unpacking libtool (2.4.6-14) ...
Step #1: Selecting previously unselected package ninja-build.
Step #1: Preparing to unpack .../26-ninja-build_1.10.0-1build1_amd64.deb ...
Step #1: Unpacking ninja-build (1.10.0-1build1) ...
Step #1: Selecting previously unselected package pkg-config.
Step #1: Preparing to unpack .../27-pkg-config_0.29.1-0ubuntu4_amd64.deb ...
Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ...
Step #1: Selecting previously unselected package zlib1g-dev:amd64.
Step #1: Preparing to unpack .../28-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ...
Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ...
Step #1: Selecting previously unselected package liblzma-dev:amd64.
Step #1: Preparing to unpack .../29-liblzma-dev_5.2.4-1ubuntu1.1_amd64.deb ...
Step #1: Unpacking liblzma-dev:amd64 (5.2.4-1ubuntu1.1) ...
Step #1: Selecting previously unselected package libprotobuf-dev:amd64.
Step #1: Preparing to unpack .../30-libprotobuf-dev_3.6.1.3-2ubuntu5.2_amd64.deb ...
Step #1: Unpacking libprotobuf-dev:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Selecting previously unselected package protobuf-compiler.
Step #1: Preparing to unpack .../31-protobuf-compiler_3.6.1.3-2ubuntu5.2_amd64.deb ...
Step #1: Unpacking protobuf-compiler (3.6.1.3-2ubuntu5.2) ...
Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ...
Step #1: Setting up libmagic-mgc (1:5.38-4) ...
Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ...
Step #1: No schema files found: doing nothing.
Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ...
Step #1: Setting up libprotobuf-lite17:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Setting up libmagic1:amd64 (1:5.38-4) ...
Step #1: Setting up file (1:5.38-4) ...
Step #1: Setting up ninja-build (1.10.0-1build1) ...
Step #1: Setting up autotools-dev (20180224.1) ...
Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.6) ...
Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.3) ...
Step #1: Setting up libsigsegv2:amd64 (2.12-2) ...
Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ...
Step #1: Setting up libltdl7:amd64 (2.4.6-14) ...
Step #1: Setting up liblzma-dev:amd64 (5.2.4-1ubuntu1.1) ...
Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ...
Step #1: Setting up librhash0:amd64 (1.3.9-1) ...
Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Setting up libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ...
Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ...
Step #1: Setting up libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Setting up protobuf-compiler (3.6.1.3-2ubuntu5.2) ...
Step #1: Setting up libtool (2.4.6-14) ...
Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.2) ...
Step #1: Setting up m4 (1.4.18-4) ...
Step #1: Setting up libprotobuf-dev:amd64 (3.6.1.3-2ubuntu5.2) ...
Step #1: Setting up shared-mime-info (1.15-1) ...
Step #1: Setting up autoconf (2.69-11.1) ...
Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Setting up automake (1:1.16.1-4ubuntu6) ...
Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode
Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist
Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist
Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ...
Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.12) ...
Step #1: Removing intermediate container 135e22c98266
Step #1:  ---> 94e395a8af42
Step #1: Step 3/9 : RUN git clone --depth 1 https://github.com/google/libprotobuf-mutator.git
Step #1:  ---> Running in 81c618d3e8d8
Step #1: Cloning into 'libprotobuf-mutator'...
Step #1: Removing intermediate container 81c618d3e8d8
Step #1:  ---> 204ca3066364
Step #1: Step 4/9 : RUN mkdir LPM;   cd LPM;   cmake $SRC/libprotobuf-mutator -GNinja -DLIB_PROTO_MUTATOR_DOWNLOAD_PROTOBUF=ON -DLIB_PROTO_MUTATOR_TESTING=OFF -DCMAKE_BUILD_TYPE=Release;   ninja;
Step #1:  ---> Running in 99f9eb12a91e
Step #1: -- The CXX compiler identification is Clang 15.0.0
Step #1: -- Detecting CXX compiler ABI info
Step #1: -- Detecting CXX compiler ABI info - done
Step #1: -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped
Step #1: -- Detecting CXX compile features
Step #1: -- Detecting CXX compile features - done
Step #1: -- The C compiler identification is Clang 15.0.0
Step #1: -- Detecting C compiler ABI info
Step #1: -- Detecting C compiler ABI info - done
Step #1: -- Check for working C compiler: /usr/local/bin/clang - skipped
Step #1: -- Detecting C compile features
Step #1: -- Detecting C compile features - done
Step #1: -- Performing Test CMAKE_HAVE_LIBC_PTHREAD
Step #1: -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Failed
Step #1: -- Check if compiler accepts -pthread
Step #1: -- Check if compiler accepts -pthread - yes
Step #1: -- Found Threads: TRUE  
Step #1: -- Looking for lzma_auto_decoder in /usr/lib/x86_64-linux-gnu/liblzma.so
Step #1: -- Looking for lzma_auto_decoder in /usr/lib/x86_64-linux-gnu/liblzma.so - found
Step #1: -- Looking for lzma_easy_encoder in /usr/lib/x86_64-linux-gnu/liblzma.so
Step #1: -- Looking for lzma_easy_encoder in /usr/lib/x86_64-linux-gnu/liblzma.so - found
Step #1: -- Looking for lzma_lzma_preset in /usr/lib/x86_64-linux-gnu/liblzma.so
Step #1: -- Looking for lzma_lzma_preset in /usr/lib/x86_64-linux-gnu/liblzma.so - found
Step #1: -- Found LibLZMA: /usr/lib/x86_64-linux-gnu/liblzma.so (found version "5.2.4") 
Step #1: -- Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found version "1.2.11") 
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_SANITIZE_ADDRESS
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_SANITIZE_ADDRESS - Success
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_SANITIZE_SCOPE
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_SANITIZE_SCOPE - Success
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_NO_COVERAGE
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_NO_COVERAGE - Success
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_SANITIZE_FUZZER
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_SANITIZE_FUZZER - Success
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_NO_SANITIZE_FUZZER
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_NO_SANITIZE_FUZZER - Success
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_WSTRING_CONVERSION
Step #1: -- Performing Test LIB_PROTO_MUTATOR_HAS_WSTRING_CONVERSION - Success
Step #1: -- Found Protobuf: /usr/lib/x86_64-linux-gnu/libprotobuf.so;-pthread (found version "3.6.1") 
Step #1: -- Configuring done
Step #1: -- Generating done
Step #1: -- Build files have been written to: /src/LPM
Step #1: [1/16] Creating directories for 'external.protobuf'
Step #1: [2/16] Performing download step (git clone) for 'external.protobuf'
Step #1: Cloning into 'external.protobuf'...
Step #1: HEAD is now at 482156c0f Updating version.json and repo version numbers to: 22.3
Step #1: Submodule 'third_party/abseil-cpp' (https://github.com/abseil/abseil-cpp.git) registered for path 'third_party/abseil-cpp'
Step #1: Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'third_party/googletest'
Step #1: Submodule 'third_party/jsoncpp' (https://github.com/open-source-parsers/jsoncpp.git) registered for path 'third_party/jsoncpp'
Step #1: Cloning into '/src/LPM/external.protobuf/src/external.protobuf/third_party/abseil-cpp'...
Step #1: Cloning into '/src/LPM/external.protobuf/src/external.protobuf/third_party/googletest'...
Step #1: Cloning into '/src/LPM/external.protobuf/src/external.protobuf/third_party/jsoncpp'...
Step #1: Submodule path 'third_party/abseil-cpp': checked out '78be63686ba732b25052be15f8d6dee891c05749'
Step #1: Submodule path 'third_party/googletest': checked out '4c9a3bb62bf3ba1f1010bf96f9c8ed767b363774'
Step #1: Submodule path 'third_party/jsoncpp': checked out '9059f5cad030ba11d37818847443a53918c327b1'
Step #1: [3/16] No update step for 'external.protobuf'
Step #1: [4/16] No patch step for 'external.protobuf'
Step #1: [5/16] Performing configure step for 'external.protobuf'
Step #1: -- The C compiler identification is Clang 15.0.0
Step #1: -- The CXX compiler identification is Clang 15.0.0
Step #1: -- Detecting C compiler ABI info
Step #1: -- Detecting C compiler ABI info - done
Step #1: -- Check for working C compiler: /usr/local/bin/clang - skipped
Step #1: -- Detecting C compile features
Step #1: -- Detecting C compile features - done
Step #1: -- Detecting CXX compiler ABI info
Step #1: -- Detecting CXX compiler ABI info - done
Step #1: -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped
Step #1: -- Detecting CXX compile features
Step #1: -- Detecting CXX compile features - done
Step #1: -- 
Step #1: -- 22.3.0
Step #1: -- Performing Test protobuf_HAVE_LD_VERSION_SCRIPT
Step #1: -- Performing Test protobuf_HAVE_LD_VERSION_SCRIPT - Success
Step #1: -- Performing Test CMAKE_HAVE_LIBC_PTHREAD
Step #1: -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success
Step #1: -- Found Threads: TRUE  
Step #1: -- Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found version "1.2.11") 
Step #1: -- Performing Test protobuf_HAVE_BUILTIN_ATOMICS
Step #1: -- Performing Test protobuf_HAVE_BUILTIN_ATOMICS - Success
Step #1: CMake Warning at third_party/abseil-cpp/CMakeLists.txt:72 (message):
Step #1:   A future Abseil release will default ABSL_PROPAGATE_CXX_STD to ON for CMake
Step #1:   3.8 and up.  We recommend enabling this option to ensure your project still
Step #1:   builds correctly.
Step #1: 
Step #1: 
Step #1: -- Performing Test ABSL_INTERNAL_AT_LEAST_CXX17
Step #1: -- Performing Test ABSL_INTERNAL_AT_LEAST_CXX17 - Failed
Step #1: -- Configuring done
Step #1: -- Generating done
Step #1: -- Build files have been written to: /src/LPM/external.protobuf/src/external.protobuf-build
Step #1: [6/16] Performing build step for 'external.protobuf'
Step #1: [1/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/io/io_win32.cc.o
Step #1: [2/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/arena_config.cc.o
Step #1: [3/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/arenaz_sampler.cc.o
Step #1: [4/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/arena_align.cc.o
Step #1: [5/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/repeated_field.cc.o
Step #1: [6/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/io/zero_copy_stream.cc.o
Step #1: [7/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/io/zero_copy_stream_impl.cc.o
Step #1: [8/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/repeated_ptr_field.cc.o
Step #1: [9/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/generated_enum_util.cc.o
Step #1: [10/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/stubs/common.cc.o
Step #1: [11/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/arenastring.cc.o
Step #1: [12/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/arena_config.cc.o
Step #1: [13/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/generated_message_util.cc.o
Step #1: [14/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/arena.cc.o
Step #1: [15/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/io/zero_copy_stream_impl_lite.cc.o
Step #1: [16/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/implicit_weak_message.cc.o
Step #1: [17/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/inlined_string_field.cc.o
Step #1: [18/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/map.cc.o
Step #1: [19/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/io/coded_stream.cc.o
Step #1: [20/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/arenaz_sampler.cc.o
Step #1: [21/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/any_lite.cc.o
Step #1: [22/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/empty.pb.cc.o
Step #1: [23/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/message_lite.cc.o
Step #1: [24/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/any.pb.cc.o
Step #1: [25/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/wire_format_lite.cc.o
Step #1: [26/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/duration.pb.cc.o
Step #1: [27/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/field_mask.pb.cc.o
Step #1: [28/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/arena_align.cc.o
Step #1: [29/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/any_lite.cc.o
Step #1: [30/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/io_win32.cc.o
Step #1: [31/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/timestamp.pb.cc.o
Step #1: [32/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/parse_context.cc.o
Step #1: [33/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/source_context.pb.cc.o
Step #1: [34/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/any.cc.o
Step #1: [35/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/wrappers.pb.cc.o
Step #1: [36/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/arena.cc.o
Step #1: [37/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/api.pb.cc.o
Step #1: [38/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/arenastring.cc.o
Step #1: [39/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/type.pb.cc.o
Step #1: [40/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_enum_util.cc.o
Step #1: [41/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/strtod.cc.o
Step #1: [42/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/gzip_stream.cc.o
Step #1: [43/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/zero_copy_sink.cc.o
Step #1: [44/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/implicit_weak_message.cc.o
Step #1: [45/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/inlined_string_field.cc.o
Step #1: [46/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/zero_copy_stream.cc.o
Step #1: [47/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_message_util.cc.o
Step #1: [48/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_message_bases.cc.o
Step #1: [49/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/zero_copy_stream_impl.cc.o
Step #1: [50/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/coded_stream.cc.o
Step #1: [51/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_message_tctable_full.cc.o
Step #1: [52/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/tokenizer.cc.o
Step #1: [53/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/zero_copy_stream_impl_lite.cc.o
Step #1: [54/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/compiler/importer.cc.o
Step #1: [55/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/extension_set_heavy.cc.o
Step #1: [56/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/struct.pb.cc.o
Step #1: [57/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/dynamic_message.cc.o
Step #1: [58/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/message_path.cc.o
Step #1: [59/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/service.cc.o
Step #1: [60/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/writer.cc.o
Step #1: [61/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/generated_message_tctable_lite.cc.o
Step #1: [62/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/zero_copy_buffered_stream.cc.o
Step #1: [63/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/map.cc.o
Step #1: [64/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/repeated_field.cc.o
Step #1: [65/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_message_tctable_gen.cc.o
Step #1: [66/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/lexer.cc.o
Step #1: [67/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/repeated_ptr_field.cc.o
Step #1: [68/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/stubs/common.cc.o
Step #1: [69/428] Building CXX object CMakeFiles/libprotobuf-lite.dir/src/google/protobuf/extension_set.cc.o
Step #1: [70/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/message_lite.cc.o
Step #1: [71/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/util/delimited_message_util.cc.o
Step #1: [72/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/json.cc.o
Step #1: [73/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/parse_context.cc.o
Step #1: [74/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/reflection_ops.cc.o
Step #1: [75/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/untyped_message.cc.o
Step #1: [76/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/unknown_field_set.cc.o
Step #1: [77/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_message_tctable_lite.cc.o
Step #1: [78/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/wire_format_lite.cc.o
Step #1: [79/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/map_field.cc.o
Step #1: [80/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/util/time_util.cc.o
Step #1: [81/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/extension_set.cc.o
Step #1: [82/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/message.cc.o
Step #1: [83/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/util/field_comparator.cc.o
Step #1: [84/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/io/printer.cc.o
Step #1: [85/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/compiler/parser.cc.o
Step #1: [86/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/code_generator.cc.o
Step #1: [87/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/util/type_resolver_util.cc.o
Step #1: [88/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/descriptor.pb.cc.o
Step #1: [89/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/util/field_mask_util.cc.o
Step #1: [90/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/descriptor_database.cc.o
Step #1: [91/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/unparser.cc.o
Step #1: [92/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/wire_format.cc.o
Step #1: [93/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/generated_message_reflection.cc.o
Step #1: [94/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/text_format.cc.o
Step #1: [95/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/json/internal/parser.cc.o
Step #1: [96/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/field_generators/primitive_field.cc.o
Step #1: [97/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/extension.cc.o
Step #1: [98/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_doc_comment.cc.o
Step #1: [99/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/field.cc.o
Step #1: [100/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/field_generators/enum_field.cc.o
Step #1: [101/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_generator.cc.o
Step #1: [102/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_enum_field.cc.o
Step #1: [103/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_helpers.cc.o
Step #1: [104/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/field_generators/map_field.cc.o
Step #1: [105/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_enum.cc.o
Step #1: [106/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/generator.cc.o
Step #1: [107/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/padding_optimizer.cc.o
Step #1: [108/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/field_generators/message_field.cc.o
Step #1: [109/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/tracker.cc.o
Step #1: [110/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_map_field.cc.o
Step #1: [111/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_message_field.cc.o
Step #1: [112/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_field_base.cc.o
Step #1: [113/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/util/message_differencer.cc.o
Step #1: [114/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/service.cc.o
Step #1: [115/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/parse_function_generator.cc.o
Step #1: [116/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/field_generators/string_field.cc.o
Step #1: [117/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/names.cc.o
Step #1: [118/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_primitive_field.cc.o
Step #1: [119/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_message.cc.o
Step #1: [120/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_repeated_enum_field.cc.o
Step #1: [121/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_repeated_message_field.cc.o
Step #1: [122/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_repeated_primitive_field.cc.o
Step #1: [123/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_reflection_class.cc.o
Step #1: [124/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_source_generator_base.cc.o
Step #1: [125/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/enum.cc.o
Step #1: [126/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/context.cc.o
Step #1: [127/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/command_line_interface.cc.o
Step #1: [128/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/csharp/csharp_wrapper_field.cc.o
Step #1: [129/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/helpers.cc.o
Step #1: [130/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/doc_comment.cc.o
Step #1: [131/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/generator_factory.cc.o
Step #1: [132/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/extension_lite.cc.o
Step #1: [133/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/enum_lite.cc.o
Step #1: [134/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/generator.cc.o
Step #1: [135/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/extension.cc.o
Step #1: [136/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/enum.cc.o
Step #1: [137/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/enum_field_lite.cc.o
Step #1: [138/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/kotlin_generator.cc.o
Step #1: [139/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/enum_field.cc.o
Step #1: [140/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/file.cc.o
Step #1: [141/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/field.cc.o
Step #1: [142/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/names.cc.o
Step #1: [143/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message_serialization.cc.o
Step #1: [144/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/helpers.cc.o
Step #1: [145/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/name_resolver.cc.o
Step #1: [146/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/map_field_lite.cc.o
Step #1: [147/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/line_consumer.cc.o
Step #1: [148/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/map_field.cc.o
Step #1: [149/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message_builder_lite.cc.o
Step #1: [150/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message_field.cc.o
Step #1: [151/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message_field_lite.cc.o
Step #1: [152/428] Building CXX object CMakeFiles/libprotobuf.dir/src/google/protobuf/descriptor.cc.o
Step #1: [153/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/helpers.cc.o
Step #1: [154/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/shared_code_generator.cc.o
Step #1: [155/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message_builder.cc.o
Step #1: [156/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message_lite.cc.o
Step #1: [157/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/message.cc.o
Step #1: [158/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/enum.cc.o
Step #1: [159/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/service.cc.o
Step #1: [160/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/text_format_decode_data.cc.o
Step #1: [161/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/primitive_field_lite.cc.o
Step #1: [162/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/enum_field.cc.o
Step #1: [163/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/generator.cc.o
Step #1: [164/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/php/names.cc.o
Step #1: [165/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/internal/waiter.cc.o
Step #1: [166/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/internal/per_thread_sem.cc.o
Step #1: [167/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/notification.cc.o
Step #1: [168/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/primitive_field.cc.o
Step #1: [169/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/spinlock_wait.dir/internal/spinlock_wait.cc.o
Step #1: [170/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/base.dir/internal/cycleclock.cc.o
Step #1: [171/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_spinlock_wait.a
Step #1: [172/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/base.dir/internal/unscaledcycleclock.cc.o
Step #1: [173/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/import_writer.cc.o
Step #1: [174/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/extension.cc.o
Step #1: [175/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/zip_writer.cc.o
Step #1: [176/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/string_field_lite.cc.o
Step #1: [177/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/log_severity.dir/log_severity.cc.o
Step #1: [178/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_log_severity.a
Step #1: [179/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/plugin.cc.o
Step #1: [180/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/map_field.cc.o
Step #1: [181/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/java/string_field.cc.o
Step #1: [182/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/raw_logging_internal.dir/internal/raw_logging.cc.o
Step #1: [183/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_raw_logging_internal.a
Step #1: [184/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_format.dir/internal/log_format.cc.o
Step #1: [185/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/message_field.cc.o
Step #1: [186/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/field.cc.o
Step #1: [187/428] Building CXX object CMakeFiles/protoc.dir/src/google/protobuf/compiler/main.cc.o
Step #1: [188/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/malloc_internal.dir/internal/low_level_alloc.cc.o
Step #1: [189/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/base.dir/internal/spinlock.cc.o
Step #1: [190/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/base.dir/internal/thread_identity.cc.o
Step #1: [191/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/plugin.pb.cc.o
Step #1: [192/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/python/helpers.cc.o
Step #1: [193/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/subprocess.cc.o
Step #1: [194/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/strerror.dir/internal/strerror.cc.o
Step #1: [195/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_strerror.a
Step #1: [196/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc_cpu_detect.dir/internal/cpu_detect.cc.o
Step #1: [197/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/base.dir/internal/sysinfo.cc.o
Step #1: [198/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/leak_check.dir/leak_check.cc.o
Step #1: [199/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_base.a
Step #1: [200/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/file.cc.o
Step #1: [201/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/scoped_set_env.dir/internal/scoped_set_env.cc.o
Step #1: [202/428] Building CXX object third_party/abseil-cpp/absl/base/CMakeFiles/throw_delegate.dir/internal/throw_delegate.cc.o
Step #1: [203/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_leak_check.a
Step #1: [204/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_malloc_internal.a
Step #1: [205/428] Linking CXX static library third_party/abseil-cpp/absl/crc/libabsl_crc_cpu_detect.a
Step #1: [206/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_scoped_set_env.a
Step #1: [207/428] Linking CXX static library third_party/abseil-cpp/absl/base/libabsl_throw_delegate.a
Step #1: [208/428] Building CXX object third_party/abseil-cpp/absl/container/CMakeFiles/hashtablez_sampler.dir/internal/hashtablez_sampler_force_weak_definition.cc.o
Step #1: [209/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/retention.cc.o
Step #1: [210/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_commandlineflag_internal.dir/internal/commandlineflag.cc.o
Step #1: [211/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/stacktrace.dir/stacktrace.cc.o
Step #1: [212/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_commandlineflag_internal.a
Step #1: [213/428] Building CXX object third_party/abseil-cpp/absl/container/CMakeFiles/hashtablez_sampler.dir/internal/hashtablez_sampler.cc.o
Step #1: [214/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc_internal.dir/internal/crc_x86_arm_combined.cc.o
Step #1: [215/428] Building CXX object third_party/abseil-cpp/absl/container/CMakeFiles/raw_hash_set.dir/internal/raw_hash_set.cc.o
Step #1: [216/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/names.cc.o
Step #1: [217/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc32c.dir/internal/crc_non_temporal_memcpy.cc.o
Step #1: [218/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc32c.dir/internal/crc_memcpy_x86_64.cc.o
Step #1: [219/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc32c.dir/crc32c.cc.o
Step #1: [220/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc_internal.dir/internal/crc.cc.o
Step #1: [221/428] Linking CXX static library third_party/abseil-cpp/absl/crc/libabsl_crc_internal.a
Step #1: [222/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc32c.dir/internal/crc_memcpy_fallback.cc.o
Step #1: [223/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/oneof.cc.o
Step #1: [224/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/primitive_field.cc.o
Step #1: [225/428] Building CXX object third_party/abseil-cpp/absl/hash/CMakeFiles/low_level_hash.dir/internal/low_level_hash.cc.o
Step #1: [226/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/debugging_internal.dir/internal/address_is_readable.cc.o
Step #1: [227/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/failure_signal_handler.dir/failure_signal_handler.cc.o
Step #1: [228/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_conditions.dir/internal/conditions.cc.o
Step #1: [229/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_conditions.a
Step #1: [230/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_commandlineflag.dir/commandlineflag.cc.o
Step #1: [231/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/debugging_internal.dir/internal/vdso_support.cc.o
Step #1: [232/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_private_handle_accessor.dir/internal/private_handle_accessor.cc.o
Step #1: [233/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/debugging_internal.dir/internal/elf_mem_image.cc.o
Step #1: [234/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/examine_stack.dir/internal/examine_stack.cc.o
Step #1: [235/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_debugging_internal.a
Step #1: [236/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_stacktrace.a
Step #1: [237/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_program_name.dir/internal/program_name.cc.o
Step #1: [238/428] Building CXX object third_party/abseil-cpp/absl/crc/CMakeFiles/crc_cord_state.dir/internal/crc_cord_state.cc.o
Step #1: [239/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_nullguard.dir/internal/nullguard.cc.o
Step #1: [240/428] Building CXX object third_party/abseil-cpp/absl/hash/CMakeFiles/city.dir/internal/city.cc.o
Step #1: [241/428] Linking CXX static library third_party/abseil-cpp/absl/hash/libabsl_city.a
Step #1: [242/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_nullguard.a
Step #1: [243/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags.dir/flag.cc.o
Step #1: [244/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/symbolize.dir/symbolize.cc.o
Step #1: [245/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/cpp/message.cc.o
Step #1: [246/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_usage.dir/usage.cc.o
Step #1: [247/428] Building CXX object third_party/abseil-cpp/absl/hash/CMakeFiles/hash.dir/internal/hash.cc.o
Step #1: [248/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_globals.dir/internal/globals.cc.o
Step #1: [249/428] Building CXX object third_party/abseil-cpp/absl/profiling/CMakeFiles/periodic_sampler.dir/internal/periodic_sampler.cc.o
Step #1: [250/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_platform.dir/internal/randen_round_keys.cc.o
Step #1: [251/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_platform.a
Step #1: [252/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_proto.dir/internal/proto.cc.o
Step #1: [253/428] Building CXX object third_party/abseil-cpp/absl/debugging/CMakeFiles/demangle_internal.dir/internal/demangle.cc.o
Step #1: [254/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_randen_hwaes.dir/internal/randen_detect.cc.o
Step #1: [255/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_demangle_internal.a
Step #1: [256/428] Building CXX object third_party/abseil-cpp/absl/profiling/CMakeFiles/exponential_biased.dir/internal/exponential_biased.cc.o
Step #1: [257/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_config.dir/usage_config.cc.o
Step #1: [258/428] Linking CXX static library third_party/abseil-cpp/absl/profiling/libabsl_exponential_biased.a
Step #1: [259/428] Linking CXX static library third_party/abseil-cpp/absl/profiling/libabsl_periodic_sampler.a
Step #1: [260/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_entry.dir/log_entry.cc.o
Step #1: [261/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_sink.dir/log_sink.cc.o
Step #1: [262/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_check_op.dir/internal/check_op.cc.o
Step #1: [263/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_initialize.dir/initialize.cc.o
Step #1: [264/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_internal.dir/internal/flag.cc.o
Step #1: [265/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_marshalling.dir/marshalling.cc.o
Step #1: [266/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_log_sink_set.dir/internal/log_sink_set.cc.o
Step #1: [267/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/die_if_null.dir/die_if_null.cc.o
Step #1: [268/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_randen_slow.dir/internal/randen_slow.cc.o
Step #1: [269/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_flags.dir/flags.cc.o
Step #1: [270/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/file.cc.o
Step #1: [271/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_randen_slow.a
Step #1: [272/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_internal_message.dir/internal/log_message.cc.o
Step #1: [273/428] Building CXX object third_party/abseil-cpp/absl/log/CMakeFiles/log_globals.dir/globals.cc.o
Step #1: [274/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_distributions.dir/gaussian_distribution.cc.o
Step #1: [275/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/objectivec/message.cc.o
Step #1: [276/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_seed_gen_exception.dir/seed_gen_exception.cc.o
Step #1: [277/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/ruby/ruby_generator.cc.o
Step #1: [278/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_seed_sequences.dir/seed_sequences.cc.o
Step #1: [279/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_randen.dir/internal/randen.cc.o
Step #1: [280/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_seed_gen_exception.a
Step #1: [281/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings_internal.dir/internal/utf8.cc.o
Step #1: [282/428] Building CXX object third_party/abseil-cpp/absl/numeric/CMakeFiles/int128.dir/int128.cc.o
Step #1: [283/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_randen_hwaes_impl.dir/internal/randen_hwaes.cc.o
Step #1: [284/428] Linking CXX static library third_party/abseil-cpp/absl/numeric/libabsl_int128.a
Step #1: [285/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_seed_material.dir/internal/seed_material.cc.o
Step #1: [286/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_randen_hwaes_impl.a
Step #1: [287/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_distributions.dir/discrete_distribution.cc.o
Step #1: [288/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_randen_hwaes.a
Step #1: [289/428] Linking CXX static library third_party/abseil-cpp/absl/hash/libabsl_low_level_hash.a
Step #1: [290/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_pool_urbg.dir/internal/pool_urbg.cc.o
Step #1: [291/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_randen.a
Step #1: [292/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/ascii.cc.o
Step #1: [293/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/internal/memutil.cc.o
Step #1: [294/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_distribution_test_util.dir/internal/chi_square.cc.o
Step #1: [295/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/internal/damerau_levenshtein_distance.cc.o
Step #1: [296/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/match.cc.o
Step #1: [297/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/internal/stringify_sink.cc.o
Step #1: [298/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/python/pyi_generator.cc.o
Step #1: [299/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/internal/charconv_parse.cc.o
Step #1: [300/428] Building CXX object third_party/abseil-cpp/absl/random/CMakeFiles/random_internal_distribution_test_util.dir/internal/distribution_test_util.cc.o
Step #1: [301/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/str_cat.cc.o
Step #1: [302/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings_internal.dir/internal/ostringstream.cc.o
Step #1: [303/428] Building CXX object third_party/abseil-cpp/absl/status/CMakeFiles/status.dir/status_payload_printer.cc.o
Step #1: [304/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/str_replace.cc.o
Step #1: [305/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings_internal.dir/internal/escaping.cc.o
Step #1: [306/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/string_view.cc.o
Step #1: [307/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_strings_internal.a
Step #1: [308/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/str_split.cc.o
Step #1: [309/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/str_format_internal.dir/internal/str_format/extension.cc.o
Step #1: [310/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/charconv.cc.o
Step #1: [311/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_reflection.dir/reflection.cc.o
Step #1: [312/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_usage_internal.dir/internal/usage.cc.o
Step #1: [313/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/internal/charconv_bigint.cc.o
Step #1: [314/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/escaping.cc.o
Step #1: [315/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/substitute.cc.o
Step #1: [316/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/str_format_internal.dir/internal/str_format/output.cc.o
Step #1: [317/428] Building CXX object third_party/abseil-cpp/absl/status/CMakeFiles/statusor.dir/statusor.cc.o
Step #1: [318/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/strings.dir/numbers.cc.o
Step #1: [319/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_strings.a
Step #1: [320/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_rep_btree_reader.cc.o
Step #1: [321/428] Linking CXX static library third_party/abseil-cpp/absl/crc/libabsl_crc32c.a
Step #1: [322/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_symbolize.a
Step #1: [323/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_rep_btree_navigator.cc.o
Step #1: [324/428] Linking CXX static library third_party/abseil-cpp/absl/crc/libabsl_crc_cord_state.a
Step #1: [325/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_proto.a
Step #1: [326/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_examine_stack.a
Step #1: [327/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_distributions.a
Step #1: [328/428] Linking CXX static library third_party/abseil-cpp/absl/debugging/libabsl_failure_signal_handler.a
Step #1: [329/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_rep_consume.cc.o
Step #1: [330/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_internal.cc.o
Step #1: [331/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_rep_crc.cc.o
Step #1: [332/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord.dir/cord_buffer.cc.o
Step #1: [333/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cordz_functions.dir/internal/cordz_functions.cc.o
Step #1: [334/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/str_format_internal.dir/internal/str_format/bind.cc.o
Step #1: [335/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/str_format_internal.dir/internal/str_format/arg.cc.o
Step #1: [336/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_cordz_functions.a
Step #1: [337/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/str_format_internal.dir/internal/str_format/parser.cc.o
Step #1: [338/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/barrier.cc.o
Step #1: [339/428] Building CXX object third_party/abseil-cpp/absl/status/CMakeFiles/status.dir/status.cc.o
Step #1: [340/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cordz_sample_token.dir/internal/cordz_sample_token.cc.o
Step #1: [341/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cordz_handle.dir/internal/cordz_handle.cc.o
Step #1: [342/428] Building C object third_party/utf8_range/CMakeFiles/utf8_range.dir/range2-neon.c.o
Step #1: [343/428] Building C object third_party/utf8_range/CMakeFiles/utf8_range.dir/naive.c.o
Step #1: [344/428] Building C object third_party/utf8_range/CMakeFiles/utf8_range.dir/range2-sse.c.o
Step #1: [345/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/internal/create_thread_identity.cc.o
Step #1: [346/428] Linking C static library third_party/utf8_range/libutf8_range.a
Step #1: [347/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/blocking_counter.cc.o
Step #1: [348/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time.dir/clock.cc.o
Step #1: [349/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time.dir/format.cc.o
Step #1: [350/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord.dir/cord_analysis.cc.o
Step #1: [351/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cordz_info.dir/internal/cordz_info.cc.o
Step #1: [352/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_fixed.cc.o
Step #1: [353/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/python/generator.cc.o
Step #1: [354/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time.dir/time.cc.o
Step #1: [355/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/str_format_internal.dir/internal/str_format/float_conversion.cc.o
Step #1: [356/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_str_format_internal.a
Step #1: [357/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_distribution_test_util.a
Step #1: [358/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/civil_time.dir/internal/cctz/src/civil_time_detail.cc.o
Step #1: [359/428] Building CXX object third_party/abseil-cpp/absl/types/CMakeFiles/bad_any_cast_impl.dir/bad_any_cast.cc.o
Step #1: [360/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_posix.cc.o
Step #1: [361/428] Linking CXX static library third_party/abseil-cpp/absl/time/libabsl_civil_time.a
Step #1: [362/428] Linking CXX static library third_party/abseil-cpp/absl/types/libabsl_bad_any_cast_impl.a
Step #1: [363/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/graphcycles_internal.dir/internal/graphcycles.cc.o
Step #1: [364/428] Linking CXX static library third_party/abseil-cpp/absl/synchronization/libabsl_graphcycles_internal.a
Step #1: [365/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/zone_info_source.cc.o
Step #1: [366/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_rep_ring.cc.o
Step #1: [367/428] Building CXX object third_party/abseil-cpp/absl/types/CMakeFiles/bad_variant_access.dir/bad_variant_access.cc.o
Step #1: [368/428] Linking CXX static library third_party/abseil-cpp/absl/types/libabsl_bad_variant_access.a
Step #1: [369/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_if.cc.o
Step #1: [370/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time.dir/civil_time.cc.o
Step #1: [371/428] Building CXX object third_party/abseil-cpp/absl/flags/CMakeFiles/flags_parse.dir/parse.cc.o
Step #1: [372/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_lookup.cc.o
Step #1: [373/428] Building CXX object third_party/abseil-cpp/absl/types/CMakeFiles/bad_optional_access.dir/bad_optional_access.cc.o
Step #1: [374/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time.dir/duration.cc.o
Step #1: [375/428] Linking CXX static library third_party/abseil-cpp/absl/types/libabsl_bad_optional_access.a
Step #1: [376/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_libc.cc.o
Step #1: [377/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_marshalling.a
Step #1: [378/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_commandlineflag.a
Step #1: [379/428] Linking CXX static library third_party/abseil-cpp/absl/hash/libabsl_hash.a
Step #1: [380/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_seed_material.a
Step #1: [381/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_private_handle_accessor.a
Step #1: [382/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_globals.a
Step #1: [383/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_internal_pool_urbg.a
Step #1: [384/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord_internal.dir/internal/cord_rep_btree.cc.o
Step #1: [385/428] Linking CXX static library third_party/abseil-cpp/absl/random/libabsl_random_seed_sequences.a
Step #1: [386/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_cord_internal.a
Step #1: [387/428] Building CXX object third_party/utf8_range/CMakeFiles/utf8_validity.dir/utf8_validity.cc.o
Step #1: [388/428] Linking CXX static library third_party/utf8_range/libutf8_validity.a
Step #1: [389/428] Building CXX object third_party/abseil-cpp/absl/synchronization/CMakeFiles/synchronization.dir/mutex.cc.o
Step #1: [390/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_impl.cc.o
Step #1: [391/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_format.cc.o
Step #1: [392/428] Building CXX object CMakeFiles/libprotoc.dir/src/google/protobuf/compiler/php/php_generator.cc.o
Step #1: [393/428] Building CXX object third_party/abseil-cpp/absl/time/CMakeFiles/time_zone.dir/internal/cctz/src/time_zone_info.cc.o
Step #1: [394/428] Linking CXX static library third_party/abseil-cpp/absl/time/libabsl_time_zone.a
Step #1: [395/428] Linking CXX static library third_party/abseil-cpp/absl/time/libabsl_time.a
Step #1: [396/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_globals.a
Step #1: [397/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_entry.a
Step #1: [398/428] Linking CXX static library third_party/abseil-cpp/absl/synchronization/libabsl_synchronization.a
Step #1: [399/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_format.a
Step #1: [400/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_initialize.a
Step #1: [401/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_sink.a
Step #1: [402/428] Linking CXX static library third_party/abseil-cpp/absl/container/libabsl_hashtablez_sampler.a
Step #1: [403/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_program_name.a
Step #1: [404/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_cordz_handle.a
Step #1: [405/428] Building CXX object third_party/abseil-cpp/absl/strings/CMakeFiles/cord.dir/cord.cc.o
Step #1: [406/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_log_sink_set.a
Step #1: [407/428] Linking CXX static library third_party/abseil-cpp/absl/container/libabsl_raw_hash_set.a
Step #1: [408/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_config.a
Step #1: [409/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_cordz_info.a
Step #1: [410/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_message.a
Step #1: [411/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_internal.a
Step #1: [412/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_cordz_sample_token.a
Step #1: [413/428] Linking CXX static library third_party/abseil-cpp/absl/strings/libabsl_cord.a
Step #1: [414/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_internal_check_op.a
Step #1: [415/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_die_if_null.a
Step #1: [416/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_reflection.a
Step #1: [417/428] Linking CXX static library third_party/abseil-cpp/absl/status/libabsl_status.a
Step #1: [418/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags.a
Step #1: [419/428] Linking CXX static library third_party/abseil-cpp/absl/status/libabsl_statusor.a
Step #1: [420/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_usage_internal.a
Step #1: [421/428] Linking CXX static library third_party/abseil-cpp/absl/log/libabsl_log_flags.a
Step #1: [422/428] Linking CXX static library libprotobuf-lite.a
Step #1: [423/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_usage.a
Step #1: [424/428] Linking CXX static library third_party/abseil-cpp/absl/flags/libabsl_flags_parse.a
Step #1: [425/428] Linking CXX static library libprotobuf.a
Step #1: [426/428] Linking CXX static library libprotoc.a
Step #1: [427/428] Linking CXX executable protoc-22.3.0
Step #1: [428/428] Creating executable symlink protoc
Step #1: [7/16] Performing install step for 'external.protobuf'
Step #1: [0/1] Install the project...
Step #1: -- Install configuration: "Release"
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libprotobuf-lite.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libprotobuf.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libprotoc.a
Step #1: -- Installing: /src/LPM/external.protobuf/bin/protoc-22.3.0
Step #1: -- Installing: /src/LPM/external.protobuf/bin/protoc
Step #1: -- Set runtime path of "/src/LPM/external.protobuf/bin/protoc-22.3.0" to "$ORIGIN/../lib"
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/protobuf.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/protobuf-lite.pc
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/any.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/api.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/duration.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/empty.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/field_mask.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/source_context.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/struct.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/timestamp.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/type.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/wrappers.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/any.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arena.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arena_align.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arena_allocation_policy.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arena_cleanup.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arena_config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arenastring.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/arenaz_sampler.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/importer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/parser.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/descriptor.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/descriptor.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/descriptor_database.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/dynamic_message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/endian.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/explicitly_constructed.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/extension_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/extension_set_inl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/field_access_listener.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_enum_reflection.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_enum_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_message_bases.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_message_reflection.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_message_tctable_decl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_message_tctable_gen.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_message_tctable_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/generated_message_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/has_bits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/implicit_weak_message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/inlined_string_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/coded_stream.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/gzip_stream.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/io_win32.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/printer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/strtod.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/tokenizer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/zero_copy_sink.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/zero_copy_stream.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/zero_copy_stream_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/io/zero_copy_stream_impl_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/descriptor_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/lexer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/message_path.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/parser.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/parser_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/unparser.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/unparser_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/untyped_message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/writer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/internal/zero_copy_buffered_stream.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/json/json.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map_entry.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map_entry_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map_field_inl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map_field_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/map_type_handler.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/message_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/metadata.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/metadata_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/parse_context.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/port.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/port_def.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/port_undef.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/reflection.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/reflection_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/reflection_ops.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/repeated_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/repeated_ptr_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/serial_arena.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/service.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/string_block.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/stubs/callback.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/stubs/common.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/stubs/platform_macros.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/stubs/port.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/stubs/status_macros.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/text_format.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/thread_safe_arena.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/unknown_field_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/delimited_message_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/field_comparator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/field_mask_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/json_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/message_differencer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/time_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/type_resolver.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/util/type_resolver_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/wire_format.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/wire_format_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/code_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/command_line_interface.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/enum.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/extension.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/field_generators/generators.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/file.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/message_layout_helper.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/names.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/options.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/padding_optimizer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/parse_function_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/service.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/cpp/tracker.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_doc_comment.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_enum.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_enum_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_field_base.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_map_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_message_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_options.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_primitive_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_reflection_class.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_repeated_enum_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_repeated_message_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_repeated_primitive_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_source_generator_base.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/csharp_wrapper_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/csharp/names.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/context.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/doc_comment.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/enum.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/enum_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/enum_field_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/enum_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/extension.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/extension_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/file.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/generator_factory.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/kotlin_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/map_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/map_field_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message_builder.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message_builder_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message_field_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/message_serialization.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/name_resolver.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/names.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/options.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/primitive_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/primitive_field_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/service.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/shared_code_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/string_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/java/string_field_lite.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/enum.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/enum_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/extension.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/file.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/import_writer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/line_consumer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/map_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/message_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/names.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/nsobject_methods.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/oneof.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/options.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/primitive_field.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/objectivec/text_format_decode_data.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/php/names.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/php/php_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/plugin.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/plugin.pb.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/python/generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/python/helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/python/pyi_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/retention.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/ruby/ruby_generator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/scc.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/subprocess.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/zip_writer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/any.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/api.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/duration.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/empty.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/field_mask.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/source_context.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/struct.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/timestamp.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/type.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/wrappers.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/descriptor.proto
Step #1: -- Installing: /src/LPM/external.protobuf/include/google/protobuf/compiler/plugin.proto
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-targets.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-targets-release.cmake
Step #1: -- Up-to-date: /src/LPM/external.protobuf/lib/cmake/protobuf
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-generate.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-config.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-config-version.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-options.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/protobuf/protobuf-module.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/absl/abslTargets.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/absl/abslTargets-release.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/absl/abslConfig.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/absl/abslConfigVersion.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/profiling
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/profiling/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/profiling/internal/periodic_sampler.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/profiling/internal/sample_recorder.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/profiling/internal/exponential_biased.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/log_severity.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/casts.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/dynamic_annotations.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/macros.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/options.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/thread_annotations.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/port.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/optimization.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/unaligned_access.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/pretty_function.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/direct_mmap.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/sysinfo.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/identity.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/spinlock.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/strerror.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/spinlock_posix.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/per_thread_tls.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/raw_logging.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/unscaledcycleclock_config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/atomic_hook.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/scheduling_mode.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/dynamic_annotations.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/exception_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/unscaledcycleclock.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/low_level_scheduling.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/spinlock_win32.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/cycleclock_config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/scoped_set_env.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/thread_annotations.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/spinlock_akaros.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/invoke.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/prefetch.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/low_level_alloc.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/fast_type_id.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/inline_variable_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/spinlock_linux.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/endian.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/cycleclock.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/errno_saver.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/atomic_hook_test_helper.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/tsan_mutex_interface.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/spinlock_wait.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/hide_ptr.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/throw_delegate.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/thread_identity.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/inline_variable.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/internal/exception_safety_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/policy_checks.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/attributes.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/const_init.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/call_once.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/clock.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/time.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/civil_time.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/test_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/get_current_time_posix.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/include
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/include/cctz
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/include/cctz/zone_info_source.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/include/cctz/civil_time.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/include/cctz/time_zone.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/include/cctz/civil_time_detail.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/time_zone_info.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/time_zone_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/time_zone_if.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/time_zone_posix.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/time_zone_fixed.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/tzfile.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/cctz/src/time_zone_libc.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/time/internal/get_current_time_chrono.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/bits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/int128_no_intrinsic.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/int128.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/internal/bits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/internal/representation.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/numeric/int128_have_intrinsic.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/compare.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/any.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/optional.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/span.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/bad_any_cast.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/bad_optional_access.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/parentheses.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/optional.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/conformance_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/span.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/conformance_aliases.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/transform_args.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/conformance_testing_helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/conformance_archetype.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/conformance_profile.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/internal/variant.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/bad_variant_access.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/types/variant.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/scoped_mock_log.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/log_sink.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/log_entry.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/check_test_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/flags.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/globals.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/die_if_null.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/log_streamer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/check.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/log.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/absl_check.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/log_basic_test_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/log_message.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/conditions.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/check_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/flags.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/test_helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/globals.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/nullstream.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/test_actions.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/strip.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/log_impl.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/nullguard.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/log_format.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/voidify.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/log_sink_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/proto.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/check_op.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/structured.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/test_matchers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/internal/append_truncated.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/structured.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/absl_log.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/initialize.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/log/log_sink_registry.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/cleanup
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/cleanup/cleanup.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/cleanup/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/cleanup/internal/cleanup.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/escaping.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/str_join.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/cord_test_helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/cord.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/charconv.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/str_cat.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/substitute.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/strip.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/str_format.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/match.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/cordz_test_helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/str_replace.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/ascii.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/numbers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_btree_reader.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_statistics.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/escaping.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/numbers_test_common.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_btree.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/ostringstream.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_update_scope.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_handle.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/bind.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/arg.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/checker.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/constexpr_parser.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/parser.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/output.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/float_conversion.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_format/extension.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/stringify_sink.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/resize_uninitialized.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_data_edge.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_ring_reader.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/escaping_test_common.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/charconv_parse.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_join_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/char_map.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/str_split_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/string_constant.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/damerau_levenshtein_distance.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_flat.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/charconv_bigint.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_sample_token.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_functions.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/stl_type_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/has_absl_stringify.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_update_tracker.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/memutil.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_ring.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_crc.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_test_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cordz_info.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/utf8.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_btree_navigator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/pow10_helper.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/internal/cord_rep_consume.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/cord_buffer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/cord_analysis.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/string_view.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/strings/str_split.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/memory
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/memory/memory.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/bit_gen_ref.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/uniform_int_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/zipf_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/bernoulli_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/uniform_real_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/exponential_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/log_uniform_int_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/random.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/distributions.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/seed_gen_exception.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/discrete_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/mock_distributions.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/beta_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/mocking_bit_gen.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/fastmath.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/wide_multiply.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/explicit_seed_seq.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/randen_slow.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/pool_urbg.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/generate_real.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/mock_overload_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/fast_uniform_bits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/seed_material.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/randen.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/uniform_helper.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/nonsecure_base.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/salted_seed_seq.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/platform.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/randen_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/pcg_engine.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/randen_detect.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/chi_square.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/distribution_test_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/sequence_urbg.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/mock_helpers.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/randen_engine.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/iostream_state_saver.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/nanobenchmark.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/randen_hwaes.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/internal/distribution_caller.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/seed_sequences.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/poisson_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/random/gaussian_distribution.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/parse.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/usage_config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/declare.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/flag.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/marshalling.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/commandlineflag.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/usage.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/private_handle_accessor.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/parse.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/program_name.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/flag.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/path_util.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/flag_msvc.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/commandlineflag.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/registry.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/sequence_lock.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/internal/usage.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/flags/reflection.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/inlined_vector.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/btree_map.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/node_hash_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/flat_hash_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/btree_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hashtablez_sampler.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hashtable_debug.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/inlined_vector.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/tracked.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_set_members_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hash_function_defaults.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/common.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hash_generator_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/common_policy_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/raw_hash_map.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/layout.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_set_lookup_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/node_slot_policy.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/container_memory.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hashtable_debug_hooks.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_map_constructor_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/counting_allocator.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_map_lookup_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/test_instance_tracker.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_map_modifiers_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hash_policy_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_set_modifiers_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/compressed_tuple.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/btree.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/btree_container.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/hash_policy_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_set_constructor_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/unordered_map_members_test.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/internal/raw_hash_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/btree_set.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/flat_hash_map.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/node_hash_map.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/container/fixed_array.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/blocking_counter.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/barrier.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/mutex.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/notification.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/kernel_timeout.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/thread_pool.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/futex.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/waiter.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/per_thread_sem.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/graphcycles.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/synchronization/internal/create_thread_identity.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/meta
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/meta/type_traits.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/utility
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/utility/utility.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status/status.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status/statusor.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status/internal/statusor_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status/internal/status_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/status/status_payload_printer.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/algorithm
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/algorithm/algorithm.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/algorithm/container.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc32c_inline.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/non_temporal_memcpy.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/non_temporal_arm_intrinsics.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc_cord_state.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc_memcpy.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc_internal.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc32_x86_arm_combined_simd.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/cpu_detect.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/internal/crc32c.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/crc/crc32c.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/hash_testing.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/internal/low_level_hash.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/internal/city.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/internal/spy_hash_state.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/internal/hash.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/hash/hash.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/function_ref.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/any_invocable.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/bind_front.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/internal/front_binder.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/internal/function_ref.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/functional/internal/any_invocable.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/symbolize_emscripten.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/symbolize_unimplemented.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/stacktrace.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/leak_check.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/symbolize_elf.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/symbolize_win32.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/symbolize.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/failure_signal_handler.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/vdso_support.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_win32-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stack_consumption.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_arm-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_x86-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/demangle.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/examine_stack.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/symbolize.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_riscv-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_aarch64-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/address_is_readable.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/elf_mem_image.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_emscripten-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_unimplemented-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_generic-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_powerpc-inl.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/internal/stacktrace_config.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/debugging/symbolize_darwin.inc
Step #1: -- Installing: /src/LPM/external.protobuf/include/absl/base/options.h
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_atomic_hook.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_errno_saver.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_severity.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_severity.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_raw_logging_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_raw_logging_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_spinlock_wait.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_spinlock_wait.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_config.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_dynamic_annotations.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_core_headers.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_malloc_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_malloc_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_base_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_base.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_base.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_throw_delegate.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_throw_delegate.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_pretty_function.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_endian.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_scoped_set_env.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_scoped_set_env.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_strerror.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_strerror.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_fast_type_id.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_prefetch.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_algorithm.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_algorithm_container.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cleanup_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cleanup.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_btree.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_compressed_tuple.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_fixed_array.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_inlined_vector_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_inlined_vector.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_counting_allocator.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flat_hash_map.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flat_hash_set.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_node_hash_map.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_node_hash_set.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_container_memory.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_hash_function_defaults.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_hash_policy_traits.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_common_policy_traits.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_hashtablez_sampler.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_hashtablez_sampler.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_hashtable_debug.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_hashtable_debug_hooks.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_node_slot_policy.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_raw_hash_map.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_container_common.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_raw_hash_set.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_raw_hash_set.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_layout.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_crc_cpu_detect.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_crc_cpu_detect.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_crc_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_crc_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_crc32c.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_crc32c.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_non_temporal_arm_intrinsics.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_non_temporal_memcpy.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_crc_cord_state.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_crc_cord_state.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_stacktrace.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_stacktrace.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_symbolize.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_symbolize.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_examine_stack.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_examine_stack.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_failure_signal_handler.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_failure_signal_handler.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_debugging_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_debugging_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_demangle_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_demangle_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_leak_check.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_leak_check.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_debugging.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_path_util.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_program_name.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_program_name.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_config.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_config.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_marshalling.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_marshalling.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_commandlineflag_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_commandlineflag_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_commandlineflag.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_commandlineflag.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_private_handle_accessor.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_private_handle_accessor.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_reflection.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_reflection.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_usage_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_usage_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_usage.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_usage.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_flags_parse.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_flags_parse.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_any_invocable.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_bind_front.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_function_ref.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_hash.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_hash.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_city.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_city.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_low_level_hash.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_low_level_hash.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_check_impl.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_check_op.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_check_op.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_conditions.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_conditions.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_config.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_flags.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_format.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_format.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_globals.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_globals.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_log_impl.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_proto.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_proto.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_message.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_message.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_log_sink_set.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_log_sink_set.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_nullguard.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_internal_nullguard.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_nullstream.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_strip.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_voidify.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_append_truncated.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_absl_check.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_absl_log.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_check.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_die_if_null.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_die_if_null.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_flags.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_flags.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_globals.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_globals.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_initialize.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_initialize.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_entry.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_entry.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_sink.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_log_sink.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_sink_registry.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_streamer.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_internal_structured.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_log_structured.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_memory.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_type_traits.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_meta.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_bits.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_int128.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_int128.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_numeric.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_numeric_representation.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_sample_recorder.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_exponential_biased.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_exponential_biased.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_periodic_sampler.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_periodic_sampler.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_random.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_bit_gen_ref.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_mock_helpers.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_distributions.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_distributions.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_seed_gen_exception.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_seed_gen_exception.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_seed_sequences.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_seed_sequences.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_traits.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_distribution_caller.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_fast_uniform_bits.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_seed_material.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_seed_material.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_pool_urbg.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_pool_urbg.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_salted_seed_seq.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_iostream_state_saver.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_generate_real.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_wide_multiply.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_fastmath.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_nonsecure_base.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_pcg_engine.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_randen_engine.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_platform.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_platform.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_randen.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_randen.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_randen_slow.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_randen_slow.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_randen_hwaes.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_randen_hwaes.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_randen_hwaes_impl.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_randen_hwaes_impl.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_distribution_test_util.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_random_internal_distribution_test_util.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_random_internal_uniform_helper.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_status.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_status.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_statusor.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_statusor.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_strings.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_strings.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_strings_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_strings_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_str_format.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_str_format_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_str_format_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cord_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_cord_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_update_tracker.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_functions.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_cordz_functions.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_statistics.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_handle.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_cordz_handle.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_info.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_cordz_info.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_sample_token.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_cordz_sample_token.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cordz_update_scope.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_cord.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_cord.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_graphcycles_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_graphcycles_internal.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_kernel_timeout_internal.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_synchronization.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_synchronization.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_time.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_time.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_civil_time.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_civil_time.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_time_zone.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_time_zone.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_any.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_bad_any_cast.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_bad_any_cast_impl.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_bad_any_cast_impl.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_span.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_optional.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_bad_optional_access.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_bad_optional_access.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_bad_variant_access.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libabsl_bad_variant_access.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_variant.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_compare.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/pkgconfig/absl_utility.pc
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/utf8_range/utf8_range-targets.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/utf8_range/utf8_range-targets-release.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libutf8_validity.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/libutf8_range.a
Step #1: -- Installing: /src/LPM/external.protobuf/lib/cmake/utf8_range/utf8_range-config.cmake
Step #1: -- Installing: /src/LPM/external.protobuf/include/utf8_range.h
Step #1: -- Installing: /src/LPM/external.protobuf/include/utf8_validity.h
Step #1: [8/16] Completed 'external.protobuf'
Step #1: [9/16] Building CXX object src/CMakeFiles/protobuf-mutator.dir/utf8_fix.cc.o
Step #1: [10/16] Building CXX object src/CMakeFiles/protobuf-mutator.dir/binary_format.cc.o
Step #1: [11/16] Building CXX object src/CMakeFiles/protobuf-mutator.dir/text_format.cc.o
Step #1: [12/16] Building CXX object src/libfuzzer/CMakeFiles/protobuf-mutator-libfuzzer.dir/libfuzzer_mutator.cc.o
Step #1: [13/16] Building CXX object src/libfuzzer/CMakeFiles/protobuf-mutator-libfuzzer.dir/libfuzzer_macro.cc.o
Step #1: [14/16] Building CXX object src/CMakeFiles/protobuf-mutator.dir/mutator.cc.o
Step #1: [15/16] Linking CXX static library src/libprotobuf-mutator.a
Step #1: [16/16] Linking CXX static library src/libfuzzer/libprotobuf-mutator-libfuzzer.a
Step #1: Removing intermediate container 99f9eb12a91e
Step #1:  ---> 2d417a26881b
Step #1: Step 5/9 : RUN go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
Step #1:  ---> Running in e5d4f3868715
Step #1: go: downloading google.golang.org/protobuf v1.31.0
Step #1: Removing intermediate container e5d4f3868715
Step #1:  ---> 27d710c65193
Step #1: Step 6/9 : RUN git clone --depth 1 https://go.googlesource.com/go goroot
Step #1:  ---> Running in d7599f72609b
Step #1: Cloning into 'goroot'...
Step #1: Updating files:  76% (9826/12811)
Updating files:  77% (9865/12811)
Updating files:  78% (9993/12811)
Updating files:  79% (10121/12811)
Updating files:  80% (10249/12811)
Updating files:  81% (10377/12811)
Updating files:  82% (10506/12811)
Updating files:  83% (10634/12811)
Updating files:  84% (10762/12811)
Updating files:  85% (10890/12811)
Updating files:  86% (11018/12811)
Updating files:  87% (11146/12811)
Updating files:  88% (11274/12811)
Updating files:  89% (11402/12811)
Updating files:  90% (11530/12811)
Updating files:  91% (11659/12811)
Updating files:  92% (11787/12811)
Updating files:  93% (11915/12811)
Updating files:  94% (12043/12811)
Updating files:  95% (12171/12811)
Updating files:  96% (12299/12811)
Updating files:  97% (12427/12811)
Updating files:  98% (12555/12811)
Updating files:  99% (12683/12811)
Updating files: 100% (12811/12811)
Updating files: 100% (12811/12811), done.
Step #1: Removing intermediate container d7599f72609b
Step #1:  ---> aa6c54893d56
Step #1: Step 7/9 : RUN git clone --depth 1 https://github.com/catenacyber/ngolo-fuzzing.git
Step #1:  ---> Running in d29bd14688d9
Step #1: Cloning into 'ngolo-fuzzing'...
Step #1: Removing intermediate container d29bd14688d9
Step #1:  ---> 3d4f9e32b54d
Step #1: Step 8/9 : COPY build.sh $SRC/
Step #1:  ---> 8bb4c46338f2
Step #1: Step 9/9 : WORKDIR $SRC/ngolo-fuzzing
Step #1:  ---> Running in b51cdf6bcedc
Step #1: Removing intermediate container b51cdf6bcedc
Step #1:  ---> 277f68fbebbd
Step #1: Successfully built 277f68fbebbd
Step #1: Successfully tagged gcr.io/oss-fuzz/ngolo-fuzzing:latest
Finished Step #1
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/ngolo-fuzzing
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/file7hc21L
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ go == \g\o ]]
Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go'
Step #2 - "srcmap": ++ find /src /root/go -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/ngolo-fuzzing/.git
Step #2 - "srcmap": + GIT_DIR=/src/ngolo-fuzzing
Step #2 - "srcmap": + cd /src/ngolo-fuzzing
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/catenacyber/ngolo-fuzzing.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=fe7410fdd6d425a72cbd64046f8dc9cdb397f762
Step #2 - "srcmap": + jq_inplace /tmp/file7hc21L '."/src/ngolo-fuzzing" = { type: "git", url: "https://github.com/catenacyber/ngolo-fuzzing.git", rev: "fe7410fdd6d425a72cbd64046f8dc9cdb397f762" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/fileg4a9Tc
Step #2 - "srcmap": + cat /tmp/file7hc21L
Step #2 - "srcmap": + jq '."/src/ngolo-fuzzing" = { type: "git", url: "https://github.com/catenacyber/ngolo-fuzzing.git", rev: "fe7410fdd6d425a72cbd64046f8dc9cdb397f762" }'
Step #2 - "srcmap": + mv /tmp/fileg4a9Tc /tmp/file7hc21L
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/goroot/.git
Step #2 - "srcmap": + GIT_DIR=/src/goroot
Step #2 - "srcmap": + cd /src/goroot
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://go.googlesource.com/go
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=446a5dcf5a3230ce9832682d8f521071d8a34a2b
Step #2 - "srcmap": + jq_inplace /tmp/file7hc21L '."/src/goroot" = { type: "git", url: "https://go.googlesource.com/go", rev: "446a5dcf5a3230ce9832682d8f521071d8a34a2b" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/file6gYgJH
Step #2 - "srcmap": + cat /tmp/file7hc21L
Step #2 - "srcmap": + jq '."/src/goroot" = { type: "git", url: "https://go.googlesource.com/go", rev: "446a5dcf5a3230ce9832682d8f521071d8a34a2b" }'
Step #2 - "srcmap": + mv /tmp/file6gYgJH /tmp/file7hc21L
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/LPM/external.protobuf/src/external.protobuf/.git
Step #2 - "srcmap": + GIT_DIR=/src/LPM/external.protobuf/src/external.protobuf
Step #2 - "srcmap": + cd /src/LPM/external.protobuf/src/external.protobuf
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/google/protobuf.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=482156c0f96dd670b9f1ba4f946e66edeb04535f
Step #2 - "srcmap": + jq_inplace /tmp/file7hc21L '."/src/LPM/external.protobuf/src/external.protobuf" = { type: "git", url: "https://github.com/google/protobuf.git", rev: "482156c0f96dd670b9f1ba4f946e66edeb04535f" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/fileI3zbMg
Step #2 - "srcmap": + cat /tmp/file7hc21L
Step #2 - "srcmap": + jq '."/src/LPM/external.protobuf/src/external.protobuf" = { type: "git", url: "https://github.com/google/protobuf.git", rev: "482156c0f96dd670b9f1ba4f946e66edeb04535f" }'
Step #2 - "srcmap": + mv /tmp/fileI3zbMg /tmp/file7hc21L
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/libprotobuf-mutator/.git
Step #2 - "srcmap": + GIT_DIR=/src/libprotobuf-mutator
Step #2 - "srcmap": + cd /src/libprotobuf-mutator
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/google/libprotobuf-mutator.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=3b28530531b154a748fe9884bc9219b4966f0754
Step #2 - "srcmap": + jq_inplace /tmp/file7hc21L '."/src/libprotobuf-mutator" = { type: "git", url: "https://github.com/google/libprotobuf-mutator.git", rev: "3b28530531b154a748fe9884bc9219b4966f0754" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/file7QrU1K
Step #2 - "srcmap": + cat /tmp/file7hc21L
Step #2 - "srcmap": + jq '."/src/libprotobuf-mutator" = { type: "git", url: "https://github.com/google/libprotobuf-mutator.git", rev: "3b28530531b154a748fe9884bc9219b4966f0754" }'
Step #2 - "srcmap": + mv /tmp/file7QrU1K /tmp/file7hc21L
Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d
Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/file7hc21L
Step #2 - "srcmap": + rm /tmp/file7hc21L
Step #2 - "srcmap": {
Step #2 - "srcmap":   "/src/ngolo-fuzzing": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/catenacyber/ngolo-fuzzing.git",
Step #2 - "srcmap":     "rev": "fe7410fdd6d425a72cbd64046f8dc9cdb397f762"
Step #2 - "srcmap":   },
Step #2 - "srcmap":   "/src/goroot": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://go.googlesource.com/go",
Step #2 - "srcmap":     "rev": "446a5dcf5a3230ce9832682d8f521071d8a34a2b"
Step #2 - "srcmap":   },
Step #2 - "srcmap":   "/src/LPM/external.protobuf/src/external.protobuf": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/google/protobuf.git",
Step #2 - "srcmap":     "rev": "482156c0f96dd670b9f1ba4f946e66edeb04535f"
Step #2 - "srcmap":   },
Step #2 - "srcmap":   "/src/libprotobuf-mutator": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/google/libprotobuf-mutator.git",
Step #2 - "srcmap":     "rev": "3b28530531b154a748fe9884bc9219b4966f0754"
Step #2 - "srcmap":   }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-coverage-x86_64"
Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a...  done.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang
Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv
Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument
Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++
Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/goroot/src
Step #3 - "compile-libfuzzer-coverage-x86_64": + ./make.bash
Step #3 - "compile-libfuzzer-coverage-x86_64": Building Go cmd/dist using /root/.go. (go1.21.0 linux/amd64)
Step #3 - "compile-libfuzzer-coverage-x86_64": Building Go toolchain1 using /root/.go.
Step #3 - "compile-libfuzzer-coverage-x86_64": Building Go bootstrap cmd/go (go_bootstrap) using Go toolchain1.
Step #3 - "compile-libfuzzer-coverage-x86_64": Building Go toolchain2 using go_bootstrap and Go toolchain1.
Step #3 - "compile-libfuzzer-coverage-x86_64": Building Go toolchain3 using go_bootstrap and Go toolchain2.
Step #3 - "compile-libfuzzer-coverage-x86_64": Building packages and commands for linux/amd64.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---
Step #3 - "compile-libfuzzer-coverage-x86_64": Installed Go for linux/amd64 in /src/goroot
Step #3 - "compile-libfuzzer-coverage-x86_64": Installed commands in /src/goroot/bin
Step #3 - "compile-libfuzzer-coverage-x86_64": *** You need to add /src/goroot/bin to your PATH.
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -Rf /root/.go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/.go/bin:/root/go/bin:/src/goroot/bin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/.go/bin:/root/go/bin:/src/goroot/bin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + go install golang.org/x/tools/cmd/goimports@latest
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.14.0
Step #3 - "compile-libfuzzer-coverage-x86_64": + go build
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.1.9
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.5.1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20211019181941-9d821ace8654
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd go114-fuzz-build
Step #3 - "compile-libfuzzer-coverage-x86_64": + go build
Step #3 - "compile-libfuzzer-coverage-x86_64": + touch /src/ok.txt /src/ko.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": + find /src/goroot/src/ -type d
Step #3 - "compile-libfuzzer-coverage-x86_64": + cut -d/ -f5-
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src//*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src//*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/fmt/doc.go /src/goroot/src/fmt/errors.go /src/goroot/src/fmt/errors_test.go /src/goroot/src/fmt/example_test.go /src/goroot/src/fmt/export_test.go /src/goroot/src/fmt/fmt_test.go /src/goroot/src/fmt/format.go /src/goroot/src/fmt/gostringer_example_test.go /src/goroot/src/fmt/print.go /src/goroot/src/fmt/scan.go /src/goroot/src/fmt/scan_test.go /src/goroot/src/fmt/state_test.go /src/goroot/src/fmt/stringer_example_test.go /src/goroot/src/fmt/stringer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^fmt '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing fmt fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Found package in /src/goroot/src/fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Type State is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:62291, Elt:(*ast.Ident)(0xc000298160)} for Errorf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Function FormatString has unproduced argument State
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:69735, Elt:(*ast.Ident)(0xc00034f680)} for Fprintf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:70037, Elt:(*ast.Ident)(0xc00034fa20)} for Printf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:70225, Elt:(*ast.Ident)(0xc00034fc40)} for Sprintf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:70491, Elt:(*ast.Ident)(0xc00034ff60)} for Appendf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:70888, Elt:(*ast.Ident)(0xc000354360)} for Fprint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:71238, Elt:(*ast.Ident)(0xc000354680)} for Print
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:71474, Elt:(*ast.Ident)(0xc000354840)} for Sprint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:71725, Elt:(*ast.Ident)(0xc000354ae0)} for Append
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:72223, Elt:(*ast.Ident)(0xc000354e20)} for Fprintln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:72587, Elt:(*ast.Ident)(0xc000355140)} for Println
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:72837, Elt:(*ast.Ident)(0xc000355300)} for Sprintln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:73165, Elt:(*ast.Ident)(0xc0003555c0)} for Appendln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:2666, Elt:(*ast.Ident)(0xc0000b79e0)} for Scan
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:2864, Elt:(*ast.Ident)(0xc0000b7ba0)} for Scanln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:3414, Elt:(*ast.Ident)(0xc0000b7dc0)} for Scanf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:3928, Elt:(*ast.Ident)(0xc0001b8400)} for Sscan
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:4154, Elt:(*ast.Ident)(0xc0001b8640)} for Sscanln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:4524, Elt:(*ast.Ident)(0xc0001b88e0)} for Sscanf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:4890, Elt:(*ast.Ident)(0xc0001b8ba0)} for Fscan
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:5157, Elt:(*ast.Ident)(0xc0001b8f60)} for Fscanln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:14 Unhandled argument &ast.Ellipsis{Ellipsis:5563, Elt:(*ast.Ident)(0xc0001b9380)} for Fscanf
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/fmt.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/fmt.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.28.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.5
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module fmt: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_fmt [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_fmt.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:119:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:140:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:161:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:184:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_fmt/copy/doc.go fuzz_ng_fmt/copy/errors.go fuzz_ng_fmt/copy/format.go fuzz_ng_fmt/copy/print.go fuzz_ng_fmt/copy/scan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_fmt/copy/doc.go fuzz_ng_fmt/copy/errors.go fuzz_ng_fmt/copy/format.go fuzz_ng_fmt/copy/print.go fuzz_ng_fmt/copy/scan.go /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_fmt/fuzz_ng.go fuzz_ng_fmt/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/fmt/errors_test.go /src/goroot/src/fmt/example_test.go /src/goroot/src/fmt/export_test.go /src/goroot/src/fmt/fmt_test.go /src/goroot/src/fmt/gostringer_example_test.go /src/goroot/src/fmt/scan_test.go /src/goroot/src/fmt/state_test.go /src/goroot/src/fmt/stringer_example_test.go /src/goroot/src/fmt/stringer_test.go /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/fmt/testdata /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/fmt/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_fmt/' /src/goroot/src/fuzz_ng_fmt/doc.go /src/goroot/src/fuzz_ng_fmt/errors.go /src/goroot/src/fuzz_ng_fmt/errors_test.go /src/goroot/src/fuzz_ng_fmt/example_test.go /src/goroot/src/fuzz_ng_fmt/export_test.go /src/goroot/src/fuzz_ng_fmt/fmt_test.go /src/goroot/src/fuzz_ng_fmt/format.go /src/goroot/src/fuzz_ng_fmt/fuzz_ng.go /src/goroot/src/fuzz_ng_fmt/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_fmt/gostringer_example_test.go /src/goroot/src/fuzz_ng_fmt/ngolo_helper.go /src/goroot/src/fuzz_ng_fmt/print.go /src/goroot/src/fuzz_ng_fmt/scan.go /src/goroot/src/fuzz_ng_fmt/scan_test.go /src/goroot/src/fuzz_ng_fmt/state_test.go /src/goroot/src/fuzz_ng_fmt/stringer_example_test.go /src/goroot/src/fuzz_ng_fmt/stringer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_fmt/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_fmt/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_fmt /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.16.1-0.20231129163542-152cdb1503eb
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.19.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.15.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.14.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package google.golang.org/protobuf/proto
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found google.golang.org/protobuf/proto in google.golang.org/protobuf v1.31.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_fmt [fuzz_ng_fmt.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format.go:41:6: fmt already declared through import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./errors_test.go:9:2: other declaration of fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format.go:41:6: fmt already declared through import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./example_test.go:8:2: other declaration of fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ./print.go:39:6: State already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/print.go:39:6: other declaration of State
Step #3 - "compile-libfuzzer-coverage-x86_64": ./print.go:54:6: Formatter already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/print.go:54:6: other declaration of Formatter
Step #3 - "compile-libfuzzer-coverage-x86_64": ./print.go:222:6: Fprintf already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/print.go:222:6: other declaration of Fprintf
Step #3 - "compile-libfuzzer-coverage-x86_64": ./print.go:260:6: Fprint already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/print.go:260:6: other declaration of Fprint
Step #3 - "compile-libfuzzer-coverage-x86_64": ./print.go:330:6: Appendln already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/print.go:330:6: other declaration of Appendln
Step #3 - "compile-libfuzzer-coverage-x86_64": ./scan.go:55:6: Scanner already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/scan.go:55:6: other declaration of Scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ./scan.go:141:6: Fscanf already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/scan.go:141:6: other declaration of Fscanf
Step #3 - "compile-libfuzzer-coverage-x86_64": ./errors.go:22:6: Errorf already declared through dot-import of package fmt ("fmt")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/fmt/errors.go:22:6: other declaration of Errorf
Step #3 - "compile-libfuzzer-coverage-x86_64": ./errors.go:22:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_fmt [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_fmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_fmt_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/context/afterfunc_test.go /src/goroot/src/context/benchmark_test.go /src/goroot/src/context/context.go /src/goroot/src/context/context_test.go /src/goroot/src/context/example_test.go /src/goroot/src/context/net_test.go /src/goroot/src/context/x_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package context
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^context '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing context fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Found package in /src/goroot/src/context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Unhandled argument &ast.FuncType{Func:12002, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000125ad0), Results:(*ast.FieldList)(nil)} for AfterFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Function WithDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Function WithDeadlineCause has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Function WithDeadlineCause has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Function WithTimeout has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Function WithTimeoutCause has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:20 Function WithTimeoutCause has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/context.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/context.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo context
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=context
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_context
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module context: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_context/copy/context.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_context/copy/context.go /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_context/fuzz_ng.go fuzz_ng_context/fuzzng_unsure_test.go fuzz_ng_context/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/context/afterfunc_test.go /src/goroot/src/context/benchmark_test.go /src/goroot/src/context/context_test.go /src/goroot/src/context/example_test.go /src/goroot/src/context/net_test.go /src/goroot/src/context/x_test.go /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/context/testdata /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/context/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_context/' /src/goroot/src/fuzz_ng_context/afterfunc_test.go /src/goroot/src/fuzz_ng_context/benchmark_test.go /src/goroot/src/fuzz_ng_context/context.go /src/goroot/src/fuzz_ng_context/context_test.go /src/goroot/src/fuzz_ng_context/example_test.go /src/goroot/src/fuzz_ng_context/fuzz_ng.go /src/goroot/src/fuzz_ng_context/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_context/net_test.go /src/goroot/src/fuzz_ng_context/ngolo_helper.go /src/goroot/src/fuzz_ng_context/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_context/x_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_context/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_context/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_context /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_context [fuzz_ng_context.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./x_test.go:44:2: veryLongDuration redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./context_test.go:36:7: other declaration of veryLongDuration
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:68:6: Context already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:68:6: other declaration of Context
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:211:6: Background already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:211:6: other declaration of Background
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:219:6: TODO already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:219:6: other declaration of TODO
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:227:6: CancelFunc already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:227:6: other declaration of CancelFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:235:6: WithCancel already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:235:6: other declaration of WithCancel
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:250:6: CancelCauseFunc already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:250:6: other declaration of CancelCauseFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:263:6: WithCancelCause already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:263:6: other declaration of WithCancelCause
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:283:6: Cause already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:283:6: other declaration of Cause
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:618:6: WithDeadlineCause already declared through dot-import of package context ("context")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/context/context.go:618:6: other declaration of WithDeadlineCause
Step #3 - "compile-libfuzzer-coverage-x86_64": ./context.go:263:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_context [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_context/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_context
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_context_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo context
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/reflect/abi.go /src/goroot/src/reflect/abi_test.go /src/goroot/src/reflect/all_test.go /src/goroot/src/reflect/arena.go /src/goroot/src/reflect/benchmark_test.go /src/goroot/src/reflect/deepequal.go /src/goroot/src/reflect/example_test.go /src/goroot/src/reflect/export_test.go /src/goroot/src/reflect/float32reg_generic.go /src/goroot/src/reflect/makefunc.go /src/goroot/src/reflect/nih_test.go /src/goroot/src/reflect/set_test.go /src/goroot/src/reflect/stubs_ppc64x.go /src/goroot/src/reflect/stubs_riscv64.go /src/goroot/src/reflect/swapper.go /src/goroot/src/reflect/tostring_test.go /src/goroot/src/reflect/type.go /src/goroot/src/reflect/type_test.go /src/goroot/src/reflect/value.go /src/goroot/src/reflect/visiblefields.go /src/goroot/src/reflect/visiblefields_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 21 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^reflect '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing reflect fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Found package in /src/goroot/src/reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Array result for Value is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Array result for Value is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Array result for uintptr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Array result for Value is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Array result for StructField is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Type StructTag is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Type ValueError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Unhandled argument &ast.FuncType{Func:112770, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001baa80), Results:(*ast.FieldList)(0xc0001baae0)} for MakeFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:30 Failed creating fuzz target : Unhandled result &ast.FuncType{Func:26447, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000146120), Results:(*ast.FieldList)(nil)} for Swapper
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/reflect.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/reflect.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": no Go files in /src/ngolo-fuzzing/fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": no Go files in /src/ngolo-fuzzing/fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": no Go files in /src/ngolo-fuzzing/fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_reflect/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_reflect/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_reflect/copy/*.go' /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_reflect/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_reflect/*.go' /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_reflect/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/reflect/abi_test.go /src/goroot/src/reflect/all_test.go /src/goroot/src/reflect/benchmark_test.go /src/goroot/src/reflect/example_test.go /src/goroot/src/reflect/export_test.go /src/goroot/src/reflect/nih_test.go /src/goroot/src/reflect/set_test.go /src/goroot/src/reflect/tostring_test.go /src/goroot/src/reflect/type_test.go /src/goroot/src/reflect/visiblefields_test.go /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/reflect/testdata /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/reflect/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_reflect/' /src/goroot/src/fuzz_ng_reflect/abi_test.go /src/goroot/src/fuzz_ng_reflect/all_test.go /src/goroot/src/fuzz_ng_reflect/benchmark_test.go /src/goroot/src/fuzz_ng_reflect/example_test.go /src/goroot/src/fuzz_ng_reflect/export_test.go /src/goroot/src/fuzz_ng_reflect/ngolo_helper.go /src/goroot/src/fuzz_ng_reflect/nih_test.go /src/goroot/src/fuzz_ng_reflect/set_test.go /src/goroot/src/fuzz_ng_reflect/tostring_test.go /src/goroot/src/fuzz_ng_reflect/type_test.go /src/goroot/src/fuzz_ng_reflect/visiblefields_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_reflect/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_reflect/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_reflect /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_reflect (test)
Step #3 - "compile-libfuzzer-coverage-x86_64": 	all_test.go:22:2: use of internal package reflect/internal/example1 not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_reflect [setup failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_reflect/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_reflect_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64": 	zip warning: name not matched: corpus
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": zip error: Nothing to do! (try: zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_reflect_seed_corpus.zip . -i corpus)
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/reflect/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/reflect/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/reflect/internal/example1/example.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect/internal/example1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/reflect/internal/example2/example.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo reflect/internal/example2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/index/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/index/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/index/suffixarray/example_test.go /src/goroot/src/index/suffixarray/gen.go /src/goroot/src/index/suffixarray/sais.go /src/goroot/src/index/suffixarray/sais2.go /src/goroot/src/index/suffixarray/suffixarray.go /src/goroot/src/index/suffixarray/suffixarray_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^index_suffixarray '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing index/suffixarray fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:31 Found package in /src/goroot/src/index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:31 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:31 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:31 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:31 Function FindAllIndex has unproduced argument regexp.Regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/index_suffixarray.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/index_suffixarray.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module index/suffixarray: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_index_suffixarray/copy/sais.go fuzz_ng_index_suffixarray/copy/sais2.go fuzz_ng_index_suffixarray/copy/suffixarray.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_index_suffixarray/copy/sais.go fuzz_ng_index_suffixarray/copy/sais2.go fuzz_ng_index_suffixarray/copy/suffixarray.go /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_index_suffixarray/fuzz_ng.go fuzz_ng_index_suffixarray/fuzzng_unsure_test.go fuzz_ng_index_suffixarray/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/index/suffixarray/example_test.go /src/goroot/src/index/suffixarray/suffixarray_test.go /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/index/suffixarray/testdata /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/index/suffixarray/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_index_suffixarray/' /src/goroot/src/fuzz_ng_index_suffixarray/example_test.go /src/goroot/src/fuzz_ng_index_suffixarray/fuzz_ng.go /src/goroot/src/fuzz_ng_index_suffixarray/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_index_suffixarray/ngolo_helper.go /src/goroot/src/fuzz_ng_index_suffixarray/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_index_suffixarray/sais.go /src/goroot/src/fuzz_ng_index_suffixarray/sais2.go /src/goroot/src/fuzz_ng_index_suffixarray/suffixarray.go /src/goroot/src/fuzz_ng_index_suffixarray/suffixarray_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_index_suffixarray/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_index_suffixarray/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_index_suffixarray /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_index_suffixarray [fuzz_ng_index_suffixarray.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_index_suffixarray [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_index_suffixarray/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_index_suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_index_suffixarray_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/math/abs.go /src/goroot/src/math/acosh.go /src/goroot/src/math/all_test.go /src/goroot/src/math/arith_s390x.go /src/goroot/src/math/arith_s390x_test.go /src/goroot/src/math/asin.go /src/goroot/src/math/asinh.go /src/goroot/src/math/atan.go /src/goroot/src/math/atan2.go /src/goroot/src/math/atanh.go /src/goroot/src/math/bits.go /src/goroot/src/math/cbrt.go /src/goroot/src/math/const.go /src/goroot/src/math/const_test.go /src/goroot/src/math/copysign.go /src/goroot/src/math/dim.go /src/goroot/src/math/dim_asm.go /src/goroot/src/math/dim_noasm.go /src/goroot/src/math/erf.go /src/goroot/src/math/erfinv.go /src/goroot/src/math/example_test.go /src/goroot/src/math/exp.go /src/goroot/src/math/exp2_asm.go /src/goroot/src/math/exp2_noasm.go /src/goroot/src/math/exp_amd64.go /src/goroot/src/math/exp_asm.go /src/goroot/src/math/exp_noasm.go /src/goroot/src/math/expm1.go /src/goroot/src/math/export_s390x_test.go /src/goroot/src/math/export_test.go /src/goroot/src/math/floor.go /src/goroot/src/math/floor_asm.go /src/goroot/src/math/floor_noasm.go /src/goroot/src/math/fma.go /src/goroot/src/math/frexp.go /src/goroot/src/math/gamma.go /src/goroot/src/math/huge_test.go /src/goroot/src/math/hypot.go /src/goroot/src/math/hypot_asm.go /src/goroot/src/math/hypot_noasm.go /src/goroot/src/math/j0.go /src/goroot/src/math/j1.go /src/goroot/src/math/jn.go /src/goroot/src/math/ldexp.go /src/goroot/src/math/lgamma.go /src/goroot/src/math/log.go /src/goroot/src/math/log10.go /src/goroot/src/math/log1p.go /src/goroot/src/math/log_asm.go /src/goroot/src/math/log_stub.go /src/goroot/src/math/logb.go /src/goroot/src/math/mod.go /src/goroot/src/math/modf.go /src/goroot/src/math/modf_asm.go /src/goroot/src/math/modf_noasm.go /src/goroot/src/math/nextafter.go /src/goroot/src/math/pow.go /src/goroot/src/math/pow10.go /src/goroot/src/math/remainder.go /src/goroot/src/math/signbit.go /src/goroot/src/math/sin.go /src/goroot/src/math/sincos.go /src/goroot/src/math/sinh.go /src/goroot/src/math/sqrt.go /src/goroot/src/math/stubs.go /src/goroot/src/math/tan.go /src/goroot/src/math/tanh.go /src/goroot/src/math/trig_reduce.go /src/goroot/src/math/unsafe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 69 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package math
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^math '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing math fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:38 Found package in /src/goroot/src/math
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/math.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/math.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=math
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_math
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module math: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:273:9: undefined: NgoloFuzzOne_Log1p
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:312:9: undefined: NgoloFuzzOne_Float32bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:314:9: undefined: NgoloFuzzOne_Float32frombits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:316:9: undefined: NgoloFuzzOne_Float64bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:318:9: undefined: NgoloFuzzOne_Float64frombits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:416:9: undefined: NgoloFuzzOne_Log1p
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:454:9: undefined: NgoloFuzzOne_Float32bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:456:9: undefined: NgoloFuzzOne_Float32frombits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:458:9: undefined: NgoloFuzzOne_Float64bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:460:9: undefined: NgoloFuzzOne_Float64frombits
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:460:9: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_math/copy/abs.go fuzz_ng_math/copy/acosh.go fuzz_ng_math/copy/asin.go fuzz_ng_math/copy/asinh.go fuzz_ng_math/copy/atan.go fuzz_ng_math/copy/atan2.go fuzz_ng_math/copy/atanh.go fuzz_ng_math/copy/bits.go fuzz_ng_math/copy/cbrt.go fuzz_ng_math/copy/const.go fuzz_ng_math/copy/copysign.go fuzz_ng_math/copy/dim.go fuzz_ng_math/copy/dim_asm.go fuzz_ng_math/copy/erf.go fuzz_ng_math/copy/erfinv.go fuzz_ng_math/copy/exp.go fuzz_ng_math/copy/exp2_noasm.go fuzz_ng_math/copy/exp_amd64.go fuzz_ng_math/copy/exp_asm.go fuzz_ng_math/copy/expm1.go fuzz_ng_math/copy/floor.go fuzz_ng_math/copy/floor_asm.go fuzz_ng_math/copy/fma.go fuzz_ng_math/copy/frexp.go fuzz_ng_math/copy/gamma.go fuzz_ng_math/copy/hypot.go fuzz_ng_math/copy/hypot_asm.go fuzz_ng_math/copy/j0.go fuzz_ng_math/copy/j1.go fuzz_ng_math/copy/jn.go fuzz_ng_math/copy/ldexp.go fuzz_ng_math/copy/lgamma.go fuzz_ng_math/copy/log.go fuzz_ng_math/copy/log10.go fuzz_ng_math/copy/log1p.go fuzz_ng_math/copy/log_asm.go fuzz_ng_math/copy/logb.go fuzz_ng_math/copy/mod.go fuzz_ng_math/copy/modf.go fuzz_ng_math/copy/modf_noasm.go fuzz_ng_math/copy/nextafter.go fuzz_ng_math/copy/pow.go fuzz_ng_math/copy/pow10.go fuzz_ng_math/copy/remainder.go fuzz_ng_math/copy/signbit.go fuzz_ng_math/copy/sin.go fuzz_ng_math/copy/sincos.go fuzz_ng_math/copy/sinh.go fuzz_ng_math/copy/sqrt.go fuzz_ng_math/copy/stubs.go fuzz_ng_math/copy/tan.go fuzz_ng_math/copy/tanh.go fuzz_ng_math/copy/trig_reduce.go fuzz_ng_math/copy/unsafe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math/copy/abs.go fuzz_ng_math/copy/acosh.go fuzz_ng_math/copy/asin.go fuzz_ng_math/copy/asinh.go fuzz_ng_math/copy/atan.go fuzz_ng_math/copy/atan2.go fuzz_ng_math/copy/atanh.go fuzz_ng_math/copy/bits.go fuzz_ng_math/copy/cbrt.go fuzz_ng_math/copy/const.go fuzz_ng_math/copy/copysign.go fuzz_ng_math/copy/dim.go fuzz_ng_math/copy/dim_asm.go fuzz_ng_math/copy/erf.go fuzz_ng_math/copy/erfinv.go fuzz_ng_math/copy/exp.go fuzz_ng_math/copy/exp2_noasm.go fuzz_ng_math/copy/exp_amd64.go fuzz_ng_math/copy/exp_asm.go fuzz_ng_math/copy/expm1.go fuzz_ng_math/copy/floor.go fuzz_ng_math/copy/floor_asm.go fuzz_ng_math/copy/fma.go fuzz_ng_math/copy/frexp.go fuzz_ng_math/copy/gamma.go fuzz_ng_math/copy/hypot.go fuzz_ng_math/copy/hypot_asm.go fuzz_ng_math/copy/j0.go fuzz_ng_math/copy/j1.go fuzz_ng_math/copy/jn.go fuzz_ng_math/copy/ldexp.go fuzz_ng_math/copy/lgamma.go fuzz_ng_math/copy/log.go fuzz_ng_math/copy/log10.go fuzz_ng_math/copy/log1p.go fuzz_ng_math/copy/log_asm.go fuzz_ng_math/copy/logb.go fuzz_ng_math/copy/mod.go fuzz_ng_math/copy/modf.go fuzz_ng_math/copy/modf_noasm.go fuzz_ng_math/copy/nextafter.go fuzz_ng_math/copy/pow.go fuzz_ng_math/copy/pow10.go fuzz_ng_math/copy/remainder.go fuzz_ng_math/copy/signbit.go fuzz_ng_math/copy/sin.go fuzz_ng_math/copy/sincos.go fuzz_ng_math/copy/sinh.go fuzz_ng_math/copy/sqrt.go fuzz_ng_math/copy/stubs.go fuzz_ng_math/copy/tan.go fuzz_ng_math/copy/tanh.go fuzz_ng_math/copy/trig_reduce.go fuzz_ng_math/copy/unsafe.go /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math/fuzz_ng.go fuzz_ng_math/fuzzng_unsure_test.go fuzz_ng_math/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/math/all_test.go /src/goroot/src/math/arith_s390x_test.go /src/goroot/src/math/const_test.go /src/goroot/src/math/example_test.go /src/goroot/src/math/export_s390x_test.go /src/goroot/src/math/export_test.go /src/goroot/src/math/huge_test.go /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/math/testdata /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/math/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_math/' /src/goroot/src/fuzz_ng_math/abs.go /src/goroot/src/fuzz_ng_math/acosh.go /src/goroot/src/fuzz_ng_math/all_test.go /src/goroot/src/fuzz_ng_math/arith_s390x_test.go /src/goroot/src/fuzz_ng_math/asin.go /src/goroot/src/fuzz_ng_math/asinh.go /src/goroot/src/fuzz_ng_math/atan.go /src/goroot/src/fuzz_ng_math/atan2.go /src/goroot/src/fuzz_ng_math/atanh.go /src/goroot/src/fuzz_ng_math/bits.go /src/goroot/src/fuzz_ng_math/cbrt.go /src/goroot/src/fuzz_ng_math/const.go /src/goroot/src/fuzz_ng_math/const_test.go /src/goroot/src/fuzz_ng_math/copysign.go /src/goroot/src/fuzz_ng_math/dim.go /src/goroot/src/fuzz_ng_math/dim_asm.go /src/goroot/src/fuzz_ng_math/erf.go /src/goroot/src/fuzz_ng_math/erfinv.go /src/goroot/src/fuzz_ng_math/example_test.go /src/goroot/src/fuzz_ng_math/exp.go /src/goroot/src/fuzz_ng_math/exp2_noasm.go /src/goroot/src/fuzz_ng_math/exp_amd64.go /src/goroot/src/fuzz_ng_math/exp_asm.go /src/goroot/src/fuzz_ng_math/expm1.go /src/goroot/src/fuzz_ng_math/export_s390x_test.go /src/goroot/src/fuzz_ng_math/export_test.go /src/goroot/src/fuzz_ng_math/floor.go /src/goroot/src/fuzz_ng_math/floor_asm.go /src/goroot/src/fuzz_ng_math/fma.go /src/goroot/src/fuzz_ng_math/frexp.go /src/goroot/src/fuzz_ng_math/fuzz_ng.go /src/goroot/src/fuzz_ng_math/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math/gamma.go /src/goroot/src/fuzz_ng_math/huge_test.go /src/goroot/src/fuzz_ng_math/hypot.go /src/goroot/src/fuzz_ng_math/hypot_asm.go /src/goroot/src/fuzz_ng_math/j0.go /src/goroot/src/fuzz_ng_math/j1.go /src/goroot/src/fuzz_ng_math/jn.go /src/goroot/src/fuzz_ng_math/ldexp.go /src/goroot/src/fuzz_ng_math/lgamma.go /src/goroot/src/fuzz_ng_math/log.go /src/goroot/src/fuzz_ng_math/log10.go /src/goroot/src/fuzz_ng_math/log1p.go /src/goroot/src/fuzz_ng_math/log_asm.go /src/goroot/src/fuzz_ng_math/logb.go /src/goroot/src/fuzz_ng_math/mod.go /src/goroot/src/fuzz_ng_math/modf.go /src/goroot/src/fuzz_ng_math/modf_noasm.go /src/goroot/src/fuzz_ng_math/nextafter.go /src/goroot/src/fuzz_ng_math/ngolo_helper.go /src/goroot/src/fuzz_ng_math/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math/pow.go /src/goroot/src/fuzz_ng_math/pow10.go /src/goroot/src/fuzz_ng_math/remainder.go /src/goroot/src/fuzz_ng_math/signbit.go /src/goroot/src/fuzz_ng_math/sin.go /src/goroot/src/fuzz_ng_math/sincos.go /src/goroot/src/fuzz_ng_math/sinh.go /src/goroot/src/fuzz_ng_math/sqrt.go /src/goroot/src/fuzz_ng_math/stubs.go /src/goroot/src/fuzz_ng_math/tan.go /src/goroot/src/fuzz_ng_math/tanh.go /src/goroot/src/fuzz_ng_math/trig_reduce.go /src/goroot/src/fuzz_ng_math/unsafe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_math /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_math [fuzz_ng_math.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:32:5: acos redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./asin.go:65:6: other declaration of acos
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:44:5: acosh redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./acosh.go:50:6: other declaration of acosh
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:56:5: asin redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./asin.go:27:6: other declaration of asin
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:68:5: asinh redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./asinh.go:47:6: other declaration of asinh
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:80:5: atan redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./atan.go:103:6: other declaration of atan
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:92:5: atanh redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./atanh.go:55:6: other declaration of atanh
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:104:5: atan2 redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./atan2.go:37:6: other declaration of atan2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:116:5: cbrt redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./cbrt.go:33:6: other declaration of cbrt
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:128:5: ceil redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./floor.go:50:6: other declaration of ceil
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:152:5: cos redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./sin.go:125:6: other declaration of cos
Step #3 - "compile-libfuzzer-coverage-x86_64": ./all_test.go:152:5: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_math [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_math/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_math_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo math
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/math/big/accuracy_string.go /src/goroot/src/math/big/alias_test.go /src/goroot/src/math/big/arith.go /src/goroot/src/math/big/arith_amd64.go /src/goroot/src/math/big/arith_decl.go /src/goroot/src/math/big/arith_decl_pure.go /src/goroot/src/math/big/arith_decl_s390x.go /src/goroot/src/math/big/arith_s390x_test.go /src/goroot/src/math/big/arith_test.go /src/goroot/src/math/big/bits_test.go /src/goroot/src/math/big/calibrate_test.go /src/goroot/src/math/big/decimal.go /src/goroot/src/math/big/decimal_test.go /src/goroot/src/math/big/doc.go /src/goroot/src/math/big/example_rat_test.go /src/goroot/src/math/big/example_test.go /src/goroot/src/math/big/float.go /src/goroot/src/math/big/float_test.go /src/goroot/src/math/big/floatconv.go /src/goroot/src/math/big/floatconv_test.go /src/goroot/src/math/big/floatexample_test.go /src/goroot/src/math/big/floatmarsh.go /src/goroot/src/math/big/floatmarsh_test.go /src/goroot/src/math/big/ftoa.go /src/goroot/src/math/big/gcd_test.go /src/goroot/src/math/big/hilbert_test.go /src/goroot/src/math/big/int.go /src/goroot/src/math/big/int_test.go /src/goroot/src/math/big/intconv.go /src/goroot/src/math/big/intconv_test.go /src/goroot/src/math/big/intmarsh.go /src/goroot/src/math/big/intmarsh_test.go /src/goroot/src/math/big/link_test.go /src/goroot/src/math/big/nat.go /src/goroot/src/math/big/nat_test.go /src/goroot/src/math/big/natconv.go /src/goroot/src/math/big/natconv_test.go /src/goroot/src/math/big/natdiv.go /src/goroot/src/math/big/prime.go /src/goroot/src/math/big/prime_test.go /src/goroot/src/math/big/rat.go /src/goroot/src/math/big/rat_test.go /src/goroot/src/math/big/ratconv.go /src/goroot/src/math/big/ratconv_test.go /src/goroot/src/math/big/ratmarsh.go /src/goroot/src/math/big/ratmarsh_test.go /src/goroot/src/math/big/roundingmode_string.go /src/goroot/src/math/big/sqrt.go /src/goroot/src/math/big/sqrt_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 49 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^math_big '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Quo -limits FloatNgdotSetMantExp.exp,IntNgdotBinomial.k,IntNgdotBinomial.n,IntNgdotProbablyPrime.n,RatNgdotFloatString.prec,FloatNgdotText.prec,FloatNgdotAppend.prec,IntNgdotSetBit.i'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Quo -limits FloatNgdotSetMantExp.exp,IntNgdotBinomial.k,IntNgdotBinomial.n,IntNgdotProbablyPrime.n,RatNgdotFloatString.prec,FloatNgdotText.prec,FloatNgdotAppend.prec,IntNgdotSetBit.i math/big fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Found package in /src/goroot/src/math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for Word is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Type Word is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Type ErrNaN is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Error has unproduced recv ErrNaN
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Scan has unproduced argument fmt.ScanState
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Format has unproduced argument fmt.State
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function SetBits has unproduced array argument Word
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Rand has unproduced argument rand.Rand
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Format has unproduced argument fmt.State
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Scan has unproduced argument fmt.ScanState
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:48 Function Scan has unproduced argument fmt.ScanState
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/math_big.py
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/std/math_big.py
Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 /src/ngolo-fuzzing/std/math_big.py fuzz_ng_math_big/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzz_ng_math_big/fuzz_ngp.go fuzz_ng_math_big/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module math/big: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_math_big/copy/accuracy_string.go fuzz_ng_math_big/copy/arith.go fuzz_ng_math_big/copy/arith_amd64.go fuzz_ng_math_big/copy/arith_decl.go fuzz_ng_math_big/copy/decimal.go fuzz_ng_math_big/copy/doc.go fuzz_ng_math_big/copy/float.go fuzz_ng_math_big/copy/floatconv.go fuzz_ng_math_big/copy/floatmarsh.go fuzz_ng_math_big/copy/ftoa.go fuzz_ng_math_big/copy/int.go fuzz_ng_math_big/copy/intconv.go fuzz_ng_math_big/copy/intmarsh.go fuzz_ng_math_big/copy/nat.go fuzz_ng_math_big/copy/natconv.go fuzz_ng_math_big/copy/natdiv.go fuzz_ng_math_big/copy/prime.go fuzz_ng_math_big/copy/rat.go fuzz_ng_math_big/copy/ratconv.go fuzz_ng_math_big/copy/ratmarsh.go fuzz_ng_math_big/copy/roundingmode_string.go fuzz_ng_math_big/copy/sqrt.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_big/copy/accuracy_string.go fuzz_ng_math_big/copy/arith.go fuzz_ng_math_big/copy/arith_amd64.go fuzz_ng_math_big/copy/arith_decl.go fuzz_ng_math_big/copy/decimal.go fuzz_ng_math_big/copy/doc.go fuzz_ng_math_big/copy/float.go fuzz_ng_math_big/copy/floatconv.go fuzz_ng_math_big/copy/floatmarsh.go fuzz_ng_math_big/copy/ftoa.go fuzz_ng_math_big/copy/int.go fuzz_ng_math_big/copy/intconv.go fuzz_ng_math_big/copy/intmarsh.go fuzz_ng_math_big/copy/nat.go fuzz_ng_math_big/copy/natconv.go fuzz_ng_math_big/copy/natdiv.go fuzz_ng_math_big/copy/prime.go fuzz_ng_math_big/copy/rat.go fuzz_ng_math_big/copy/ratconv.go fuzz_ng_math_big/copy/ratmarsh.go fuzz_ng_math_big/copy/roundingmode_string.go fuzz_ng_math_big/copy/sqrt.go /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_big/fuzz_ng.go fuzz_ng_math_big/fuzzng_unsure_test.go fuzz_ng_math_big/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/math/big/alias_test.go /src/goroot/src/math/big/arith_s390x_test.go /src/goroot/src/math/big/arith_test.go /src/goroot/src/math/big/bits_test.go /src/goroot/src/math/big/calibrate_test.go /src/goroot/src/math/big/decimal_test.go /src/goroot/src/math/big/example_rat_test.go /src/goroot/src/math/big/example_test.go /src/goroot/src/math/big/float_test.go /src/goroot/src/math/big/floatconv_test.go /src/goroot/src/math/big/floatexample_test.go /src/goroot/src/math/big/floatmarsh_test.go /src/goroot/src/math/big/gcd_test.go /src/goroot/src/math/big/hilbert_test.go /src/goroot/src/math/big/int_test.go /src/goroot/src/math/big/intconv_test.go /src/goroot/src/math/big/intmarsh_test.go /src/goroot/src/math/big/link_test.go /src/goroot/src/math/big/nat_test.go /src/goroot/src/math/big/natconv_test.go /src/goroot/src/math/big/prime_test.go /src/goroot/src/math/big/rat_test.go /src/goroot/src/math/big/ratconv_test.go /src/goroot/src/math/big/ratmarsh_test.go /src/goroot/src/math/big/sqrt_test.go /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/math/big/testdata /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/math/big/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_math_big/' /src/goroot/src/fuzz_ng_math_big/accuracy_string.go /src/goroot/src/fuzz_ng_math_big/alias_test.go /src/goroot/src/fuzz_ng_math_big/arith.go /src/goroot/src/fuzz_ng_math_big/arith_amd64.go /src/goroot/src/fuzz_ng_math_big/arith_decl.go /src/goroot/src/fuzz_ng_math_big/arith_s390x_test.go /src/goroot/src/fuzz_ng_math_big/arith_test.go /src/goroot/src/fuzz_ng_math_big/bits_test.go /src/goroot/src/fuzz_ng_math_big/calibrate_test.go /src/goroot/src/fuzz_ng_math_big/decimal.go /src/goroot/src/fuzz_ng_math_big/decimal_test.go /src/goroot/src/fuzz_ng_math_big/doc.go /src/goroot/src/fuzz_ng_math_big/example_rat_test.go /src/goroot/src/fuzz_ng_math_big/example_test.go /src/goroot/src/fuzz_ng_math_big/float.go /src/goroot/src/fuzz_ng_math_big/float_test.go /src/goroot/src/fuzz_ng_math_big/floatconv.go /src/goroot/src/fuzz_ng_math_big/floatconv_test.go /src/goroot/src/fuzz_ng_math_big/floatexample_test.go /src/goroot/src/fuzz_ng_math_big/floatmarsh.go /src/goroot/src/fuzz_ng_math_big/floatmarsh_test.go /src/goroot/src/fuzz_ng_math_big/ftoa.go /src/goroot/src/fuzz_ng_math_big/fuzz_ng.go /src/goroot/src/fuzz_ng_math_big/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math_big/gcd_test.go /src/goroot/src/fuzz_ng_math_big/hilbert_test.go /src/goroot/src/fuzz_ng_math_big/int.go /src/goroot/src/fuzz_ng_math_big/int_test.go /src/goroot/src/fuzz_ng_math_big/intconv.go /src/goroot/src/fuzz_ng_math_big/intconv_test.go /src/goroot/src/fuzz_ng_math_big/intmarsh.go /src/goroot/src/fuzz_ng_math_big/intmarsh_test.go /src/goroot/src/fuzz_ng_math_big/link_test.go /src/goroot/src/fuzz_ng_math_big/nat.go /src/goroot/src/fuzz_ng_math_big/nat_test.go /src/goroot/src/fuzz_ng_math_big/natconv.go /src/goroot/src/fuzz_ng_math_big/natconv_test.go /src/goroot/src/fuzz_ng_math_big/natdiv.go /src/goroot/src/fuzz_ng_math_big/ngolo_helper.go /src/goroot/src/fuzz_ng_math_big/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_big/prime.go /src/goroot/src/fuzz_ng_math_big/prime_test.go /src/goroot/src/fuzz_ng_math_big/rat.go /src/goroot/src/fuzz_ng_math_big/rat_test.go /src/goroot/src/fuzz_ng_math_big/ratconv.go /src/goroot/src/fuzz_ng_math_big/ratconv_test.go /src/goroot/src/fuzz_ng_math_big/ratmarsh.go /src/goroot/src/fuzz_ng_math_big/ratmarsh_test.go /src/goroot/src/fuzz_ng_math_big/roundingmode_string.go /src/goroot/src/fuzz_ng_math_big/sqrt.go /src/goroot/src/fuzz_ng_math_big/sqrt_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_big/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_big/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_math_big /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_math_big [fuzz_ng_math_big.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_math_big [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_math_big/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_big
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_math_big_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/math/rand/auto_test.go /src/goroot/src/math/rand/default_test.go /src/goroot/src/math/rand/example_test.go /src/goroot/src/math/rand/exp.go /src/goroot/src/math/rand/export_test.go /src/goroot/src/math/rand/gen_cooked.go /src/goroot/src/math/rand/normal.go /src/goroot/src/math/rand/race_test.go /src/goroot/src/math/rand/rand.go /src/goroot/src/math/rand/rand_test.go /src/goroot/src/math/rand/regress_test.go /src/goroot/src/math/rand/rng.go /src/goroot/src/math/rand/zipf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^math_rand '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing math/rand fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:59 Found package in /src/goroot/src/math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:59 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:59 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:59 Unhandled argument &ast.FuncType{Func:27401, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002cdec0), Results:(*ast.FieldList)(nil)} for RandNgdotShuffle
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:06:59 Unhandled argument &ast.FuncType{Func:34482, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002e18f0), Results:(*ast.FieldList)(nil)} for Shuffle
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/math_rand.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/math_rand.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module math/rand: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:255:9: undefined: NgoloFuzzOne_RandNgdotInt63n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:262:9: undefined: NgoloFuzzOne_RandNgdotInt31n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:322:9: undefined: NgoloFuzzOne_Int63n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:324:9: undefined: NgoloFuzzOne_Int31n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:435:9: undefined: NgoloFuzzOne_RandNgdotInt63n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:441:9: undefined: NgoloFuzzOne_RandNgdotInt31n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:489:9: undefined: NgoloFuzzOne_Int63n
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:491:9: undefined: NgoloFuzzOne_Int31n
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_math_rand/copy/exp.go fuzz_ng_math_rand/copy/normal.go fuzz_ng_math_rand/copy/rand.go fuzz_ng_math_rand/copy/rng.go fuzz_ng_math_rand/copy/zipf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_rand/copy/exp.go fuzz_ng_math_rand/copy/normal.go fuzz_ng_math_rand/copy/rand.go fuzz_ng_math_rand/copy/rng.go fuzz_ng_math_rand/copy/zipf.go /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_rand/fuzz_ng.go fuzz_ng_math_rand/fuzzng_unsure_test.go fuzz_ng_math_rand/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/math/rand/auto_test.go /src/goroot/src/math/rand/default_test.go /src/goroot/src/math/rand/example_test.go /src/goroot/src/math/rand/export_test.go /src/goroot/src/math/rand/race_test.go /src/goroot/src/math/rand/rand_test.go /src/goroot/src/math/rand/regress_test.go /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/math/rand/testdata /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/math/rand/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_math_rand/' /src/goroot/src/fuzz_ng_math_rand/auto_test.go /src/goroot/src/fuzz_ng_math_rand/default_test.go /src/goroot/src/fuzz_ng_math_rand/example_test.go /src/goroot/src/fuzz_ng_math_rand/exp.go /src/goroot/src/fuzz_ng_math_rand/export_test.go /src/goroot/src/fuzz_ng_math_rand/fuzz_ng.go /src/goroot/src/fuzz_ng_math_rand/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math_rand/ngolo_helper.go /src/goroot/src/fuzz_ng_math_rand/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_rand/normal.go /src/goroot/src/fuzz_ng_math_rand/race_test.go /src/goroot/src/fuzz_ng_math_rand/rand.go /src/goroot/src/fuzz_ng_math_rand/rand_test.go /src/goroot/src/fuzz_ng_math_rand/regress_test.go /src/goroot/src/fuzz_ng_math_rand/rng.go /src/goroot/src/fuzz_ng_math_rand/zipf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_rand/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_rand/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_math_rand /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_math_rand [fuzz_ng_math_rand.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:27:5: rn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:20:2: other declaration of rn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:27:9: kn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:67:5: other declaration of kn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:27:13: wn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:95:5: other declaration of wn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:27:17: fn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:129:5: other declaration of fn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:28:5: re redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:20:2: other declaration of re
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:28:9: ke redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:47:5: other declaration of ke
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:28:13: we redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:101:5: other declaration of we
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:28:17: fe redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:167:5: other declaration of fe
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand.go:423:6: Int63 already declared through dot-import of package rand ("math/rand")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/rand/rand.go:423:6: other declaration of Int63
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand.go:435:6: Int31 already declared through dot-import of package rand ("math/rand")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/rand/rand.go:435:6: other declaration of Int31
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand.go:423:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_math_rand [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_math_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_math_rand_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/math/rand/v2/auto_test.go /src/goroot/src/math/rand/v2/example_test.go /src/goroot/src/math/rand/v2/exp.go /src/goroot/src/math/rand/v2/export_test.go /src/goroot/src/math/rand/v2/normal.go /src/goroot/src/math/rand/v2/pcg.go /src/goroot/src/math/rand/v2/pcg_test.go /src/goroot/src/math/rand/v2/race_test.go /src/goroot/src/math/rand/v2/rand.go /src/goroot/src/math/rand/v2/rand_test.go /src/goroot/src/math/rand/v2/regress_test.go /src/goroot/src/math/rand/v2/zipf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^math_rand_v2 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing math/rand/v2 fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Found package in /src/goroot/src/math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Type Source is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Function New has unproduced argument Source
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Unhandled argument &ast.FuncType{Func:19766, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002cde90), Results:(*ast.FieldList)(nil)} for RandNgdotShuffle
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Function N has unproduced argument Int
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:06 Unhandled argument &ast.FuncType{Func:23928, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002e9290), Results:(*ast.FieldList)(nil)} for Shuffle
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/math_rand_v2.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/math_rand_v2.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module math/rand/v2: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand_v2 [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_rand_v2.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:175:52: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:177:21: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:21: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:201:10: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:343:4: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:345:4: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:347:4: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:349:4: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:351:4: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:353:4: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:353:4: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_math_rand_v2/copy/exp.go fuzz_ng_math_rand_v2/copy/normal.go fuzz_ng_math_rand_v2/copy/pcg.go fuzz_ng_math_rand_v2/copy/rand.go fuzz_ng_math_rand_v2/copy/zipf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_rand_v2/copy/exp.go fuzz_ng_math_rand_v2/copy/normal.go fuzz_ng_math_rand_v2/copy/pcg.go fuzz_ng_math_rand_v2/copy/rand.go fuzz_ng_math_rand_v2/copy/zipf.go /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_rand_v2/fuzz_ng.go fuzz_ng_math_rand_v2/fuzzng_unsure_test.go fuzz_ng_math_rand_v2/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/math/rand/v2/auto_test.go /src/goroot/src/math/rand/v2/example_test.go /src/goroot/src/math/rand/v2/export_test.go /src/goroot/src/math/rand/v2/pcg_test.go /src/goroot/src/math/rand/v2/race_test.go /src/goroot/src/math/rand/v2/rand_test.go /src/goroot/src/math/rand/v2/regress_test.go /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/math/rand/v2/testdata /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/math/rand/v2/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_math_rand_v2/' /src/goroot/src/fuzz_ng_math_rand_v2/auto_test.go /src/goroot/src/fuzz_ng_math_rand_v2/example_test.go /src/goroot/src/fuzz_ng_math_rand_v2/exp.go /src/goroot/src/fuzz_ng_math_rand_v2/export_test.go /src/goroot/src/fuzz_ng_math_rand_v2/fuzz_ng.go /src/goroot/src/fuzz_ng_math_rand_v2/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math_rand_v2/ngolo_helper.go /src/goroot/src/fuzz_ng_math_rand_v2/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_rand_v2/normal.go /src/goroot/src/fuzz_ng_math_rand_v2/pcg.go /src/goroot/src/fuzz_ng_math_rand_v2/pcg_test.go /src/goroot/src/fuzz_ng_math_rand_v2/race_test.go /src/goroot/src/fuzz_ng_math_rand_v2/rand.go /src/goroot/src/fuzz_ng_math_rand_v2/rand_test.go /src/goroot/src/fuzz_ng_math_rand_v2/regress_test.go /src/goroot/src/fuzz_ng_math_rand_v2/zipf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_rand_v2/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_rand_v2/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_math_rand_v2 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_math_rand_v2 [fuzz_ng_math_rand_v2.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:24:5: rn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:20:2: other declaration of rn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:24:9: kn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:68:5: other declaration of kn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:24:13: wn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:96:5: other declaration of wn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:24:17: fn redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./normal.go:130:5: other declaration of fn
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:25:5: re redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:20:2: other declaration of re
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:25:9: ke redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:48:5: other declaration of ke
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:25:13: we redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:102:5: other declaration of we
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand_test.go:25:17: fe redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./exp.go:168:5: other declaration of fe
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand.go:34:6: Rand already declared through dot-import of package rand ("math/rand/v2")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/rand/v2/rand.go:34:6: other declaration of Rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand.go:285:6: Uint32N already declared through dot-import of package rand ("math/rand/v2")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/rand/v2/rand.go:285:6: other declaration of Uint32N
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rand.go:285:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_math_rand_v2 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_math_rand_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_rand_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_math_rand_v2_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/math/cmplx/abs.go /src/goroot/src/math/cmplx/asin.go /src/goroot/src/math/cmplx/cmath_test.go /src/goroot/src/math/cmplx/conj.go /src/goroot/src/math/cmplx/example_test.go /src/goroot/src/math/cmplx/exp.go /src/goroot/src/math/cmplx/huge_test.go /src/goroot/src/math/cmplx/isinf.go /src/goroot/src/math/cmplx/isnan.go /src/goroot/src/math/cmplx/log.go /src/goroot/src/math/cmplx/phase.go /src/goroot/src/math/cmplx/polar.go /src/goroot/src/math/cmplx/pow.go /src/goroot/src/math/cmplx/rect.go /src/goroot/src/math/cmplx/sin.go /src/goroot/src/math/cmplx/sqrt.go /src/goroot/src/math/cmplx/tan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^math_cmplx '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing math/cmplx fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Found package in /src/goroot/src/math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Abs has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Asin has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Asinh has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Acos has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Acosh has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Atan has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Atanh has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Conj has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Exp has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function IsInf has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function IsNaN has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Log has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Log10 has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Phase has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Polar has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Pow has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Sin has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Sinh has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Cos has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Cosh has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Sqrt has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Tan has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Tanh has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:13 Function Cot has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/math_cmplx.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/math_cmplx.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:11:10: Interpreting non ascii codepoint 206.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:11:10: Expected field name.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:11:11: Interpreting non ascii codepoint 184.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:11:10: Interpreting non ascii codepoint 206.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:11:10: Expected field name.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:11:11: Interpreting non ascii codepoint 184.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module math/cmplx: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_cmplx [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_cmplx.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:14:2: "math/cmplx" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:191:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_math_cmplx/copy/abs.go fuzz_ng_math_cmplx/copy/asin.go fuzz_ng_math_cmplx/copy/conj.go fuzz_ng_math_cmplx/copy/exp.go fuzz_ng_math_cmplx/copy/isinf.go fuzz_ng_math_cmplx/copy/isnan.go fuzz_ng_math_cmplx/copy/log.go fuzz_ng_math_cmplx/copy/phase.go fuzz_ng_math_cmplx/copy/polar.go fuzz_ng_math_cmplx/copy/pow.go fuzz_ng_math_cmplx/copy/rect.go fuzz_ng_math_cmplx/copy/sin.go fuzz_ng_math_cmplx/copy/sqrt.go fuzz_ng_math_cmplx/copy/tan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_cmplx/copy/abs.go fuzz_ng_math_cmplx/copy/asin.go fuzz_ng_math_cmplx/copy/conj.go fuzz_ng_math_cmplx/copy/exp.go fuzz_ng_math_cmplx/copy/isinf.go fuzz_ng_math_cmplx/copy/isnan.go fuzz_ng_math_cmplx/copy/log.go fuzz_ng_math_cmplx/copy/phase.go fuzz_ng_math_cmplx/copy/polar.go fuzz_ng_math_cmplx/copy/pow.go fuzz_ng_math_cmplx/copy/rect.go fuzz_ng_math_cmplx/copy/sin.go fuzz_ng_math_cmplx/copy/sqrt.go fuzz_ng_math_cmplx/copy/tan.go /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_cmplx/fuzz_ng.go fuzz_ng_math_cmplx/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/math/cmplx/cmath_test.go /src/goroot/src/math/cmplx/example_test.go /src/goroot/src/math/cmplx/huge_test.go /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/math/cmplx/testdata /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/math/cmplx/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_math_cmplx/' /src/goroot/src/fuzz_ng_math_cmplx/abs.go /src/goroot/src/fuzz_ng_math_cmplx/asin.go /src/goroot/src/fuzz_ng_math_cmplx/cmath_test.go /src/goroot/src/fuzz_ng_math_cmplx/conj.go /src/goroot/src/fuzz_ng_math_cmplx/example_test.go /src/goroot/src/fuzz_ng_math_cmplx/exp.go /src/goroot/src/fuzz_ng_math_cmplx/fuzz_ng.go /src/goroot/src/fuzz_ng_math_cmplx/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math_cmplx/huge_test.go /src/goroot/src/fuzz_ng_math_cmplx/isinf.go /src/goroot/src/fuzz_ng_math_cmplx/isnan.go /src/goroot/src/fuzz_ng_math_cmplx/log.go /src/goroot/src/fuzz_ng_math_cmplx/ngolo_helper.go /src/goroot/src/fuzz_ng_math_cmplx/phase.go /src/goroot/src/fuzz_ng_math_cmplx/polar.go /src/goroot/src/fuzz_ng_math_cmplx/pow.go /src/goroot/src/fuzz_ng_math_cmplx/rect.go /src/goroot/src/fuzz_ng_math_cmplx/sin.go /src/goroot/src/fuzz_ng_math_cmplx/sqrt.go /src/goroot/src/fuzz_ng_math_cmplx/tan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_cmplx/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_cmplx/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_math_cmplx /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_math_cmplx [fuzz_ng_math_cmplx.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_math_cmplx [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_math_cmplx/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_math_cmplx_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/math/bits/bits.go /src/goroot/src/math/bits/bits_errors.go /src/goroot/src/math/bits/bits_errors_bootstrap.go /src/goroot/src/math/bits/bits_tables.go /src/goroot/src/math/bits/bits_test.go /src/goroot/src/math/bits/example_math_test.go /src/goroot/src/math/bits/example_test.go /src/goroot/src/math/bits/export_test.go /src/goroot/src/math/bits/make_examples.go /src/goroot/src/math/bits/make_tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^math_bits '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Div,Rem'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Div,Rem math/bits fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:15 Found package in /src/goroot/src/math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/math_bits.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/math_bits.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module math/bits: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_math_bits/copy/bits.go fuzz_ng_math_bits/copy/bits_errors.go fuzz_ng_math_bits/copy/bits_tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_bits/copy/bits.go fuzz_ng_math_bits/copy/bits_errors.go fuzz_ng_math_bits/copy/bits_tables.go /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_math_bits/fuzz_ng.go fuzz_ng_math_bits/fuzzng_unsure_test.go fuzz_ng_math_bits/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/math/bits/bits_test.go /src/goroot/src/math/bits/example_math_test.go /src/goroot/src/math/bits/example_test.go /src/goroot/src/math/bits/export_test.go /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/math/bits/testdata /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/math/bits/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_math_bits/' /src/goroot/src/fuzz_ng_math_bits/bits.go /src/goroot/src/fuzz_ng_math_bits/bits_errors.go /src/goroot/src/fuzz_ng_math_bits/bits_tables.go /src/goroot/src/fuzz_ng_math_bits/bits_test.go /src/goroot/src/fuzz_ng_math_bits/example_math_test.go /src/goroot/src/fuzz_ng_math_bits/example_test.go /src/goroot/src/fuzz_ng_math_bits/export_test.go /src/goroot/src/fuzz_ng_math_bits/fuzz_ng.go /src/goroot/src/fuzz_ng_math_bits/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_math_bits/ngolo_helper.go /src/goroot/src/fuzz_ng_math_bits/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_bits/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_math_bits/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_math_bits /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_math_bits [fuzz_ng_math_bits.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits_test.go:1030:2: overflowError redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./bits_errors.go:12:5: other declaration of overflowError
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:81:6: TrailingZeros32 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:81:6: other declaration of TrailingZeros32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:140:6: OnesCount64 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:140:6: other declaration of OnesCount64
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:283:6: ReverseBytes32 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:283:6: other declaration of ReverseBytes32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:302:6: Len already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:302:6: other declaration of Len
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:310:6: Len8 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:310:6: other declaration of Len8
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:324:6: Len32 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:324:6: other declaration of Len32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:416:6: Sub32 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:416:6: other declaration of Sub32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:459:6: Mul32 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:459:6: other declaration of Mul32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:590:6: Rem64 already declared through dot-import of package bits ("math/bits")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/math/bits/bits.go:590:6: other declaration of Rem64
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bits.go:310:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_math_bits [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_math_bits/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_math_bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_math_bits_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/arena/arena.go /src/goroot/src/arena/arena_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package arena
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^arena '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing arena fuzz_ng_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:25 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:25 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/arena.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/arena.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_arena: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_arena: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=arena
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module arena: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package arena: build constraints exclude all Go files in /src/goroot/src/arena
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_arena/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_arena/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_arena/copy/*.go' /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_arena/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_arena/*.go' /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_arena/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/arena/arena_test.go /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/arena/testdata /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/arena/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_arena/' /src/goroot/src/fuzz_ng_arena/arena_test.go /src/goroot/src/fuzz_ng_arena/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_arena/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_arena/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_arena /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_arena [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_arena/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_arena
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_arena: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_arena_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo arena
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/database/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/database/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/database/sql/convert.go /src/goroot/src/database/sql/convert_test.go /src/goroot/src/database/sql/ctxutil.go /src/goroot/src/database/sql/example_cli_test.go /src/goroot/src/database/sql/example_service_test.go /src/goroot/src/database/sql/example_test.go /src/goroot/src/database/sql/fakedb_test.go /src/goroot/src/database/sql/sql.go /src/goroot/src/database/sql/sql_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^database_sql '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing database/sql fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Found package in /src/goroot/src/database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Array result for ColumnType is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Type ColumnType is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Register has unproduced argument driver.Driver
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Scan has unproduced recv NullInt16
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Value has unproduced recv NullInt16
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Scan has unproduced recv NullTime
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Value has unproduced recv NullTime
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Scan has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc00030dc00)}, Type:(*ast.StarExpr)(0xc000310060), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Value has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0003120a0)}, Type:(*ast.IndexExpr)(0xc00030eb70), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function OpenDB has unproduced argument driver.Connector
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function PingContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function SetConnMaxLifetime has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function SetConnMaxIdleTime has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function PrepareContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function ExecContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:48834, Elt:(*ast.Ident)(0xc00036db00)} for DBNgdotExecContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:49286, Elt:(*ast.Ident)(0xc0003720a0)} for DBNgdotExec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:50733, Elt:(*ast.Ident)(0xc000373960)} for DBNgdotQueryContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:51202, Elt:(*ast.Ident)(0xc000373e80)} for DBNgdotQuery
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryRowContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:53644, Elt:(*ast.Ident)(0xc000379e60)} for DBNgdotQueryRowContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:54228, Elt:(*ast.Ident)(0xc00037c280)} for DBNgdotQueryRow
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function BeginTx has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function BeginTx has unproduced argument TxOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Conn has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function PingContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function ExecContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:59426, Elt:(*ast.Ident)(0xc000273020)} for ConnNgdotExecContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:59782, Elt:(*ast.Ident)(0xc0002734e0)} for ConnNgdotQueryContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryRowContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:60366, Elt:(*ast.Ident)(0xc0002739e0)} for ConnNgdotQueryRowContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function PrepareContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.FuncType{Func:61351, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00026ecf0), Results:(*ast.FieldList)(0xc00026ed20)} for ConnNgdotRaw
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function BeginTx has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function BeginTx has unproduced argument TxOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function PrepareContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function StmtContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function ExecContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:73516, Elt:(*ast.Ident)(0xc00041bea0)} for TxNgdotExecContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:73898, Elt:(*ast.Ident)(0xc0004203a0)} for TxNgdotExec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:74127, Elt:(*ast.Ident)(0xc000420640)} for TxNgdotQueryContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:74497, Elt:(*ast.Ident)(0xc000420b00)} for TxNgdotQuery
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryRowContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:75007, Elt:(*ast.Ident)(0xc000420dc0)} for TxNgdotQueryRowContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:75595, Elt:(*ast.Ident)(0xc000421160)} for TxNgdotQueryRow
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function ExecContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:78522, Elt:(*ast.Ident)(0xc000421ae0)} for StmtNgdotExecContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:79134, Elt:(*ast.Ident)(0xc00043c2c0)} for StmtNgdotExec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:82037, Elt:(*ast.Ident)(0xc000442e40)} for StmtNgdotQueryContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:83332, Elt:(*ast.Ident)(0xc000443c00)} for StmtNgdotQuery
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function QueryRowContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:84150, Elt:(*ast.Ident)(0xc000448420)} for StmtNgdotQueryRowContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:84904, Elt:(*ast.Ident)(0xc0004487c0)} for StmtNgdotQueryRow
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Name has unproduced recv ColumnType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Length has unproduced recv ColumnType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function DecimalSize has unproduced recv ColumnType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function ScanType has unproduced recv ColumnType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function Nullable has unproduced recv ColumnType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Function DatabaseTypeName has unproduced recv ColumnType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:99207, Elt:(*ast.Ident)(0xc000458940)} for RowsNgdotScan
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:27 Unhandled argument &ast.Ellipsis{Ellipsis:102458, Elt:(*ast.Ident)(0xc00045e780)} for RowNgdotScan
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/database_sql.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/database_sql.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module database/sql: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_database_sql/copy/convert.go fuzz_ng_database_sql/copy/ctxutil.go fuzz_ng_database_sql/copy/sql.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_database_sql/copy/convert.go fuzz_ng_database_sql/copy/ctxutil.go fuzz_ng_database_sql/copy/sql.go /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_database_sql/fuzz_ng.go fuzz_ng_database_sql/fuzzng_unsure_test.go fuzz_ng_database_sql/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/database/sql/convert_test.go /src/goroot/src/database/sql/example_cli_test.go /src/goroot/src/database/sql/example_service_test.go /src/goroot/src/database/sql/example_test.go /src/goroot/src/database/sql/fakedb_test.go /src/goroot/src/database/sql/sql_test.go /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/database/sql/testdata /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/database/sql/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_database_sql/' /src/goroot/src/fuzz_ng_database_sql/convert.go /src/goroot/src/fuzz_ng_database_sql/convert_test.go /src/goroot/src/fuzz_ng_database_sql/ctxutil.go /src/goroot/src/fuzz_ng_database_sql/example_cli_test.go /src/goroot/src/fuzz_ng_database_sql/example_service_test.go /src/goroot/src/fuzz_ng_database_sql/example_test.go /src/goroot/src/fuzz_ng_database_sql/fakedb_test.go /src/goroot/src/fuzz_ng_database_sql/fuzz_ng.go /src/goroot/src/fuzz_ng_database_sql/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_database_sql/ngolo_helper.go /src/goroot/src/fuzz_ng_database_sql/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_database_sql/sql.go /src/goroot/src/fuzz_ng_database_sql/sql_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_database_sql/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_database_sql/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_database_sql /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_database_sql [fuzz_ng_database_sql.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_database_sql [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_database_sql/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_database_sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_database_sql_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/database/sql/driver/driver.go /src/goroot/src/database/sql/driver/types.go /src/goroot/src/database/sql/driver/types_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^database_sql_driver '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing database/sql/driver fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:36 Found package in /src/goroot/src/database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:36 Type RowsAffected is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:36 Function LastInsertId has unproduced recv RowsAffected
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:36 Function RowsAffected has unproduced recv RowsAffected
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:36 Function ConvertValue has unproduced recv Null
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:36 Function ConvertValue has unproduced recv NotNull
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/database_sql_driver.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/database_sql_driver.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module database/sql/driver: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_database_sql_driver/copy/driver.go fuzz_ng_database_sql_driver/copy/types.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_database_sql_driver/copy/driver.go fuzz_ng_database_sql_driver/copy/types.go /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_database_sql_driver/fuzz_ng.go fuzz_ng_database_sql_driver/fuzzng_unsure_test.go fuzz_ng_database_sql_driver/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/database/sql/driver/types_test.go /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/database/sql/driver/testdata /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/database/sql/driver/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_database_sql_driver/' /src/goroot/src/fuzz_ng_database_sql_driver/driver.go /src/goroot/src/fuzz_ng_database_sql_driver/fuzz_ng.go /src/goroot/src/fuzz_ng_database_sql_driver/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_database_sql_driver/ngolo_helper.go /src/goroot/src/fuzz_ng_database_sql_driver/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_database_sql_driver/types.go /src/goroot/src/fuzz_ng_database_sql_driver/types_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_database_sql_driver/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_database_sql_driver/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_database_sql_driver /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_database_sql_driver [fuzz_ng_database_sql_driver.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_database_sql_driver [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_database_sql_driver/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_database_sql_driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_database_sql_driver_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/strconv/atob.go /src/goroot/src/strconv/atob_test.go /src/goroot/src/strconv/atoc.go /src/goroot/src/strconv/atoc_test.go /src/goroot/src/strconv/atof.go /src/goroot/src/strconv/atof_test.go /src/goroot/src/strconv/atoi.go /src/goroot/src/strconv/atoi_test.go /src/goroot/src/strconv/bytealg.go /src/goroot/src/strconv/bytealg_bootstrap.go /src/goroot/src/strconv/ctoa.go /src/goroot/src/strconv/ctoa_test.go /src/goroot/src/strconv/decimal.go /src/goroot/src/strconv/decimal_test.go /src/goroot/src/strconv/doc.go /src/goroot/src/strconv/eisel_lemire.go /src/goroot/src/strconv/example_test.go /src/goroot/src/strconv/export_test.go /src/goroot/src/strconv/fp_test.go /src/goroot/src/strconv/ftoa.go /src/goroot/src/strconv/ftoa_test.go /src/goroot/src/strconv/ftoaryu.go /src/goroot/src/strconv/ftoaryu_test.go /src/goroot/src/strconv/internal_test.go /src/goroot/src/strconv/isprint.go /src/goroot/src/strconv/itoa.go /src/goroot/src/strconv/itoa_test.go /src/goroot/src/strconv/makeisprint.go /src/goroot/src/strconv/quote.go /src/goroot/src/strconv/quote_test.go /src/goroot/src/strconv/strconv_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 31 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^strconv '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits FormatFloat.prec,AppendFloat.prec'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits FormatFloat.prec,AppendFloat.prec strconv fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Found package in /src/goroot/src/strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Type NumError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Function Error has unproduced recv NumError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Function Unwrap has unproduced recv NumError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:42 Function FormatComplex has unproduced argument complex128
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/strconv.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/strconv.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module strconv: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_strconv/copy/atob.go fuzz_ng_strconv/copy/atoc.go fuzz_ng_strconv/copy/atof.go fuzz_ng_strconv/copy/atoi.go fuzz_ng_strconv/copy/bytealg.go fuzz_ng_strconv/copy/ctoa.go fuzz_ng_strconv/copy/decimal.go fuzz_ng_strconv/copy/doc.go fuzz_ng_strconv/copy/eisel_lemire.go fuzz_ng_strconv/copy/ftoa.go fuzz_ng_strconv/copy/ftoaryu.go fuzz_ng_strconv/copy/isprint.go fuzz_ng_strconv/copy/itoa.go fuzz_ng_strconv/copy/quote.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_strconv/copy/atob.go fuzz_ng_strconv/copy/atoc.go fuzz_ng_strconv/copy/atof.go fuzz_ng_strconv/copy/atoi.go fuzz_ng_strconv/copy/bytealg.go fuzz_ng_strconv/copy/ctoa.go fuzz_ng_strconv/copy/decimal.go fuzz_ng_strconv/copy/doc.go fuzz_ng_strconv/copy/eisel_lemire.go fuzz_ng_strconv/copy/ftoa.go fuzz_ng_strconv/copy/ftoaryu.go fuzz_ng_strconv/copy/isprint.go fuzz_ng_strconv/copy/itoa.go fuzz_ng_strconv/copy/quote.go /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_strconv/fuzz_ng.go fuzz_ng_strconv/fuzzng_unsure_test.go fuzz_ng_strconv/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/strconv/atob_test.go /src/goroot/src/strconv/atoc_test.go /src/goroot/src/strconv/atof_test.go /src/goroot/src/strconv/atoi_test.go /src/goroot/src/strconv/ctoa_test.go /src/goroot/src/strconv/decimal_test.go /src/goroot/src/strconv/example_test.go /src/goroot/src/strconv/export_test.go /src/goroot/src/strconv/fp_test.go /src/goroot/src/strconv/ftoa_test.go /src/goroot/src/strconv/ftoaryu_test.go /src/goroot/src/strconv/internal_test.go /src/goroot/src/strconv/itoa_test.go /src/goroot/src/strconv/quote_test.go /src/goroot/src/strconv/strconv_test.go /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/strconv/testdata /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_strconv/' /src/goroot/src/fuzz_ng_strconv/atob.go /src/goroot/src/fuzz_ng_strconv/atob_test.go /src/goroot/src/fuzz_ng_strconv/atoc.go /src/goroot/src/fuzz_ng_strconv/atoc_test.go /src/goroot/src/fuzz_ng_strconv/atof.go /src/goroot/src/fuzz_ng_strconv/atof_test.go /src/goroot/src/fuzz_ng_strconv/atoi.go /src/goroot/src/fuzz_ng_strconv/atoi_test.go /src/goroot/src/fuzz_ng_strconv/bytealg.go /src/goroot/src/fuzz_ng_strconv/ctoa.go /src/goroot/src/fuzz_ng_strconv/ctoa_test.go /src/goroot/src/fuzz_ng_strconv/decimal.go /src/goroot/src/fuzz_ng_strconv/decimal_test.go /src/goroot/src/fuzz_ng_strconv/doc.go /src/goroot/src/fuzz_ng_strconv/eisel_lemire.go /src/goroot/src/fuzz_ng_strconv/example_test.go /src/goroot/src/fuzz_ng_strconv/export_test.go /src/goroot/src/fuzz_ng_strconv/fp_test.go /src/goroot/src/fuzz_ng_strconv/ftoa.go /src/goroot/src/fuzz_ng_strconv/ftoa_test.go /src/goroot/src/fuzz_ng_strconv/ftoaryu.go /src/goroot/src/fuzz_ng_strconv/ftoaryu_test.go /src/goroot/src/fuzz_ng_strconv/fuzz_ng.go /src/goroot/src/fuzz_ng_strconv/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_strconv/internal_test.go /src/goroot/src/fuzz_ng_strconv/isprint.go /src/goroot/src/fuzz_ng_strconv/itoa.go /src/goroot/src/fuzz_ng_strconv/itoa_test.go /src/goroot/src/fuzz_ng_strconv/ngolo_helper.go /src/goroot/src/fuzz_ng_strconv/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_strconv/quote.go /src/goroot/src/fuzz_ng_strconv/quote_test.go /src/goroot/src/fuzz_ng_strconv/strconv_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_strconv/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_strconv/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_strconv /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_strconv [fuzz_ng_strconv.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./atoi.go:21:5: ErrSyntax already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/atoi.go:21:5: other declaration of ErrSyntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ./atoi.go:78:6: ParseUint already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/atoi.go:78:6: other declaration of ParseUint
Step #3 - "compile-libfuzzer-coverage-x86_64": ./quote.go:139:6: QuoteToASCII already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/quote.go:138:6: other declaration of QuoteToASCII
Step #3 - "compile-libfuzzer-coverage-x86_64": ./quote.go:146:6: AppendQuoteToASCII already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/quote.go:144:6: other declaration of AppendQuoteToASCII
Step #3 - "compile-libfuzzer-coverage-x86_64": ./quote.go:170:6: QuoteRune already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/quote.go:167:6: other declaration of QuoteRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./quote.go:186:6: QuoteRuneToASCII already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/quote.go:183:6: other declaration of QuoteRuneToASCII
Step #3 - "compile-libfuzzer-coverage-x86_64": ./quote.go:263:6: UnquoteChar already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/quote.go:259:6: other declaration of UnquoteChar
Step #3 - "compile-libfuzzer-coverage-x86_64": ./quote.go:541:6: IsPrint already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/quote.go:535:6: other declaration of IsPrint
Step #3 - "compile-libfuzzer-coverage-x86_64": ./atob.go:22:6: FormatBool already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/atob.go:21:6: other declaration of FormatBool
Step #3 - "compile-libfuzzer-coverage-x86_64": ./itoa.go:14:6: FormatUint already declared through dot-import of package strconv ("strconv")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/strconv/itoa.go:14:6: other declaration of FormatUint
Step #3 - "compile-libfuzzer-coverage-x86_64": ./itoa.go:14:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_strconv [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_strconv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_strconv_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/strconv/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/strconv/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/slices/example_test.go /src/goroot/src/slices/slices.go /src/goroot/src/slices/slices_test.go /src/goroot/src/slices/sort.go /src/goroot/src/slices/sort_benchmark_test.go /src/goroot/src/slices/sort_test.go /src/goroot/src/slices/zsortanyfunc.go /src/goroot/src/slices/zsortordered.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^slices '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing slices fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Found package in /src/goroot/src/slices
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Equal has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function EqualFunc has unproduced argument S1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function EqualFunc has unproduced argument S2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:19791, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000142450), Results:(*ast.FieldList)(0xc000142480)} for EqualFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Compare has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function CompareFunc has unproduced argument S1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function CompareFunc has unproduced argument S2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:20993, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000142a80), Results:(*ast.FieldList)(0xc000142ab0)} for CompareFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Index has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Index has unproduced argument E
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function IndexFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:21519, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000142ff0), Results:(*ast.FieldList)(0xc000143020)} for IndexFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Contains has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Contains has unproduced argument E
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function ContainsFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:21854, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000143410), Results:(*ast.FieldList)(0xc000143440)} for ContainsFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Insert has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.Ellipsis{Ellipsis:22257, Elt:(*ast.Ident)(0xc000156540)} for Insert
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Delete has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function DeleteFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:25078, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000143c20), Results:(*ast.FieldList)(0xc000143c50)} for DeleteFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Replace has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.Ellipsis{Ellipsis:25679, Elt:(*ast.Ident)(0xc000157f40)} for Replace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Clone has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Compact has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function CompactFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:28835, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000160b10), Results:(*ast.FieldList)(0xc000160b40)} for CompactFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Grow has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Clip has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Reverse has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.Ellipsis{Ellipsis:32318, Elt:(*ast.Ident)(0xc00016eb40)} for Concat
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Sort has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function SortFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:13613, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002124e0), Results:(*ast.FieldList)(0xc000212510)} for SortFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function SortStableFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:13894, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002126c0), Results:(*ast.FieldList)(0xc0002126f0)} for SortStableFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function IsSorted has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function IsSortedFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:14332, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000212b40), Results:(*ast.FieldList)(0xc000212b70)} for IsSortedFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Min has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function MinFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:15046, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000213140), Results:(*ast.FieldList)(0xc000213170)} for MinFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function Max has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function MaxFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:15804, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000213770), Results:(*ast.FieldList)(0xc0002137a0)} for MaxFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function BinarySearch has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function BinarySearch has unproduced argument E
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function BinarySearchFunc has unproduced argument S
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Function BinarySearchFunc has unproduced argument T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:52 Unhandled argument &ast.FuncType{Func:17470, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000260060), Results:(*ast.FieldList)(0xc000260090)} for BinarySearchFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/slices.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/slices.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo slices
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module slices: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_slices [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_slices.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:17:2: "slices" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_slices/copy/slices.go fuzz_ng_slices/copy/sort.go fuzz_ng_slices/copy/zsortanyfunc.go fuzz_ng_slices/copy/zsortordered.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_slices/copy/slices.go fuzz_ng_slices/copy/sort.go fuzz_ng_slices/copy/zsortanyfunc.go fuzz_ng_slices/copy/zsortordered.go /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_slices/fuzz_ng.go fuzz_ng_slices/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/slices/example_test.go /src/goroot/src/slices/slices_test.go /src/goroot/src/slices/sort_benchmark_test.go /src/goroot/src/slices/sort_test.go /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/slices/testdata /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/slices/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_slices/' /src/goroot/src/fuzz_ng_slices/example_test.go /src/goroot/src/fuzz_ng_slices/fuzz_ng.go /src/goroot/src/fuzz_ng_slices/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_slices/ngolo_helper.go /src/goroot/src/fuzz_ng_slices/slices.go /src/goroot/src/fuzz_ng_slices/slices_test.go /src/goroot/src/fuzz_ng_slices/sort.go /src/goroot/src/fuzz_ng_slices/sort_benchmark_test.go /src/goroot/src/fuzz_ng_slices/sort_test.go /src/goroot/src/fuzz_ng_slices/zsortanyfunc.go /src/goroot/src/fuzz_ng_slices/zsortordered.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_slices/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_slices/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_slices /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_slices [fuzz_ng_slices.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:55:6: Compare already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:55:6: other declaration of Compare
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:76:6: CompareFunc already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:76:6: other declaration of CompareFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:94:6: Index already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:94:6: other declaration of Index
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:121:6: ContainsFunc already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:121:6: other declaration of ContainsFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:234:6: DeleteFunc already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:234:6: other declaration of DeleteFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:254:6: Replace already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:254:6: other declaration of Replace
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:341:6: Clone already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:341:6: other declaration of Clone
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slices.go:351:6: Compact already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/slices.go:351:6: other declaration of Compact
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:16:6: Sort already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/sort.go:16:6: other declaration of Sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:124:6: BinarySearch already declared through dot-import of package slices ("slices")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/slices/sort.go:124:6: other declaration of BinarySearch
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:16:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_slices [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_slices/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_slices_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo slices
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/syscall/asan.go /src/goroot/src/syscall/asan0.go /src/goroot/src/syscall/bpf_bsd.go /src/goroot/src/syscall/const_plan9.go /src/goroot/src/syscall/creds_test.go /src/goroot/src/syscall/dir_plan9.go /src/goroot/src/syscall/dirent.go /src/goroot/src/syscall/dirent_test.go /src/goroot/src/syscall/dll_windows.go /src/goroot/src/syscall/endian_big.go /src/goroot/src/syscall/endian_little.go /src/goroot/src/syscall/env_unix.go /src/goroot/src/syscall/env_windows.go /src/goroot/src/syscall/errors_plan9.go /src/goroot/src/syscall/exec_aix_test.go /src/goroot/src/syscall/exec_bsd.go /src/goroot/src/syscall/exec_freebsd.go /src/goroot/src/syscall/exec_freebsd_test.go /src/goroot/src/syscall/exec_libc.go /src/goroot/src/syscall/exec_libc2.go /src/goroot/src/syscall/exec_linux.go /src/goroot/src/syscall/exec_linux_test.go /src/goroot/src/syscall/exec_pdeathsig_test.go /src/goroot/src/syscall/exec_plan9.go /src/goroot/src/syscall/exec_solaris_test.go /src/goroot/src/syscall/exec_unix.go /src/goroot/src/syscall/exec_unix_test.go /src/goroot/src/syscall/exec_windows.go /src/goroot/src/syscall/exec_windows_test.go /src/goroot/src/syscall/export_darwin_test.go /src/goroot/src/syscall/export_linux_test.go /src/goroot/src/syscall/export_rlimit_test.go /src/goroot/src/syscall/export_unix_test.go /src/goroot/src/syscall/export_wasip1_test.go /src/goroot/src/syscall/export_windows_test.go /src/goroot/src/syscall/flock_aix.go /src/goroot/src/syscall/flock_bsd.go /src/goroot/src/syscall/flock_linux.go /src/goroot/src/syscall/flock_linux_32bit.go /src/goroot/src/syscall/forkpipe.go /src/goroot/src/syscall/forkpipe2.go /src/goroot/src/syscall/fs_js.go /src/goroot/src/syscall/fs_wasip1.go /src/goroot/src/syscall/fs_wasip1_test.go /src/goroot/src/syscall/getdirentries_test.go /src/goroot/src/syscall/lsf_linux.go /src/goroot/src/syscall/mkasm.go /src/goroot/src/syscall/mkpost.go /src/goroot/src/syscall/mksyscall_windows.go /src/goroot/src/syscall/mmap_unix_test.go /src/goroot/src/syscall/msan.go /src/goroot/src/syscall/msan0.go /src/goroot/src/syscall/net.go /src/goroot/src/syscall/net_fake.go /src/goroot/src/syscall/net_js.go /src/goroot/src/syscall/net_wasip1.go /src/goroot/src/syscall/netlink_linux.go /src/goroot/src/syscall/os_wasip1.go /src/goroot/src/syscall/pwd_plan9.go /src/goroot/src/syscall/rlimit.go /src/goroot/src/syscall/rlimit_darwin.go /src/goroot/src/syscall/rlimit_stub.go /src/goroot/src/syscall/rlimit_test.go /src/goroot/src/syscall/route_bsd.go /src/goroot/src/syscall/route_darwin.go /src/goroot/src/syscall/route_dragonfly.go /src/goroot/src/syscall/route_freebsd.go /src/goroot/src/syscall/route_freebsd_32bit.go /src/goroot/src/syscall/route_freebsd_64bit.go /src/goroot/src/syscall/route_netbsd.go /src/goroot/src/syscall/route_openbsd.go /src/goroot/src/syscall/security_windows.go /src/goroot/src/syscall/setuidgid_32_linux.go /src/goroot/src/syscall/setuidgid_linux.go /src/goroot/src/syscall/sockcmsg_dragonfly.go /src/goroot/src/syscall/sockcmsg_linux.go /src/goroot/src/syscall/sockcmsg_unix.go /src/goroot/src/syscall/sockcmsg_unix_other.go /src/goroot/src/syscall/syscall.go /src/goroot/src/syscall/syscall_aix.go /src/goroot/src/syscall/syscall_aix_ppc64.go /src/goroot/src/syscall/syscall_bsd.go /src/goroot/src/syscall/syscall_bsd_test.go /src/goroot/src/syscall/syscall_darwin.go /src/goroot/src/syscall/syscall_darwin_amd64.go /src/goroot/src/syscall/syscall_darwin_arm64.go /src/goroot/src/syscall/syscall_dragonfly.go /src/goroot/src/syscall/syscall_dragonfly_amd64.go /src/goroot/src/syscall/syscall_freebsd.go /src/goroot/src/syscall/syscall_freebsd_386.go /src/goroot/src/syscall/syscall_freebsd_amd64.go /src/goroot/src/syscall/syscall_freebsd_arm.go /src/goroot/src/syscall/syscall_freebsd_arm64.go /src/goroot/src/syscall/syscall_freebsd_riscv64.go /src/goroot/src/syscall/syscall_freebsd_test.go /src/goroot/src/syscall/syscall_illumos.go /src/goroot/src/syscall/syscall_js.go /src/goroot/src/syscall/syscall_linux.go /src/goroot/src/syscall/syscall_linux_386.go /src/goroot/src/syscall/syscall_linux_accept.go /src/goroot/src/syscall/syscall_linux_accept4.go /src/goroot/src/syscall/syscall_linux_amd64.go /src/goroot/src/syscall/syscall_linux_arm.go /src/goroot/src/syscall/syscall_linux_arm64.go /src/goroot/src/syscall/syscall_linux_loong64.go /src/goroot/src/syscall/syscall_linux_mips64x.go /src/goroot/src/syscall/syscall_linux_mipsx.go /src/goroot/src/syscall/syscall_linux_ppc64x.go /src/goroot/src/syscall/syscall_linux_riscv64.go /src/goroot/src/syscall/syscall_linux_s390x.go /src/goroot/src/syscall/syscall_linux_test.go /src/goroot/src/syscall/syscall_netbsd.go /src/goroot/src/syscall/syscall_netbsd_386.go /src/goroot/src/syscall/syscall_netbsd_amd64.go /src/goroot/src/syscall/syscall_netbsd_arm.go /src/goroot/src/syscall/syscall_netbsd_arm64.go /src/goroot/src/syscall/syscall_openbsd.go /src/goroot/src/syscall/syscall_openbsd1.go /src/goroot/src/syscall/syscall_openbsd_386.go /src/goroot/src/syscall/syscall_openbsd_amd64.go /src/goroot/src/syscall/syscall_openbsd_arm.go /src/goroot/src/syscall/syscall_openbsd_arm64.go /src/goroot/src/syscall/syscall_openbsd_libc.go /src/goroot/src/syscall/syscall_openbsd_mips64.go /src/goroot/src/syscall/syscall_openbsd_ppc64.go /src/goroot/src/syscall/syscall_openbsd_riscv64.go /src/goroot/src/syscall/syscall_plan9.go /src/goroot/src/syscall/syscall_plan9_test.go /src/goroot/src/syscall/syscall_ptrace_test.go /src/goroot/src/syscall/syscall_solaris.go /src/goroot/src/syscall/syscall_solaris_amd64.go /src/goroot/src/syscall/syscall_solarisonly.go /src/goroot/src/syscall/syscall_test.go /src/goroot/src/syscall/syscall_unix.go /src/goroot/src/syscall/syscall_unix_test.go /src/goroot/src/syscall/syscall_wasip1.go /src/goroot/src/syscall/syscall_windows.go /src/goroot/src/syscall/syscall_windows_test.go /src/goroot/src/syscall/tables_js.go /src/goroot/src/syscall/tables_wasip1.go /src/goroot/src/syscall/time_fake.go /src/goroot/src/syscall/time_nofake.go /src/goroot/src/syscall/timestruct.go /src/goroot/src/syscall/types_aix.go /src/goroot/src/syscall/types_darwin.go /src/goroot/src/syscall/types_dragonfly.go /src/goroot/src/syscall/types_freebsd.go /src/goroot/src/syscall/types_illumos_amd64.go /src/goroot/src/syscall/types_linux.go /src/goroot/src/syscall/types_netbsd.go /src/goroot/src/syscall/types_openbsd.go /src/goroot/src/syscall/types_solaris.go /src/goroot/src/syscall/types_windows.go /src/goroot/src/syscall/types_windows_386.go /src/goroot/src/syscall/types_windows_amd64.go /src/goroot/src/syscall/types_windows_arm.go /src/goroot/src/syscall/types_windows_arm64.go /src/goroot/src/syscall/wtf8_windows.go /src/goroot/src/syscall/wtf8_windows_test.go /src/goroot/src/syscall/zerrors_aix_ppc64.go /src/goroot/src/syscall/zerrors_darwin_amd64.go /src/goroot/src/syscall/zerrors_darwin_arm64.go /src/goroot/src/syscall/zerrors_dragonfly_amd64.go /src/goroot/src/syscall/zerrors_freebsd_386.go /src/goroot/src/syscall/zerrors_freebsd_amd64.go /src/goroot/src/syscall/zerrors_freebsd_arm.go /src/goroot/src/syscall/zerrors_freebsd_arm64.go /src/goroot/src/syscall/zerrors_freebsd_riscv64.go /src/goroot/src/syscall/zerrors_linux_386.go /src/goroot/src/syscall/zerrors_linux_amd64.go /src/goroot/src/syscall/zerrors_linux_arm.go /src/goroot/src/syscall/zerrors_linux_arm64.go /src/goroot/src/syscall/zerrors_linux_loong64.go /src/goroot/src/syscall/zerrors_linux_mips.go /src/goroot/src/syscall/zerrors_linux_mips64.go /src/goroot/src/syscall/zerrors_linux_mips64le.go /src/goroot/src/syscall/zerrors_linux_mipsle.go /src/goroot/src/syscall/zerrors_linux_ppc64.go /src/goroot/src/syscall/zerrors_linux_ppc64le.go /src/goroot/src/syscall/zerrors_linux_riscv64.go /src/goroot/src/syscall/zerrors_linux_s390x.go /src/goroot/src/syscall/zerrors_netbsd_386.go /src/goroot/src/syscall/zerrors_netbsd_amd64.go /src/goroot/src/syscall/zerrors_netbsd_arm.go /src/goroot/src/syscall/zerrors_netbsd_arm64.go /src/goroot/src/syscall/zerrors_openbsd_386.go /src/goroot/src/syscall/zerrors_openbsd_amd64.go /src/goroot/src/syscall/zerrors_openbsd_arm.go /src/goroot/src/syscall/zerrors_openbsd_arm64.go /src/goroot/src/syscall/zerrors_openbsd_mips64.go /src/goroot/src/syscall/zerrors_openbsd_ppc64.go /src/goroot/src/syscall/zerrors_openbsd_riscv64.go /src/goroot/src/syscall/zerrors_solaris_amd64.go /src/goroot/src/syscall/zerrors_windows.go /src/goroot/src/syscall/zsyscall_aix_ppc64.go /src/goroot/src/syscall/zsyscall_darwin_amd64.go /src/goroot/src/syscall/zsyscall_darwin_arm64.go /src/goroot/src/syscall/zsyscall_dragonfly_amd64.go /src/goroot/src/syscall/zsyscall_freebsd_386.go /src/goroot/src/syscall/zsyscall_freebsd_amd64.go /src/goroot/src/syscall/zsyscall_freebsd_arm.go /src/goroot/src/syscall/zsyscall_freebsd_arm64.go /src/goroot/src/syscall/zsyscall_freebsd_riscv64.go /src/goroot/src/syscall/zsyscall_linux_386.go /src/goroot/src/syscall/zsyscall_linux_amd64.go /src/goroot/src/syscall/zsyscall_linux_arm.go /src/goroot/src/syscall/zsyscall_linux_arm64.go /src/goroot/src/syscall/zsyscall_linux_loong64.go /src/goroot/src/syscall/zsyscall_linux_mips.go /src/goroot/src/syscall/zsyscall_linux_mips64.go /src/goroot/src/syscall/zsyscall_linux_mips64le.go /src/goroot/src/syscall/zsyscall_linux_mipsle.go /src/goroot/src/syscall/zsyscall_linux_ppc64.go /src/goroot/src/syscall/zsyscall_linux_ppc64le.go /src/goroot/src/syscall/zsyscall_linux_riscv64.go /src/goroot/src/syscall/zsyscall_linux_s390x.go /src/goroot/src/syscall/zsyscall_netbsd_386.go /src/goroot/src/syscall/zsyscall_netbsd_amd64.go /src/goroot/src/syscall/zsyscall_netbsd_arm.go /src/goroot/src/syscall/zsyscall_netbsd_arm64.go /src/goroot/src/syscall/zsyscall_openbsd_386.go /src/goroot/src/syscall/zsyscall_openbsd_amd64.go /src/goroot/src/syscall/zsyscall_openbsd_arm.go /src/goroot/src/syscall/zsyscall_openbsd_arm64.go /src/goroot/src/syscall/zsyscall_openbsd_mips64.go /src/goroot/src/syscall/zsyscall_openbsd_ppc64.go /src/goroot/src/syscall/zsyscall_openbsd_riscv64.go /src/goroot/src/syscall/zsyscall_plan9_386.go /src/goroot/src/syscall/zsyscall_plan9_amd64.go /src/goroot/src/syscall/zsyscall_plan9_arm.go /src/goroot/src/syscall/zsyscall_solaris_amd64.go /src/goroot/src/syscall/zsyscall_windows.go /src/goroot/src/syscall/zsysctl_openbsd.go /src/goroot/src/syscall/zsysnum_darwin_amd64.go /src/goroot/src/syscall/zsysnum_darwin_arm64.go /src/goroot/src/syscall/zsysnum_dragonfly_amd64.go /src/goroot/src/syscall/zsysnum_freebsd_386.go /src/goroot/src/syscall/zsysnum_freebsd_amd64.go /src/goroot/src/syscall/zsysnum_freebsd_arm.go /src/goroot/src/syscall/zsysnum_freebsd_arm64.go /src/goroot/src/syscall/zsysnum_freebsd_riscv64.go /src/goroot/src/syscall/zsysnum_linux_386.go /src/goroot/src/syscall/zsysnum_linux_amd64.go /src/goroot/src/syscall/zsysnum_linux_arm.go /src/goroot/src/syscall/zsysnum_linux_arm64.go /src/goroot/src/syscall/zsysnum_linux_loong64.go /src/goroot/src/syscall/zsysnum_linux_mips.go /src/goroot/src/syscall/zsysnum_linux_mips64.go /src/goroot/src/syscall/zsysnum_linux_mips64le.go /src/goroot/src/syscall/zsysnum_linux_mipsle.go /src/goroot/src/syscall/zsysnum_linux_ppc64.go /src/goroot/src/syscall/zsysnum_linux_ppc64le.go /src/goroot/src/syscall/zsysnum_linux_riscv64.go /src/goroot/src/syscall/zsysnum_linux_s390x.go /src/goroot/src/syscall/zsysnum_netbsd_386.go /src/goroot/src/syscall/zsysnum_netbsd_amd64.go /src/goroot/src/syscall/zsysnum_netbsd_arm.go /src/goroot/src/syscall/zsysnum_netbsd_arm64.go /src/goroot/src/syscall/zsysnum_openbsd_386.go /src/goroot/src/syscall/zsysnum_openbsd_amd64.go /src/goroot/src/syscall/zsysnum_openbsd_arm.go /src/goroot/src/syscall/zsysnum_openbsd_arm64.go /src/goroot/src/syscall/zsysnum_openbsd_mips64.go /src/goroot/src/syscall/zsysnum_openbsd_ppc64.go /src/goroot/src/syscall/zsysnum_openbsd_riscv64.go /src/goroot/src/syscall/zsysnum_plan9.go /src/goroot/src/syscall/zsysnum_solaris_amd64.go /src/goroot/src/syscall/ztypes_aix_ppc64.go /src/goroot/src/syscall/ztypes_darwin_amd64.go /src/goroot/src/syscall/ztypes_darwin_arm64.go /src/goroot/src/syscall/ztypes_dragonfly_amd64.go /src/goroot/src/syscall/ztypes_freebsd_386.go /src/goroot/src/syscall/ztypes_freebsd_amd64.go /src/goroot/src/syscall/ztypes_freebsd_arm.go /src/goroot/src/syscall/ztypes_freebsd_arm64.go /src/goroot/src/syscall/ztypes_freebsd_riscv64.go /src/goroot/src/syscall/ztypes_linux_386.go /src/goroot/src/syscall/ztypes_linux_amd64.go /src/goroot/src/syscall/ztypes_linux_arm.go /src/goroot/src/syscall/ztypes_linux_arm64.go /src/goroot/src/syscall/ztypes_linux_loong64.go /src/goroot/src/syscall/ztypes_linux_mips.go /src/goroot/src/syscall/ztypes_linux_mips64.go /src/goroot/src/syscall/ztypes_linux_mips64le.go /src/goroot/src/syscall/ztypes_linux_mipsle.go /src/goroot/src/syscall/ztypes_linux_ppc64.go /src/goroot/src/syscall/ztypes_linux_ppc64le.go /src/goroot/src/syscall/ztypes_linux_riscv64.go /src/goroot/src/syscall/ztypes_linux_s390x.go /src/goroot/src/syscall/ztypes_netbsd_386.go /src/goroot/src/syscall/ztypes_netbsd_amd64.go /src/goroot/src/syscall/ztypes_netbsd_arm.go /src/goroot/src/syscall/ztypes_netbsd_arm64.go /src/goroot/src/syscall/ztypes_openbsd_386.go /src/goroot/src/syscall/ztypes_openbsd_amd64.go /src/goroot/src/syscall/ztypes_openbsd_arm.go /src/goroot/src/syscall/ztypes_openbsd_arm64.go /src/goroot/src/syscall/ztypes_openbsd_mips64.go /src/goroot/src/syscall/ztypes_openbsd_ppc64.go /src/goroot/src/syscall/ztypes_openbsd_riscv64.go /src/goroot/src/syscall/ztypes_solaris_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 301 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^syscall '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing syscall fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Found package in /src/goroot/src/syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for NetlinkMessage is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for NetlinkRouteAttr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for SocketControlMessage is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Type WaitStatus is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function ForkExec has unproduced argument ProcAttr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function StartProcess has unproduced argument ProcAttr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function FcntlFlock has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function FcntlFlock has unproduced argument Flock_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function AttachLsf has unproduced array argument SockFilter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function ParseNetlinkRouteAttr has unproduced argument NetlinkMessage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Setrlimit has unproduced argument Rlimit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function ParseUnixCredentials has unproduced argument SocketControlMessage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Unhandled argument &ast.Ellipsis{Ellipsis:45587, Elt:(*ast.Ident)(0xc000362000)} for UnixRights
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function ParseUnixRights has unproduced argument SocketControlMessage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function RawSyscall6 has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function RawSyscall has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Syscall has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Syscall6 has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Utimes has unproduced array argument Timeval
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function UtimesNano has unproduced array argument Timespec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Futimesat has unproduced array argument Timeval
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Futimes has unproduced array argument Timeval
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Exited has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Signaled has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Stopped has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Continued has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function CoreDump has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function ExitStatus has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Signal has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function StopSignal has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function TrapCause has unproduced recv WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Wait4 has unproduced argument WaitStatus
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Wait4 has unproduced argument Rusage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function PtracePeekText has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function PtracePeekData has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function PtracePokeText has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function PtracePokeData has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function PtraceGetRegs has unproduced argument PtraceRegs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function PtraceSetRegs has unproduced argument PtraceRegs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Mount has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function AllThreadsSyscall has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function AllThreadsSyscall6 has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Stat has unproduced argument Stat_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Lstat has unproduced argument Stat_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function SetLen has unproduced recv Iovec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function SetControllen has unproduced recv Msghdr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Is has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function SetsockoptInet4Addr has unproduced argument byte
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function SetsockoptLinger has unproduced argument Linger
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Sendfile has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Adjtimex has unproduced argument Timex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function EpollCtl has unproduced argument EpollEvent
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Getrusage has unproduced argument Rusage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Sysinfo has unproduced argument Sysinfo_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Times has unproduced argument Tms
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Uname has unproduced argument Utsname
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Fstat has unproduced argument Stat_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Fstatfs has unproduced argument Statfs_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Getrlimit has unproduced argument Rlimit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Select has unproduced argument FdSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Select has unproduced argument FdSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Select has unproduced argument FdSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Splice has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Splice has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Statfs has unproduced argument Statfs_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Ustat has unproduced argument Ustat_t
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function EpollWait has unproduced array argument EpollEvent
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:07:56 Function Utime has unproduced argument Utimbuf
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/syscall.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/syscall.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module syscall: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_syscall [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_syscall.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:152:15: p.Orig_rax undefined (type *PtraceRegsStruct has no field or method Orig_rax)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:158:14: p.Fs_base undefined (type *PtraceRegsStruct has no field or method Fs_base)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:159:14: p.Gs_base undefined (type *PtraceRegsStruct has no field or method Gs_base)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:303:6: SockFilterResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:304:2: SockFilterResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1727:2: SockFilterNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1728:2: SockFilterResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_syscall/copy/asan0.go fuzz_ng_syscall/copy/dirent.go fuzz_ng_syscall/copy/endian_little.go fuzz_ng_syscall/copy/env_unix.go fuzz_ng_syscall/copy/exec_linux.go fuzz_ng_syscall/copy/exec_unix.go fuzz_ng_syscall/copy/flock_linux.go fuzz_ng_syscall/copy/forkpipe2.go fuzz_ng_syscall/copy/lsf_linux.go fuzz_ng_syscall/copy/msan0.go fuzz_ng_syscall/copy/net.go fuzz_ng_syscall/copy/netlink_linux.go fuzz_ng_syscall/copy/rlimit.go fuzz_ng_syscall/copy/rlimit_stub.go fuzz_ng_syscall/copy/setuidgid_linux.go fuzz_ng_syscall/copy/sockcmsg_linux.go fuzz_ng_syscall/copy/sockcmsg_unix.go fuzz_ng_syscall/copy/sockcmsg_unix_other.go fuzz_ng_syscall/copy/syscall.go fuzz_ng_syscall/copy/syscall_linux.go fuzz_ng_syscall/copy/syscall_linux_accept4.go fuzz_ng_syscall/copy/syscall_linux_amd64.go fuzz_ng_syscall/copy/syscall_unix.go fuzz_ng_syscall/copy/time_nofake.go fuzz_ng_syscall/copy/timestruct.go fuzz_ng_syscall/copy/zerrors_linux_amd64.go fuzz_ng_syscall/copy/zsyscall_linux_amd64.go fuzz_ng_syscall/copy/zsysnum_linux_amd64.go fuzz_ng_syscall/copy/ztypes_linux_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_syscall/copy/syscall.go:65:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_syscall/copy/asan0.go fuzz_ng_syscall/copy/dirent.go fuzz_ng_syscall/copy/endian_little.go fuzz_ng_syscall/copy/env_unix.go fuzz_ng_syscall/copy/exec_linux.go fuzz_ng_syscall/copy/exec_unix.go fuzz_ng_syscall/copy/flock_linux.go fuzz_ng_syscall/copy/forkpipe2.go fuzz_ng_syscall/copy/lsf_linux.go fuzz_ng_syscall/copy/msan0.go fuzz_ng_syscall/copy/net.go fuzz_ng_syscall/copy/netlink_linux.go fuzz_ng_syscall/copy/rlimit.go fuzz_ng_syscall/copy/rlimit_stub.go fuzz_ng_syscall/copy/setuidgid_linux.go fuzz_ng_syscall/copy/sockcmsg_linux.go fuzz_ng_syscall/copy/sockcmsg_unix.go fuzz_ng_syscall/copy/sockcmsg_unix_other.go fuzz_ng_syscall/copy/syscall.go fuzz_ng_syscall/copy/syscall_linux.go fuzz_ng_syscall/copy/syscall_linux_accept4.go fuzz_ng_syscall/copy/syscall_linux_amd64.go fuzz_ng_syscall/copy/syscall_unix.go fuzz_ng_syscall/copy/time_nofake.go fuzz_ng_syscall/copy/timestruct.go fuzz_ng_syscall/copy/zerrors_linux_amd64.go fuzz_ng_syscall/copy/zsyscall_linux_amd64.go fuzz_ng_syscall/copy/zsysnum_linux_amd64.go fuzz_ng_syscall/copy/ztypes_linux_amd64.go /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_syscall/fuzz_ng.go fuzz_ng_syscall/fuzzng_unsure_test.go fuzz_ng_syscall/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/syscall/creds_test.go /src/goroot/src/syscall/dirent_test.go /src/goroot/src/syscall/exec_aix_test.go /src/goroot/src/syscall/exec_freebsd_test.go /src/goroot/src/syscall/exec_linux_test.go /src/goroot/src/syscall/exec_pdeathsig_test.go /src/goroot/src/syscall/exec_solaris_test.go /src/goroot/src/syscall/exec_unix_test.go /src/goroot/src/syscall/exec_windows_test.go /src/goroot/src/syscall/export_darwin_test.go /src/goroot/src/syscall/export_linux_test.go /src/goroot/src/syscall/export_rlimit_test.go /src/goroot/src/syscall/export_unix_test.go /src/goroot/src/syscall/export_wasip1_test.go /src/goroot/src/syscall/export_windows_test.go /src/goroot/src/syscall/fs_wasip1_test.go /src/goroot/src/syscall/getdirentries_test.go /src/goroot/src/syscall/mmap_unix_test.go /src/goroot/src/syscall/rlimit_test.go /src/goroot/src/syscall/syscall_bsd_test.go /src/goroot/src/syscall/syscall_freebsd_test.go /src/goroot/src/syscall/syscall_linux_test.go /src/goroot/src/syscall/syscall_plan9_test.go /src/goroot/src/syscall/syscall_ptrace_test.go /src/goroot/src/syscall/syscall_test.go /src/goroot/src/syscall/syscall_unix_test.go /src/goroot/src/syscall/syscall_windows_test.go /src/goroot/src/syscall/wtf8_windows_test.go /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/syscall/testdata /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/syscall/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_syscall/' /src/goroot/src/fuzz_ng_syscall/asan0.go /src/goroot/src/fuzz_ng_syscall/creds_test.go /src/goroot/src/fuzz_ng_syscall/dirent.go /src/goroot/src/fuzz_ng_syscall/dirent_test.go /src/goroot/src/fuzz_ng_syscall/endian_little.go /src/goroot/src/fuzz_ng_syscall/env_unix.go /src/goroot/src/fuzz_ng_syscall/exec_aix_test.go /src/goroot/src/fuzz_ng_syscall/exec_freebsd_test.go /src/goroot/src/fuzz_ng_syscall/exec_linux.go /src/goroot/src/fuzz_ng_syscall/exec_linux_test.go /src/goroot/src/fuzz_ng_syscall/exec_pdeathsig_test.go /src/goroot/src/fuzz_ng_syscall/exec_solaris_test.go /src/goroot/src/fuzz_ng_syscall/exec_unix.go /src/goroot/src/fuzz_ng_syscall/exec_unix_test.go /src/goroot/src/fuzz_ng_syscall/exec_windows_test.go /src/goroot/src/fuzz_ng_syscall/export_darwin_test.go /src/goroot/src/fuzz_ng_syscall/export_linux_test.go /src/goroot/src/fuzz_ng_syscall/export_rlimit_test.go /src/goroot/src/fuzz_ng_syscall/export_unix_test.go /src/goroot/src/fuzz_ng_syscall/export_wasip1_test.go /src/goroot/src/fuzz_ng_syscall/export_windows_test.go /src/goroot/src/fuzz_ng_syscall/flock_linux.go /src/goroot/src/fuzz_ng_syscall/forkpipe2.go /src/goroot/src/fuzz_ng_syscall/fs_wasip1_test.go /src/goroot/src/fuzz_ng_syscall/fuzz_ng.go /src/goroot/src/fuzz_ng_syscall/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_syscall/getdirentries_test.go /src/goroot/src/fuzz_ng_syscall/lsf_linux.go /src/goroot/src/fuzz_ng_syscall/mmap_unix_test.go /src/goroot/src/fuzz_ng_syscall/msan0.go /src/goroot/src/fuzz_ng_syscall/net.go /src/goroot/src/fuzz_ng_syscall/netlink_linux.go /src/goroot/src/fuzz_ng_syscall/ngolo_helper.go /src/goroot/src/fuzz_ng_syscall/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_syscall/rlimit.go /src/goroot/src/fuzz_ng_syscall/rlimit_stub.go /src/goroot/src/fuzz_ng_syscall/rlimit_test.go /src/goroot/src/fuzz_ng_syscall/setuidgid_linux.go /src/goroot/src/fuzz_ng_syscall/sockcmsg_linux.go /src/goroot/src/fuzz_ng_syscall/sockcmsg_unix.go /src/goroot/src/fuzz_ng_syscall/sockcmsg_unix_other.go /src/goroot/src/fuzz_ng_syscall/syscall.go /src/goroot/src/fuzz_ng_syscall/syscall_bsd_test.go /src/goroot/src/fuzz_ng_syscall/syscall_freebsd_test.go /src/goroot/src/fuzz_ng_syscall/syscall_linux.go /src/goroot/src/fuzz_ng_syscall/syscall_linux_accept4.go /src/goroot/src/fuzz_ng_syscall/syscall_linux_amd64.go /src/goroot/src/fuzz_ng_syscall/syscall_linux_test.go /src/goroot/src/fuzz_ng_syscall/syscall_plan9_test.go /src/goroot/src/fuzz_ng_syscall/syscall_ptrace_test.go /src/goroot/src/fuzz_ng_syscall/syscall_test.go /src/goroot/src/fuzz_ng_syscall/syscall_unix.go /src/goroot/src/fuzz_ng_syscall/syscall_unix_test.go /src/goroot/src/fuzz_ng_syscall/syscall_windows_test.go /src/goroot/src/fuzz_ng_syscall/time_nofake.go /src/goroot/src/fuzz_ng_syscall/timestruct.go /src/goroot/src/fuzz_ng_syscall/wtf8_windows_test.go /src/goroot/src/fuzz_ng_syscall/zerrors_linux_amd64.go /src/goroot/src/fuzz_ng_syscall/zsyscall_linux_amd64.go /src/goroot/src/fuzz_ng_syscall/zsysnum_linux_amd64.go /src/goroot/src/fuzz_ng_syscall/ztypes_linux_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_syscall/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_syscall/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_syscall /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_syscall [fuzz_ng_syscall.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./syscall.go:65:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_syscall [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_syscall/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_syscall_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/syscall/js/export_test.go /src/goroot/src/syscall/js/func.go /src/goroot/src/syscall/js/js.go /src/goroot/src/syscall/js/js_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^syscall_js '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing syscall/js fuzz_ng_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:12 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:12 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/syscall_js.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/syscall_js.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_syscall_js: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_syscall_js: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module syscall/js: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package syscall/js: build constraints exclude all Go files in /src/goroot/src/syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_syscall_js/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_syscall_js/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_syscall_js/copy/*.go' /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_syscall_js/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_syscall_js/*.go' /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_syscall_js/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/syscall/js/export_test.go /src/goroot/src/syscall/js/js_test.go /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/syscall/js/testdata /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/syscall/js/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_syscall_js/' /src/goroot/src/fuzz_ng_syscall_js/export_test.go /src/goroot/src/fuzz_ng_syscall_js/js_test.go /src/goroot/src/fuzz_ng_syscall_js/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_syscall_js/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_syscall_js/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_syscall_js /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_syscall_js [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_syscall_js/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_syscall_js
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_syscall_js: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_syscall_js_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/text/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/text/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/text/scanner/example_test.go /src/goroot/src/text/scanner/scanner.go /src/goroot/src/text/scanner/scanner_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^text_scanner '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing text/scanner fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:14 Found package in /src/goroot/src/text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/text_scanner.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/text_scanner.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module text/scanner: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_text_scanner/copy/scanner.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_scanner/copy/scanner.go /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_scanner/fuzz_ng.go fuzz_ng_text_scanner/fuzzng_unsure_test.go fuzz_ng_text_scanner/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/text/scanner/example_test.go /src/goroot/src/text/scanner/scanner_test.go /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/text/scanner/testdata /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/text/scanner/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_text_scanner/' /src/goroot/src/fuzz_ng_text_scanner/example_test.go /src/goroot/src/fuzz_ng_text_scanner/fuzz_ng.go /src/goroot/src/fuzz_ng_text_scanner/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_text_scanner/ngolo_helper.go /src/goroot/src/fuzz_ng_text_scanner/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_scanner/scanner.go /src/goroot/src/fuzz_ng_text_scanner/scanner_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_scanner/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_scanner/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_text_scanner /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_text_scanner [fuzz_ng_text_scanner.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_text_scanner [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_text_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_text_scanner_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/text/tabwriter/example_test.go /src/goroot/src/text/tabwriter/tabwriter.go /src/goroot/src/text/tabwriter/tabwriter_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^text_tabwriter '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits NewWriter.padding'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits NewWriter.padding text/tabwriter fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:20 Found package in /src/goroot/src/text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/text_tabwriter.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/text_tabwriter.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module text/tabwriter: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_text_tabwriter/copy/tabwriter.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_tabwriter/copy/tabwriter.go /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_tabwriter/fuzz_ng.go fuzz_ng_text_tabwriter/fuzzng_unsure_test.go fuzz_ng_text_tabwriter/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/text/tabwriter/example_test.go /src/goroot/src/text/tabwriter/tabwriter_test.go /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/text/tabwriter/testdata /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/text/tabwriter/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_text_tabwriter/' /src/goroot/src/fuzz_ng_text_tabwriter/example_test.go /src/goroot/src/fuzz_ng_text_tabwriter/fuzz_ng.go /src/goroot/src/fuzz_ng_text_tabwriter/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_text_tabwriter/ngolo_helper.go /src/goroot/src/fuzz_ng_text_tabwriter/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_tabwriter/tabwriter.go /src/goroot/src/fuzz_ng_text_tabwriter/tabwriter_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_tabwriter/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_tabwriter/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_text_tabwriter /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_text_tabwriter [fuzz_ng_text_tabwriter.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:89:6: Writer already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:89:6: other declaration of Writer
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:172:2: FilterHTML already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:172:2: other declaration of FilterHTML
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:176:2: StripEscape already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:176:2: other declaration of StripEscape
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:180:2: AlignRight already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:180:2: other declaration of AlignRight
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:184:2: DiscardEmptyColumns already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:184:2: other declaration of DiscardEmptyColumns
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:188:2: TabIndent already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:188:2: other declaration of TabIndent
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:192:2: Debug already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:192:2: other declaration of Debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:426:7: Escape already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:426:7: other declaration of Escape
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tabwriter.go:598:6: NewWriter already declared through dot-import of package tabwriter ("text/tabwriter")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/text/tabwriter/tabwriter.go:598:6: other declaration of NewWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_text_tabwriter [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_text_tabwriter/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_text_tabwriter_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/text/template/doc.go /src/goroot/src/text/template/example_test.go /src/goroot/src/text/template/examplefiles_test.go /src/goroot/src/text/template/examplefunc_test.go /src/goroot/src/text/template/exec.go /src/goroot/src/text/template/exec_test.go /src/goroot/src/text/template/funcs.go /src/goroot/src/text/template/helper.go /src/goroot/src/text/template/link_test.go /src/goroot/src/text/template/multi_test.go /src/goroot/src/text/template/option.go /src/goroot/src/text/template/template.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^text_template '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude ParseGlob'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude ParseGlob text/template fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Found package in /src/goroot/src/text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Array result for Template is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Type FuncMap is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Type ExecError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function Error has unproduced recv ExecError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function Unwrap has unproduced recv ExecError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:25558, Elt:(*ast.Ident)(0xc0001d84e0)} for HTMLEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:27484, Elt:(*ast.Ident)(0xc0001d9ea0)} for JSEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:27713, Elt:(*ast.Ident)(0xc0001e2040)} for URLQueryEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function Must has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:29657, Elt:(*ast.Ident)(0xc0000b6400)} for ParseFiles
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:30460, Elt:(*ast.Ident)(0xc0000b65e0)} for TemplateNgdotParseFiles
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function ParseFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:33597, Elt:(*ast.Ident)(0xc0000b7aa0)} for ParseFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function ParseFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:33970, Elt:(*ast.Ident)(0xc0000b7ce0)} for TemplateNgdotParseFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Unhandled argument &ast.Ellipsis{Ellipsis:86858, Elt:(*ast.Ident)(0xc0003902c0)} for TemplateNgdotOption
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function AddParseTree has unproduced argument parse.Tree
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:26 Function Funcs has unproduced argument FuncMap
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/text_template.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/text_template.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module text/template: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_text_template/copy/doc.go fuzz_ng_text_template/copy/exec.go fuzz_ng_text_template/copy/funcs.go fuzz_ng_text_template/copy/helper.go fuzz_ng_text_template/copy/option.go fuzz_ng_text_template/copy/template.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_template/copy/doc.go fuzz_ng_text_template/copy/exec.go fuzz_ng_text_template/copy/funcs.go fuzz_ng_text_template/copy/helper.go fuzz_ng_text_template/copy/option.go fuzz_ng_text_template/copy/template.go /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_template/fuzz_ng.go fuzz_ng_text_template/fuzzng_unsure_test.go fuzz_ng_text_template/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/text/template/example_test.go /src/goroot/src/text/template/examplefiles_test.go /src/goroot/src/text/template/examplefunc_test.go /src/goroot/src/text/template/exec_test.go /src/goroot/src/text/template/link_test.go /src/goroot/src/text/template/multi_test.go /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/text/template/testdata /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_text_template/' /src/goroot/src/fuzz_ng_text_template/doc.go /src/goroot/src/fuzz_ng_text_template/example_test.go /src/goroot/src/fuzz_ng_text_template/examplefiles_test.go /src/goroot/src/fuzz_ng_text_template/examplefunc_test.go /src/goroot/src/fuzz_ng_text_template/exec.go /src/goroot/src/fuzz_ng_text_template/exec_test.go /src/goroot/src/fuzz_ng_text_template/funcs.go /src/goroot/src/fuzz_ng_text_template/fuzz_ng.go /src/goroot/src/fuzz_ng_text_template/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_text_template/helper.go /src/goroot/src/fuzz_ng_text_template/link_test.go /src/goroot/src/fuzz_ng_text_template/multi_test.go /src/goroot/src/fuzz_ng_text_template/ngolo_helper.go /src/goroot/src/fuzz_ng_text_template/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_template/option.go /src/goroot/src/fuzz_ng_text_template/template.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_template/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_template/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_text_template /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_text_template [fuzz_ng_text_template.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./funcs.go:660:2: hex already declared through import of package hex ("encoding/hex")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./ngolo_helper.go:6:2: other declaration of hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_text_template [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_text_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_text_template_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/text/template/parse/lex.go /src/goroot/src/text/template/parse/lex_test.go /src/goroot/src/text/template/parse/node.go /src/goroot/src/text/template/parse/parse.go /src/goroot/src/text/template/parse/parse_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^text_template_parse '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude ActionNode'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude ActionNode text/template/parse fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Found package in /src/goroot/src/text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type RangeNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type VariableNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type CommandNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type NilNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type BoolNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type WithNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type DotNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type IfNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type BreakNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type TextNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type CommentNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type FieldNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Type ContinueNode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv TextNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv TextNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv CommentNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv CommentNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv ActionNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv ActionNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv CommandNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv CommandNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv VariableNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv VariableNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Type has unproduced recv DotNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv DotNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv DotNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Type has unproduced recv NilNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv NilNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv NilNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv FieldNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv FieldNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Add has unproduced recv ChainNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv ChainNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv ChainNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv BoolNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv BoolNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv NumberNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv NumberNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv BranchNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv BranchNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv IfNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv BreakNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv BreakNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv ContinueNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv ContinueNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv RangeNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv WithNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function String has unproduced recv TemplateNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Function Copy has unproduced recv TemplateNode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Unhandled argument &ast.Ellipsis{Ellipsis:2053, Elt:(*ast.MapType)(0xc000202f30)} for Parse
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Unhandled argument &ast.Ellipsis{Ellipsis:3553, Elt:(*ast.MapType)(0xc000203a10)} for New
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Unhandled argument &ast.MapType{Map:6827, Key:(*ast.Ident)(0xc000307680), Value:(*ast.StarExpr)(0xc000237a40)} for TreeNgdotParse
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:33 Unhandled argument &ast.Ellipsis{Ellipsis:6851, Elt:(*ast.MapType)(0xc000304c00)} for TreeNgdotParse
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/text_template_parse.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/text_template_parse.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module text/template/parse: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_text_template_parse/copy/lex.go fuzz_ng_text_template_parse/copy/node.go fuzz_ng_text_template_parse/copy/parse.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_template_parse/copy/lex.go fuzz_ng_text_template_parse/copy/node.go fuzz_ng_text_template_parse/copy/parse.go /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_text_template_parse/fuzz_ng.go fuzz_ng_text_template_parse/fuzzng_unsure_test.go fuzz_ng_text_template_parse/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/text/template/parse/lex_test.go /src/goroot/src/text/template/parse/parse_test.go /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/text/template/parse/testdata /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/text/template/parse/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_text_template_parse/' /src/goroot/src/fuzz_ng_text_template_parse/fuzz_ng.go /src/goroot/src/fuzz_ng_text_template_parse/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_text_template_parse/lex.go /src/goroot/src/fuzz_ng_text_template_parse/lex_test.go /src/goroot/src/fuzz_ng_text_template_parse/ngolo_helper.go /src/goroot/src/fuzz_ng_text_template_parse/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_text_template_parse/node.go /src/goroot/src/fuzz_ng_text_template_parse/parse.go /src/goroot/src/fuzz_ng_text_template_parse/parse_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_template_parse/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_text_template_parse/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_text_template_parse /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_text_template_parse [fuzz_ng_text_template_parse.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_text_template_parse [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_text_template_parse/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_text_template_parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_text_template_parse_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/text/template/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/text/template/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/regexp/all_test.go /src/goroot/src/regexp/backtrack.go /src/goroot/src/regexp/example_test.go /src/goroot/src/regexp/exec.go /src/goroot/src/regexp/exec2_test.go /src/goroot/src/regexp/exec_test.go /src/goroot/src/regexp/find_test.go /src/goroot/src/regexp/onepass.go /src/goroot/src/regexp/onepass_test.go /src/goroot/src/regexp/regexp.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^regexp '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Must,Expand,ReplaceAll,FindAllString -limits RegexpNgdotSplit.n'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Must,Expand,ReplaceAll,FindAllString -limits RegexpNgdotSplit.n regexp fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Found package in /src/goroot/src/regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:40 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/regexp.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/regexp.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module regexp: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_regexp/copy/backtrack.go fuzz_ng_regexp/copy/exec.go fuzz_ng_regexp/copy/onepass.go fuzz_ng_regexp/copy/regexp.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_regexp/copy/backtrack.go fuzz_ng_regexp/copy/exec.go fuzz_ng_regexp/copy/onepass.go fuzz_ng_regexp/copy/regexp.go /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_regexp/fuzz_ng.go fuzz_ng_regexp/fuzzng_unsure_test.go fuzz_ng_regexp/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/regexp/all_test.go /src/goroot/src/regexp/example_test.go /src/goroot/src/regexp/exec2_test.go /src/goroot/src/regexp/exec_test.go /src/goroot/src/regexp/find_test.go /src/goroot/src/regexp/onepass_test.go /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/regexp/testdata /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_regexp/' /src/goroot/src/fuzz_ng_regexp/all_test.go /src/goroot/src/fuzz_ng_regexp/backtrack.go /src/goroot/src/fuzz_ng_regexp/example_test.go /src/goroot/src/fuzz_ng_regexp/exec.go /src/goroot/src/fuzz_ng_regexp/exec2_test.go /src/goroot/src/fuzz_ng_regexp/exec_test.go /src/goroot/src/fuzz_ng_regexp/find_test.go /src/goroot/src/fuzz_ng_regexp/fuzz_ng.go /src/goroot/src/fuzz_ng_regexp/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_regexp/ngolo_helper.go /src/goroot/src/fuzz_ng_regexp/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_regexp/onepass.go /src/goroot/src/fuzz_ng_regexp/onepass_test.go /src/goroot/src/fuzz_ng_regexp/regexp.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_regexp/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_regexp/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_regexp /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_regexp [fuzz_ng_regexp.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_regexp [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_regexp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_regexp_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/regexp/syntax/compile.go /src/goroot/src/regexp/syntax/doc.go /src/goroot/src/regexp/syntax/op_string.go /src/goroot/src/regexp/syntax/parse.go /src/goroot/src/regexp/syntax/parse_test.go /src/goroot/src/regexp/syntax/perl_groups.go /src/goroot/src/regexp/syntax/prog.go /src/goroot/src/regexp/syntax/prog_test.go /src/goroot/src/regexp/syntax/regexp.go /src/goroot/src/regexp/syntax/simplify.go /src/goroot/src/regexp/syntax/simplify_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^regexp_syntax '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing regexp/syntax fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Found package in /src/goroot/src/regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Function MatchRune has unproduced recv Inst
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Function MatchRunePos has unproduced recv Inst
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Function MatchEmptyWidth has unproduced recv Inst
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:48 Function String has unproduced recv Inst
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/regexp_syntax.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/regexp_syntax.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module regexp/syntax: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_regexp_syntax/copy/compile.go fuzz_ng_regexp_syntax/copy/doc.go fuzz_ng_regexp_syntax/copy/op_string.go fuzz_ng_regexp_syntax/copy/parse.go fuzz_ng_regexp_syntax/copy/perl_groups.go fuzz_ng_regexp_syntax/copy/prog.go fuzz_ng_regexp_syntax/copy/regexp.go fuzz_ng_regexp_syntax/copy/simplify.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_regexp_syntax/copy/compile.go fuzz_ng_regexp_syntax/copy/doc.go fuzz_ng_regexp_syntax/copy/op_string.go fuzz_ng_regexp_syntax/copy/parse.go fuzz_ng_regexp_syntax/copy/perl_groups.go fuzz_ng_regexp_syntax/copy/prog.go fuzz_ng_regexp_syntax/copy/regexp.go fuzz_ng_regexp_syntax/copy/simplify.go /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_regexp_syntax/fuzz_ng.go fuzz_ng_regexp_syntax/fuzzng_unsure_test.go fuzz_ng_regexp_syntax/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/regexp/syntax/parse_test.go /src/goroot/src/regexp/syntax/prog_test.go /src/goroot/src/regexp/syntax/simplify_test.go /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/regexp/syntax/testdata /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/regexp/syntax/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_regexp_syntax/' /src/goroot/src/fuzz_ng_regexp_syntax/compile.go /src/goroot/src/fuzz_ng_regexp_syntax/doc.go /src/goroot/src/fuzz_ng_regexp_syntax/fuzz_ng.go /src/goroot/src/fuzz_ng_regexp_syntax/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_regexp_syntax/ngolo_helper.go /src/goroot/src/fuzz_ng_regexp_syntax/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_regexp_syntax/op_string.go /src/goroot/src/fuzz_ng_regexp_syntax/parse.go /src/goroot/src/fuzz_ng_regexp_syntax/parse_test.go /src/goroot/src/fuzz_ng_regexp_syntax/perl_groups.go /src/goroot/src/fuzz_ng_regexp_syntax/prog.go /src/goroot/src/fuzz_ng_regexp_syntax/prog_test.go /src/goroot/src/fuzz_ng_regexp_syntax/regexp.go /src/goroot/src/fuzz_ng_regexp_syntax/simplify.go /src/goroot/src/fuzz_ng_regexp_syntax/simplify_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_regexp_syntax/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_regexp_syntax/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_regexp_syntax /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_regexp_syntax [fuzz_ng_regexp_syntax.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_regexp_syntax [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_regexp_syntax/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_regexp_syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_regexp_syntax_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/regexp/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/regexp/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/time/embed.go /src/goroot/src/time/example_test.go /src/goroot/src/time/export_android_test.go /src/goroot/src/time/export_test.go /src/goroot/src/time/export_windows_test.go /src/goroot/src/time/format.go /src/goroot/src/time/format_rfc3339.go /src/goroot/src/time/format_test.go /src/goroot/src/time/genzabbrs.go /src/goroot/src/time/internal_test.go /src/goroot/src/time/mono_test.go /src/goroot/src/time/sleep.go /src/goroot/src/time/sleep_test.go /src/goroot/src/time/sys_plan9.go /src/goroot/src/time/sys_unix.go /src/goroot/src/time/sys_windows.go /src/goroot/src/time/tick.go /src/goroot/src/time/tick_test.go /src/goroot/src/time/time.go /src/goroot/src/time/time_test.go /src/goroot/src/time/tzdata_test.go /src/goroot/src/time/zoneinfo.go /src/goroot/src/time/zoneinfo_abbrs_windows.go /src/goroot/src/time/zoneinfo_android.go /src/goroot/src/time/zoneinfo_android_test.go /src/goroot/src/time/zoneinfo_goroot.go /src/goroot/src/time/zoneinfo_ios.go /src/goroot/src/time/zoneinfo_js.go /src/++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": goroot/src/time/zoneinfo_plan9.go /src/goroot/src/time/zoneinfo_read.go /src/goroot/src/time/zoneinfo_test.go /src/goroot/src/time/zoneinfo_unix.go /src/goroot/src/time/zoneinfo_unix_test.go /src/goroot/src/time/zoneinfo_wasip1.go /src/goroot/src/time/zoneinfo_windows.go /src/goroot/src/time/zoneinfo_windows_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 36 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package time
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^time '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing time fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Found package in /src/goroot/src/time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Type ParseError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Function Error has unproduced recv ParseError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:55 Failed creating fuzz target : Unhandled result &ast.ChanType{Begin:143390, Arrow:143390, Dir:2, Value:(*ast.Ident)(0xc00031bb40)} for After
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/time.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/time.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=time
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_time
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": no Go files in /src/ngolo-fuzzing/fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": no Go files in /src/ngolo-fuzzing/fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": no Go files in /src/ngolo-fuzzing/fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_time/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_time/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_time/copy/*.go' /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_time/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_time/*.go' /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_time/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/time/example_test.go /src/goroot/src/time/export_android_test.go /src/goroot/src/time/export_test.go /src/goroot/src/time/export_windows_test.go /src/goroot/src/time/format_test.go /src/goroot/src/time/internal_test.go /src/goroot/src/time/mono_test.go /src/goroot/src/time/sleep_test.go /src/goroot/src/time/tick_test.go /src/goroot/src/time/time_test.go /src/goroot/src/time/tzdata_test.go /src/goroot/src/time/zoneinfo_android_test.go /src/goroot/src/time/zoneinfo_test.go /src/goroot/src/time/zoneinfo_unix_test.go /src/goroot/src/time/zoneinfo_windows_test.go /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/time/testdata /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_time/' /src/goroot/src/fuzz_ng_time/example_test.go /src/goroot/src/fuzz_ng_time/export_android_test.go /src/goroot/src/fuzz_ng_time/export_test.go /src/goroot/src/fuzz_ng_time/export_windows_test.go /src/goroot/src/fuzz_ng_time/format_test.go /src/goroot/src/fuzz_ng_time/internal_test.go /src/goroot/src/fuzz_ng_time/mono_test.go /src/goroot/src/fuzz_ng_time/ngolo_helper.go /src/goroot/src/fuzz_ng_time/sleep_test.go /src/goroot/src/fuzz_ng_time/tick_test.go /src/goroot/src/fuzz_ng_time/time_test.go /src/goroot/src/fuzz_ng_time/tzdata_test.go /src/goroot/src/fuzz_ng_time/zoneinfo_android_test.go /src/goroot/src/fuzz_ng_time/zoneinfo_test.go /src/goroot/src/fuzz_ng_time/zoneinfo_unix_test.go /src/goroot/src/fuzz_ng_time/zoneinfo_windows_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_time/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_time/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_time /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_time [fuzz_ng_time.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:32:27: undefined: gorootZoneSource
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:33:27: undefined: parseTimeZone
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:34:29: undefined: Time
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:35:29: undefined: Time
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:36:27: undefined: errLocation
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:37:27: undefined: readFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:38:27: undefined: loadTzinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:39:27: undefined: nextStdChunk
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:40:27: undefined: tzset
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:41:27: undefined: tzsetName
Step #3 - "compile-libfuzzer-coverage-x86_64": ./export_test.go:41:27: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_time [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_time/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_time
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_time_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64": 	zip warning: name not matched: corpus
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": zip error: Nothing to do! (try: zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_time_seed_corpus.zip . -i corpus)
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo time
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/time/tzdata/tzdata.go /src/goroot/src/time/tzdata/zzipdata.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^time_tzdata '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing time/tzdata fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:57 Found package in /src/goroot/src/time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/time_tzdata.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/time_tzdata.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module time/tzdata: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_time_tzdata [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_time_tzdata.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:18:2: "time/tzdata" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_time_tzdata/copy/tzdata.go fuzz_ng_time_tzdata/copy/zzipdata.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_time_tzdata/copy/tzdata.go fuzz_ng_time_tzdata/copy/zzipdata.go /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_time_tzdata/fuzz_ng.go fuzz_ng_time_tzdata/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/time/tzdata/*_test.go' /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/time/tzdata/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/time/tzdata/testdata /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/time/tzdata/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_time_tzdata/' /src/goroot/src/fuzz_ng_time_tzdata/fuzz_ng.go /src/goroot/src/fuzz_ng_time_tzdata/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_time_tzdata/ngolo_helper.go /src/goroot/src/fuzz_ng_time_tzdata/tzdata.go /src/goroot/src/fuzz_ng_time_tzdata/zzipdata.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_time_tzdata/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_time_tzdata/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_time_tzdata /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_time_tzdata [fuzz_ng_time_tzdata.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tzdata.go:70:7: undefined: zipdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_time_tzdata [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_time_tzdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_time_tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_time_tzdata_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/time/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/time/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/maps/example_test.go /src/goroot/src/maps/maps.go /src/goroot/src/maps/maps_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^maps '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing maps fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Found package in /src/goroot/src/maps
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function Equal has unproduced argument M1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function Equal has unproduced argument M2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function EqualFunc has unproduced argument M1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function EqualFunc has unproduced argument M2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Unhandled argument &ast.FuncType{Func:741, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000121b60), Results:(*ast.FieldList)(0xc000121b90)} for EqualFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function Clone has unproduced argument M
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function Copy has unproduced argument M1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function Copy has unproduced argument M2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Function DeleteFunc has unproduced argument M
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:08:59 Unhandled argument &ast.FuncType{Func:1703, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001a2330), Results:(*ast.FieldList)(0xc0001a2360)} for DeleteFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/maps.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/maps.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo maps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module maps: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_maps [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_maps.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:13:2: "maps" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_maps/copy/maps.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_maps/copy/maps.go /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_maps/fuzz_ng.go fuzz_ng_maps/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/maps/example_test.go /src/goroot/src/maps/maps_test.go /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/maps/testdata /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/maps/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_maps/' /src/goroot/src/fuzz_ng_maps/example_test.go /src/goroot/src/fuzz_ng_maps/fuzz_ng.go /src/goroot/src/fuzz_ng_maps/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_maps/maps.go /src/goroot/src/fuzz_ng_maps/maps_test.go /src/goroot/src/fuzz_ng_maps/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_maps/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_maps/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_maps /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_maps [fuzz_ng_maps.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_maps [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_maps/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_maps_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo maps
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/example_test.go /src/goroot/src/log/log.go /src/goroot/src/log/log_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package log
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^log '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing log fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Found package in /src/goroot/src/log
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:7983, Elt:(*ast.Ident)(0xc0002836e0)} for LoggerNgdotPrint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:8215, Elt:(*ast.Ident)(0xc0002839c0)} for LoggerNgdotPrintf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:8444, Elt:(*ast.Ident)(0xc000283c80)} for LoggerNgdotPrintln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:8629, Elt:(*ast.Ident)(0xc000283f20)} for LoggerNgdotFatal
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:8800, Elt:(*ast.Ident)(0xc00028a200)} for LoggerNgdotFatalf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:8968, Elt:(*ast.Ident)(0xc00028a460)} for LoggerNgdotFatalln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:9118, Elt:(*ast.Ident)(0xc00028a680)} for LoggerNgdotPanic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:9290, Elt:(*ast.Ident)(0xc00028a900)} for LoggerNgdotPanicf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:9459, Elt:(*ast.Ident)(0xc00028ab80)} for LoggerNgdotPanicln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:11223, Elt:(*ast.Ident)(0xc00028baa0)} for Print
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:11452, Elt:(*ast.Ident)(0xc00028bd40)} for Printf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:11678, Elt:(*ast.Ident)(0xc000292040)} for Println
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:11851, Elt:(*ast.Ident)(0xc0002922a0)} for Fatal
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:12010, Elt:(*ast.Ident)(0xc0002924c0)} for Fatalf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:12166, Elt:(*ast.Ident)(0xc0002926e0)} for Fatalln
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:12304, Elt:(*ast.Ident)(0xc0002928c0)} for Panic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:12464, Elt:(*ast.Ident)(0xc000292b00)} for Panicf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:01 Unhandled argument &ast.Ellipsis{Ellipsis:12621, Elt:(*ast.Ident)(0xc000292d40)} for Panicln
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/log.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/log.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=log
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_log
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module log: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_log/copy/log.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_log/copy/log.go /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_log/fuzz_ng.go fuzz_ng_log/fuzzng_unsure_test.go fuzz_ng_log/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/log/example_test.go /src/goroot/src/log/log_test.go /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/log/testdata /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/log/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_log/' /src/goroot/src/fuzz_ng_log/example_test.go /src/goroot/src/fuzz_ng_log/fuzz_ng.go /src/goroot/src/fuzz_ng_log/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_log/log.go /src/goroot/src/fuzz_ng_log/log_test.go /src/goroot/src/fuzz_ng_log/ngolo_helper.go /src/goroot/src/fuzz_ng_log/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_log/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_log/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_log /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": 	log.go:20:2: use of internal package log/internal not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_log/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_log_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo log
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/slog/attr.go /src/goroot/src/log/slog/attr_test.go /src/goroot/src/log/slog/doc.go /src/goroot/src/log/slog/example_custom_levels_test.go /src/goroot/src/log/slog/example_level_handler_test.go /src/goroot/src/log/slog/example_log_level_test.go /src/goroot/src/log/slog/example_logvaluer_group_test.go /src/goroot/src/log/slog/example_logvaluer_secret_test.go /src/goroot/src/log/slog/example_test.go /src/goroot/src/log/slog/example_wrap_test.go /src/goroot/src/log/slog/handler.go /src/goroot/src/log/slog/handler_test.go /src/goroot/src/log/slog/json_handler.go /src/goroot/src/log/slog/json_handler_test.go /src/goroot/src/log/slog/level.go /src/goroot/src/log/slog/level_test.go /src/goroot/src/log/slog/logger.go /src/goroot/src/log/slog/logger_test.go /src/goroot/src/log/slog/record.go /src/goroot/src/log/slog/record_test.go /src/goroot/src/log/slog/slogtest_test.go /src/goroot/src/log/slog/text_handler.go /src/goroot/src/log/slog/text_handler_test.go /src/goroot/src/log/slog/value.go /src/goroot/src/log/slog/value_access_benchmark_test.go /src/goroot/src/log/slog/value_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 26 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^log_slog '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing log/slog fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Found package in /src/goroot/src/log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Array result for Attr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Type LevelVar is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Time has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Duration has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:1689, Elt:(*ast.Ident)(0xc00028af60)} for Group
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function NewJSONHandler has unproduced argument HandlerOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Enabled has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function WithAttrs has unproduced array argument Attr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Handle has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Level has unproduced recv LevelVar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Set has unproduced recv LevelVar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function String has unproduced recv LevelVar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function MarshalText has unproduced recv LevelVar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function UnmarshalText has unproduced recv LevelVar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:66653, Elt:(*ast.Ident)(0xc0002c1600)} for LoggerNgdotWith
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:67491, Elt:(*ast.Ident)(0xc0002c1dc0)} for With
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Enabled has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Log has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:68724, Elt:(*ast.Ident)(0xc0002c8620)} for LoggerNgdotLog
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function LogAttrs has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:68929, Elt:(*ast.Ident)(0xc0002c88c0)} for LoggerNgdotLogAttrs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69053, Elt:(*ast.Ident)(0xc0002c8ac0)} for LoggerNgdotDebug
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function DebugContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69250, Elt:(*ast.Ident)(0xc0002c8d20)} for LoggerNgdotDebugContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69369, Elt:(*ast.Ident)(0xc0002c8f20)} for LoggerNgdotInfo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function InfoContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69562, Elt:(*ast.Ident)(0xc0002c9180)} for LoggerNgdotInfoContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69680, Elt:(*ast.Ident)(0xc0002c9380)} for LoggerNgdotWarn
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function WarnContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69873, Elt:(*ast.Ident)(0xc0002c95e0)} for LoggerNgdotWarnContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:69994, Elt:(*ast.Ident)(0xc0002c97e0)} for LoggerNgdotError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function ErrorContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:70191, Elt:(*ast.Ident)(0xc0002c9a40)} for LoggerNgdotErrorContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:71494, Elt:(*ast.Ident)(0xc0002cec20)} for Debug
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function DebugContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:71693, Elt:(*ast.Ident)(0xc0002cee40)} for DebugContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:71830, Elt:(*ast.Ident)(0xc0002cf000)} for Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function InfoContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:72025, Elt:(*ast.Ident)(0xc0002cf220)} for InfoContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:72161, Elt:(*ast.Ident)(0xc0002cf3e0)} for Warn
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function WarnContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:72356, Elt:(*ast.Ident)(0xc0002cf600)} for WarnContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:72495, Elt:(*ast.Ident)(0xc0002cf7c0)} for Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function ErrorContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:72694, Elt:(*ast.Ident)(0xc0002cf9e0)} for ErrorContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Log has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:72862, Elt:(*ast.Ident)(0xc0002cfc40)} for Log
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function LogAttrs has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:73041, Elt:(*ast.Ident)(0xc0002cfea0)} for LogAttrs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function NewRecord has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function NewRecord has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.FuncType{Func:41011, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000336510), Results:(*ast.FieldList)(0xc000336540)} for RecordNgdotAttrs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:41290, Elt:(*ast.Ident)(0xc000310f20)} for RecordNgdotAddAttrs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:42242, Elt:(*ast.Ident)(0xc000311c60)} for RecordNgdotAdd
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function NewTextHandler has unproduced argument HandlerOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Enabled has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function WithAttrs has unproduced array argument Attr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function Handle has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function TimeValue has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Function DurationValue has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:08 Unhandled argument &ast.Ellipsis{Ellipsis:25045, Elt:(*ast.Ident)(0xc0004805e0)} for GroupValue
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/log_slog.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/log_slog.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module log/slog: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log_slog [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log_slog.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:198:9: undefined: NgoloFuzzOne_String
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:534:9: undefined: NgoloFuzzOne_String
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_log_slog/copy/attr.go fuzz_ng_log_slog/copy/doc.go fuzz_ng_log_slog/copy/handler.go fuzz_ng_log_slog/copy/json_handler.go fuzz_ng_log_slog/copy/level.go fuzz_ng_log_slog/copy/logger.go fuzz_ng_log_slog/copy/record.go fuzz_ng_log_slog/copy/text_handler.go fuzz_ng_log_slog/copy/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_log_slog/copy/attr.go fuzz_ng_log_slog/copy/doc.go fuzz_ng_log_slog/copy/handler.go fuzz_ng_log_slog/copy/json_handler.go fuzz_ng_log_slog/copy/level.go fuzz_ng_log_slog/copy/logger.go fuzz_ng_log_slog/copy/record.go fuzz_ng_log_slog/copy/text_handler.go fuzz_ng_log_slog/copy/value.go /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_log_slog/fuzz_ng.go fuzz_ng_log_slog/fuzzng_unsure_test.go fuzz_ng_log_slog/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/log/slog/attr_test.go /src/goroot/src/log/slog/example_custom_levels_test.go /src/goroot/src/log/slog/example_level_handler_test.go /src/goroot/src/log/slog/example_log_level_test.go /src/goroot/src/log/slog/example_logvaluer_group_test.go /src/goroot/src/log/slog/example_logvaluer_secret_test.go /src/goroot/src/log/slog/example_test.go /src/goroot/src/log/slog/example_wrap_test.go /src/goroot/src/log/slog/handler_test.go /src/goroot/src/log/slog/json_handler_test.go /src/goroot/src/log/slog/level_test.go /src/goroot/src/log/slog/logger_test.go /src/goroot/src/log/slog/record_test.go /src/goroot/src/log/slog/slogtest_test.go /src/goroot/src/log/slog/text_handler_test.go /src/goroot/src/log/slog/value_access_benchmark_test.go /src/goroot/src/log/slog/value_test.go /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/log/slog/testdata /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/log/slog/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_log_slog/' /src/goroot/src/fuzz_ng_log_slog/attr.go /src/goroot/src/fuzz_ng_log_slog/attr_test.go /src/goroot/src/fuzz_ng_log_slog/doc.go /src/goroot/src/fuzz_ng_log_slog/example_custom_levels_test.go /src/goroot/src/fuzz_ng_log_slog/example_level_handler_test.go /src/goroot/src/fuzz_ng_log_slog/example_log_level_test.go /src/goroot/src/fuzz_ng_log_slog/example_logvaluer_group_test.go /src/goroot/src/fuzz_ng_log_slog/example_logvaluer_secret_test.go /src/goroot/src/fuzz_ng_log_slog/example_test.go /src/goroot/src/fuzz_ng_log_slog/example_wrap_test.go /src/goroot/src/fuzz_ng_log_slog/fuzz_ng.go /src/goroot/src/fuzz_ng_log_slog/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_log_slog/handler.go /src/goroot/src/fuzz_ng_log_slog/handler_test.go /src/goroot/src/fuzz_ng_log_slog/json_handler.go /src/goroot/src/fuzz_ng_log_slog/json_handler_test.go /src/goroot/src/fuzz_ng_log_slog/level.go /src/goroot/src/fuzz_ng_log_slog/level_test.go /src/goroot/src/fuzz_ng_log_slog/logger.go /src/goroot/src/fuzz_ng_log_slog/logger_test.go /src/goroot/src/fuzz_ng_log_slog/ngolo_helper.go /src/goroot/src/fuzz_ng_log_slog/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_log_slog/record.go /src/goroot/src/fuzz_ng_log_slog/record_test.go /src/goroot/src/fuzz_ng_log_slog/slogtest_test.go /src/goroot/src/fuzz_ng_log_slog/text_handler.go /src/goroot/src/fuzz_ng_log_slog/text_handler_test.go /src/goroot/src/fuzz_ng_log_slog/value.go /src/goroot/src/fuzz_ng_log_slog/value_access_benchmark_test.go /src/goroot/src/fuzz_ng_log_slog/value_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_log_slog/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_log_slog/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_log_slog /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": 	logger.go:10:2: use of internal package log/internal not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_log_slog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log_slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_log_slog_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/slog/internal/ignorepc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog/internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/slog/internal/benchmarks/benchmarks.go /src/goroot/src/log/slog/internal/benchmarks/benchmarks_test.go /src/goroot/src/log/slog/internal/benchmarks/handlers.go /src/goroot/src/log/slog/internal/benchmarks/handlers_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog/internal/benchmarks
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/slog/internal/slogtest/slogtest.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog/internal/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/slog/internal/buffer/buffer.go /src/goroot/src/log/slog/internal/buffer/buffer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/slog/internal/buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/internal/internal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/log/syslog/doc.go /src/goroot/src/log/syslog/example_test.go /src/goroot/src/log/syslog/syslog.go /src/goroot/src/log/syslog/syslog_test.go /src/goroot/src/log/syslog/syslog_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^log_syslog '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing log/syslog fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:15 Found package in /src/goroot/src/log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/log_syslog.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/log_syslog.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module log/syslog: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_log_syslog/copy/doc.go fuzz_ng_log_syslog/copy/syslog.go fuzz_ng_log_syslog/copy/syslog_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_log_syslog/copy/doc.go fuzz_ng_log_syslog/copy/syslog.go fuzz_ng_log_syslog/copy/syslog_unix.go /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_log_syslog/fuzz_ng.go fuzz_ng_log_syslog/fuzzng_unsure_test.go fuzz_ng_log_syslog/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/log/syslog/example_test.go /src/goroot/src/log/syslog/syslog_test.go /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/log/syslog/testdata /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/log/syslog/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_log_syslog/' /src/goroot/src/fuzz_ng_log_syslog/doc.go /src/goroot/src/fuzz_ng_log_syslog/example_test.go /src/goroot/src/fuzz_ng_log_syslog/fuzz_ng.go /src/goroot/src/fuzz_ng_log_syslog/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_log_syslog/ngolo_helper.go /src/goroot/src/fuzz_ng_log_syslog/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_log_syslog/syslog.go /src/goroot/src/fuzz_ng_log_syslog/syslog_test.go /src/goroot/src/fuzz_ng_log_syslog/syslog_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_log_syslog/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_log_syslog/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_log_syslog /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_log_syslog [fuzz_ng_log_syslog.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_log_syslog [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_log_syslog/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_log_syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_log_syslog_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/crypto.go /src/goroot/src/crypto/issue21104_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:22 Found package in /src/goroot/src/crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:22 Unhandled argument &ast.FuncType{Func:3926, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00011f770), Results:(*ast.FieldList)(0xc00011f7a0)} for RegisterHash
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:181:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:227:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto/copy/crypto.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto/copy/crypto.go /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto/fuzz_ng.go fuzz_ng_crypto/fuzzng_unsure_test.go fuzz_ng_crypto/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/issue21104_test.go /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/testdata /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto/' /src/goroot/src/fuzz_ng_crypto/crypto.go /src/goroot/src/fuzz_ng_crypto/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto/issue21104_test.go /src/goroot/src/fuzz_ng_crypto/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto [fuzz_ng_crypto.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/boring/boring.go /src/goroot/src/crypto/boring/boring_test.go /src/goroot/src/crypto/boring/notboring_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_boring '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/boring fuzz_ng_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:27 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:27 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_boring.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_boring.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_crypto_boring: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_crypto_boring: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/boring: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package crypto/boring: build constraints exclude all Go files in /src/goroot/src/crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_crypto_boring/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_crypto_boring/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_crypto_boring/copy/*.go' /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_crypto_boring/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_crypto_boring/*.go' /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_crypto_boring/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/boring/boring_test.go /src/goroot/src/crypto/boring/notboring_test.go /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/boring/testdata /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/boring/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_boring/' /src/goroot/src/fuzz_ng_crypto_boring/boring_test.go /src/goroot/src/fuzz_ng_crypto_boring/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_boring/notboring_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_boring/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_boring/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_boring /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto_boring [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_boring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_boring
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_crypto_boring: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_boring_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/rand/example_test.go /src/goroot/src/crypto/rand/rand.go /src/goroot/src/crypto/rand/rand_batched_test.go /src/goroot/src/crypto/rand/rand_getentropy.go /src/goroot/src/crypto/rand/rand_getrandom.go /src/goroot/src/crypto/rand/rand_js.go /src/goroot/src/crypto/rand/rand_plan9.go /src/goroot/src/crypto/rand/rand_test.go /src/goroot/src/crypto/rand/rand_unix.go /src/goroot/src/crypto/rand/rand_wasip1.go /src/goroot/src/crypto/rand/rand_windows.go /src/goroot/src/crypto/rand/util.go /src/goroot/src/crypto/rand/util_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_rand '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits Prime.bits'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits Prime.bits crypto/rand fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:30 Found package in /src/goroot/src/crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_rand.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_rand.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/rand: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_rand/copy/rand.go fuzz_ng_crypto_rand/copy/rand_getrandom.go fuzz_ng_crypto_rand/copy/rand_unix.go fuzz_ng_crypto_rand/copy/util.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_rand/copy/rand.go fuzz_ng_crypto_rand/copy/rand_getrandom.go fuzz_ng_crypto_rand/copy/rand_unix.go fuzz_ng_crypto_rand/copy/util.go /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_rand/fuzz_ng.go fuzz_ng_crypto_rand/fuzzng_unsure_test.go fuzz_ng_crypto_rand/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/rand/example_test.go /src/goroot/src/crypto/rand/rand_batched_test.go /src/goroot/src/crypto/rand/rand_test.go /src/goroot/src/crypto/rand/util_test.go /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/rand/testdata /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/rand/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_rand/' /src/goroot/src/fuzz_ng_crypto_rand/example_test.go /src/goroot/src/fuzz_ng_crypto_rand/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_rand/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_rand/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_rand/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_rand/rand.go /src/goroot/src/fuzz_ng_crypto_rand/rand_batched_test.go /src/goroot/src/fuzz_ng_crypto_rand/rand_getrandom.go /src/goroot/src/fuzz_ng_crypto_rand/rand_test.go /src/goroot/src/fuzz_ng_crypto_rand/rand_unix.go /src/goroot/src/fuzz_ng_crypto_rand/util.go /src/goroot/src/fuzz_ng_crypto_rand/util_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_rand/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_rand/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_rand /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": 	rand_unix.go:13:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_rand/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_rand_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/x509/boring.go /src/goroot/src/crypto/x509/boring_test.go /src/goroot/src/crypto/x509/cert_pool.go /src/goroot/src/crypto/x509/cert_pool_test.go /src/goroot/src/crypto/x509/example_test.go /src/goroot/src/crypto/x509/hybrid_pool_test.go /src/goroot/src/crypto/x509/name_constraints_test.go /src/goroot/src/crypto/x509/notboring.go /src/goroot/src/crypto/x509/oid.go /src/goroot/src/crypto/x509/oid_test.go /src/goroot/src/crypto/x509/parser.go /src/goroot/src/crypto/x509/parser_test.go /src/goroot/src/crypto/x509/pem_decrypt.go /src/goroot/src/crypto/x509/pem_decrypt_test.go /src/goroot/src/crypto/x509/pkcs1.go /src/goroot/src/crypto/x509/pkcs8.go /src/goroot/src/crypto/x509/pkcs8_test.go /src/goroot/src/crypto/x509/platform_test.go /src/goroot/src/crypto/x509/root.go /src/goroot/src/crypto/x509/root_aix.go /src/goroot/src/crypto/x509/root_bsd.go /src/goroot/src/crypto/x509/root_darwin.go /src/goroot/src/crypto/x509/root_darwin_test.go /src/goroot/src/crypto/x509/root_linux.go /src/go++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": root/src/crypto/x509/root_plan9.go /src/goroot/src/crypto/x509/root_solaris.go /src/goroot/src/crypto/x509/root_test.go /src/goroot/src/crypto/x509/root_unix.go /src/goroot/src/crypto/x509/root_unix_test.go /src/goroot/src/crypto/x509/root_wasm.go /src/goroot/src/crypto/x509/root_windows.go /src/goroot/src/crypto/x509/root_windows_test.go /src/goroot/src/crypto/x509/sec1.go /src/goroot/src/crypto/x509/sec1_test.go /src/goroot/src/crypto/x509/verify.go /src/goroot/src/crypto/x509/verify_test.go /src/goroot/src/crypto/x509/x509.go /src/goroot/src/crypto/x509/x509_test.go /src/goroot/src/crypto/x509/x509_test_import.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 39 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_x509 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/x509 fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Found package in /src/goroot/src/crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for Certificate is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for Certificate is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type UnknownAuthorityError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type InsecureAlgorithmError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type CertificateInvalidError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type ConstraintViolationError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type UnhandledCriticalExtension is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type HostnameError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Type SystemRootsError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Unhandled argument &ast.FuncType{Func:104922, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0003760c0), Results:(*ast.FieldList)(0xc0003760f0)} for CertPoolNgdotAddCertWithConstraint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function OIDFromInts has unproduced array argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function EqualASN1OID has unproduced argument asn1.ObjectIdentifier
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function IsEncryptedPEMBlock has unproduced argument pem.Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function DecryptPEMBlock has unproduced argument pem.Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function MarshalPKCS1PrivateKey has unproduced argument rsa.PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function MarshalPKCS1PublicKey has unproduced argument rsa.PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function MarshalECPrivateKey has unproduced argument ecdsa.PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv CertificateInvalidError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv HostnameError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv UnknownAuthorityError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv SystemRootsError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Unwrap has unproduced recv SystemRootsError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Verify has unproduced argument VerifyOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv InsecureAlgorithmError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv ConstraintViolationError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function CheckCRLSignature has unproduced argument pkix.CertificateList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function Error has unproduced recv UnhandledCriticalExtension
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function CreateCRL has unproduced argument pkix.RevokedCertificate
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function CreateCRL has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:36 Function CreateRevocationList has unproduced argument crypto.Signer
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_x509.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_x509.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/x509: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_x509/copy/cert_pool.go fuzz_ng_crypto_x509/copy/notboring.go fuzz_ng_crypto_x509/copy/oid.go fuzz_ng_crypto_x509/copy/parser.go fuzz_ng_crypto_x509/copy/pem_decrypt.go fuzz_ng_crypto_x509/copy/pkcs1.go fuzz_ng_crypto_x509/copy/pkcs8.go fuzz_ng_crypto_x509/copy/root.go fuzz_ng_crypto_x509/copy/root_linux.go fuzz_ng_crypto_x509/copy/root_unix.go fuzz_ng_crypto_x509/copy/sec1.go fuzz_ng_crypto_x509/copy/verify.go fuzz_ng_crypto_x509/copy/x509.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_x509/copy/cert_pool.go fuzz_ng_crypto_x509/copy/notboring.go fuzz_ng_crypto_x509/copy/oid.go fuzz_ng_crypto_x509/copy/parser.go fuzz_ng_crypto_x509/copy/pem_decrypt.go fuzz_ng_crypto_x509/copy/pkcs1.go fuzz_ng_crypto_x509/copy/pkcs8.go fuzz_ng_crypto_x509/copy/root.go fuzz_ng_crypto_x509/copy/root_linux.go fuzz_ng_crypto_x509/copy/root_unix.go fuzz_ng_crypto_x509/copy/sec1.go fuzz_ng_crypto_x509/copy/verify.go fuzz_ng_crypto_x509/copy/x509.go /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_x509/fuzz_ng.go fuzz_ng_crypto_x509/fuzzng_unsure_test.go fuzz_ng_crypto_x509/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/x509/boring_test.go /src/goroot/src/crypto/x509/cert_pool_test.go /src/goroot/src/crypto/x509/example_test.go /src/goroot/src/crypto/x509/hybrid_pool_test.go /src/goroot/src/crypto/x509/name_constraints_test.go /src/goroot/src/crypto/x509/oid_test.go /src/goroot/src/crypto/x509/parser_test.go /src/goroot/src/crypto/x509/pem_decrypt_test.go /src/goroot/src/crypto/x509/pkcs8_test.go /src/goroot/src/crypto/x509/platform_test.go /src/goroot/src/crypto/x509/root_darwin_test.go /src/goroot/src/crypto/x509/root_test.go /src/goroot/src/crypto/x509/root_unix_test.go /src/goroot/src/crypto/x509/root_windows_test.go /src/goroot/src/crypto/x509/sec1_test.go /src/goroot/src/crypto/x509/verify_test.go /src/goroot/src/crypto/x509/x509_test.go /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/x509/testdata /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_x509/' /src/goroot/src/fuzz_ng_crypto_x509/boring_test.go /src/goroot/src/fuzz_ng_crypto_x509/cert_pool.go /src/goroot/src/fuzz_ng_crypto_x509/cert_pool_test.go /src/goroot/src/fuzz_ng_crypto_x509/example_test.go /src/goroot/src/fuzz_ng_crypto_x509/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_x509/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_x509/hybrid_pool_test.go /src/goroot/src/fuzz_ng_crypto_x509/name_constraints_test.go /src/goroot/src/fuzz_ng_crypto_x509/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_x509/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_x509/notboring.go /src/goroot/src/fuzz_ng_crypto_x509/oid.go /src/goroot/src/fuzz_ng_crypto_x509/oid_test.go /src/goroot/src/fuzz_ng_crypto_x509/parser.go /src/goroot/src/fuzz_ng_crypto_x509/parser_test.go /src/goroot/src/fuzz_ng_crypto_x509/pem_decrypt.go /src/goroot/src/fuzz_ng_crypto_x509/pem_decrypt_test.go /src/goroot/src/fuzz_ng_crypto_x509/pkcs1.go /src/goroot/src/fuzz_ng_crypto_x509/pkcs8.go /src/goroot/src/fuzz_ng_crypto_x509/pkcs8_test.go /src/goroot/src/fuzz_ng_crypto_x509/platform_test.go /src/goroot/src/fuzz_ng_crypto_x509/root.go /src/goroot/src/fuzz_ng_crypto_x509/root_darwin_test.go /src/goroot/src/fuzz_ng_crypto_x509/root_linux.go /src/goroot/src/fuzz_ng_crypto_x509/root_test.go /src/goroot/src/fuzz_ng_crypto_x509/root_unix.go /src/goroot/src/fuzz_ng_crypto_x509/root_unix_test.go /src/goroot/src/fuzz_ng_crypto_x509/root_windows_test.go /src/goroot/src/fuzz_ng_crypto_x509/sec1.go /src/goroot/src/fuzz_ng_crypto_x509/sec1_test.go /src/goroot/src/fuzz_ng_crypto_x509/verify.go /src/goroot/src/fuzz_ng_crypto_x509/verify_test.go /src/goroot/src/fuzz_ng_crypto_x509/x509.go /src/goroot/src/fuzz_ng_crypto_x509/x509_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_x509/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_x509/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_x509 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto_x509 [fuzz_ng_crypto_x509.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto_x509 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_x509/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_x509_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/x509/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/x509/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/x509/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/x509/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/x509/internal/macos/corefoundation.go /src/goroot/src/crypto/x509/internal/macos/security.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509/internal/macos
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/x509/pkix/pkix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_x509_pkix '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/x509/pkix fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:44 Found package in /src/goroot/src/crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:44 Function FillFromRDNSequence has unproduced recv Name
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:44 Function ToRDNSequence has unproduced recv Name
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:44 Function String has unproduced recv Name
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:44 Function HasExpired has unproduced recv CertificateList
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_x509_pkix.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_x509_pkix.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/x509/pkix: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_x509_pkix [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_x509_pkix.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:181:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:198:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_x509_pkix/copy/pkix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_x509_pkix/copy/pkix.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_x509_pkix/fuzz_ng.go fuzz_ng_crypto_x509_pkix/fuzzng_unsure_test.go fuzz_ng_crypto_x509_pkix/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/crypto/x509/pkix/*_test.go' /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/x509/pkix/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/x509/pkix/testdata /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/x509/pkix/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_x509_pkix/' /src/goroot/src/fuzz_ng_crypto_x509_pkix/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_x509_pkix/pkix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_x509_pkix/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_x509_pkix/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_x509_pkix /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto_x509_pkix [fuzz_ng_crypto_x509_pkix.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto_x509_pkix [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_x509_pkix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_x509_pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_x509_pkix_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/dsa/dsa.go /src/goroot/src/crypto/dsa/dsa_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_dsa '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/dsa fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:49 Found package in /src/goroot/src/crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:49 Function GenerateParameters has unproduced argument Parameters
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:49 Function GenerateKey has unproduced argument PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:49 Function Sign has unproduced argument PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:49 Function Verify has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_dsa.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_dsa.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:29:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:29:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/dsa: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_dsa [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_dsa.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:34: undefined: ParameterSizesEnum
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:133:43: undefined: ParameterSizesEnum
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:142:31: undefined: ParametersStruct
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:154:30: undefined: PublicKeyStruct
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:164:31: undefined: PrivateKeyStruct
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:174:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:195:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:216:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:239:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_dsa/copy/dsa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_dsa/copy/dsa.go /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_dsa/fuzz_ng.go fuzz_ng_crypto_dsa/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/dsa/dsa_test.go /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/dsa/testdata /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/dsa/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_dsa/' /src/goroot/src/fuzz_ng_crypto_dsa/dsa.go /src/goroot/src/fuzz_ng_crypto_dsa/dsa_test.go /src/goroot/src/fuzz_ng_crypto_dsa/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_dsa/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_dsa/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_dsa/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_dsa/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_dsa /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 	dsa.go:21:2: use of internal package crypto/internal/randutil not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_dsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_dsa_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/hmac/hmac.go /src/goroot/src/crypto/hmac/hmac_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_hmac '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/hmac fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:52 Found package in /src/goroot/src/crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:52 Unhandled argument &ast.FuncType{Func:3589, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000217200), Results:(*ast.FieldList)(0xc000217230)} for New
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_hmac.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_hmac.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/hmac: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_hmac/copy/hmac.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_hmac/copy/hmac.go /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_hmac/fuzz_ng.go fuzz_ng_crypto_hmac/fuzzng_unsure_test.go fuzz_ng_crypto_hmac/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/hmac/hmac_test.go /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/hmac/testdata /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/hmac/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_hmac/' /src/goroot/src/fuzz_ng_crypto_hmac/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_hmac/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_hmac/hmac.go /src/goroot/src/fuzz_ng_crypto_hmac/hmac_test.go /src/goroot/src/fuzz_ng_crypto_hmac/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_hmac/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_hmac/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_hmac/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_hmac /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": 	hmac.go:25:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_hmac/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_hmac_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/ecdsa/boring.go /src/goroot/src/crypto/ecdsa/ecdsa.go /src/goroot/src/crypto/ecdsa/ecdsa_legacy.go /src/goroot/src/crypto/ecdsa/ecdsa_noasm.go /src/goroot/src/crypto/ecdsa/ecdsa_s390x.go /src/goroot/src/crypto/ecdsa/ecdsa_s390x_test.go /src/goroot/src/crypto/ecdsa/ecdsa_test.go /src/goroot/src/crypto/ecdsa/equal_test.go /src/goroot/src/crypto/ecdsa/example_test.go /src/goroot/src/crypto/ecdsa/notboring.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_ecdsa '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/ecdsa fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Found package in /src/goroot/src/crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Function Equal has unproduced argument crypto.PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Function Equal has unproduced argument crypto.PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Function Sign has unproduced argument crypto.SignerOpts
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Function GenerateKey has unproduced argument elliptic.Curve
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Function VerifyASN1 has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:09:58 Function Verify has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_ecdsa.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_ecdsa.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/ecdsa: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_ecdsa/copy/ecdsa.go fuzz_ng_crypto_ecdsa/copy/ecdsa_legacy.go fuzz_ng_crypto_ecdsa/copy/ecdsa_noasm.go fuzz_ng_crypto_ecdsa/copy/notboring.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_ecdsa/copy/ecdsa.go fuzz_ng_crypto_ecdsa/copy/ecdsa_legacy.go fuzz_ng_crypto_ecdsa/copy/ecdsa_noasm.go fuzz_ng_crypto_ecdsa/copy/notboring.go /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_ecdsa/fuzz_ng.go fuzz_ng_crypto_ecdsa/fuzzng_unsure_test.go fuzz_ng_crypto_ecdsa/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/ecdsa/ecdsa_s390x_test.go /src/goroot/src/crypto/ecdsa/ecdsa_test.go /src/goroot/src/crypto/ecdsa/equal_test.go /src/goroot/src/crypto/ecdsa/example_test.go /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/ecdsa/testdata /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_ecdsa/' /src/goroot/src/fuzz_ng_crypto_ecdsa/ecdsa.go /src/goroot/src/fuzz_ng_crypto_ecdsa/ecdsa_legacy.go /src/goroot/src/fuzz_ng_crypto_ecdsa/ecdsa_noasm.go /src/goroot/src/fuzz_ng_crypto_ecdsa/ecdsa_s390x_test.go /src/goroot/src/fuzz_ng_crypto_ecdsa/ecdsa_test.go /src/goroot/src/fuzz_ng_crypto_ecdsa/equal_test.go /src/goroot/src/fuzz_ng_crypto_ecdsa/example_test.go /src/goroot/src/fuzz_ng_crypto_ecdsa/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_ecdsa/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_ecdsa/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_ecdsa/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_ecdsa/notboring.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_ecdsa/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_ecdsa/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_ecdsa /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 	ecdsa.go:29:2: use of internal package crypto/internal/bigmod not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_ecdsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_ecdsa_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/ecdsa/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/ecdsa/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/aes/aes_gcm.go /src/goroot/src/crypto/aes/aes_test.go /src/goroot/src/crypto/aes/block.go /src/goroot/src/crypto/aes/cbc_ppc64x.go /src/goroot/src/crypto/aes/cbc_s390x.go /src/goroot/src/crypto/aes/cipher.go /src/goroot/src/crypto/aes/cipher_asm.go /src/goroot/src/crypto/aes/cipher_generic.go /src/goroot/src/crypto/aes/cipher_s390x.go /src/goroot/src/crypto/aes/const.go /src/goroot/src/crypto/aes/ctr_s390x.go /src/goroot/src/crypto/aes/gcm_ppc64x.go /src/goroot/src/crypto/aes/gcm_s390x.go /src/goroot/src/crypto/aes/modes.go /src/goroot/src/crypto/aes/modes_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 15 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_aes '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/aes fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:04 Found package in /src/goroot/src/crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:04 Type KeySizeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:04 Function Error has unproduced recv KeySizeError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_aes.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_aes.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/aes: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_aes/copy/aes_gcm.go fuzz_ng_crypto_aes/copy/block.go fuzz_ng_crypto_aes/copy/cipher.go fuzz_ng_crypto_aes/copy/cipher_asm.go fuzz_ng_crypto_aes/copy/const.go fuzz_ng_crypto_aes/copy/modes.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_aes/copy/aes_gcm.go fuzz_ng_crypto_aes/copy/block.go fuzz_ng_crypto_aes/copy/cipher.go fuzz_ng_crypto_aes/copy/cipher_asm.go fuzz_ng_crypto_aes/copy/const.go fuzz_ng_crypto_aes/copy/modes.go /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_aes/fuzz_ng.go fuzz_ng_crypto_aes/fuzzng_unsure_test.go fuzz_ng_crypto_aes/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/aes/aes_test.go /src/goroot/src/crypto/aes/modes_test.go /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/aes/testdata /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/aes/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_aes/' /src/goroot/src/fuzz_ng_crypto_aes/aes_gcm.go /src/goroot/src/fuzz_ng_crypto_aes/aes_test.go /src/goroot/src/fuzz_ng_crypto_aes/block.go /src/goroot/src/fuzz_ng_crypto_aes/cipher.go /src/goroot/src/fuzz_ng_crypto_aes/cipher_asm.go /src/goroot/src/fuzz_ng_crypto_aes/const.go /src/goroot/src/fuzz_ng_crypto_aes/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_aes/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_aes/modes.go /src/goroot/src/fuzz_ng_crypto_aes/modes_test.go /src/goroot/src/fuzz_ng_crypto_aes/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_aes/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_aes/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_aes/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_aes /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": 	aes_gcm.go:11:2: use of internal package crypto/internal/alias not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_aes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_aes_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/tls/alert.go /src/goroot/src/crypto/tls/auth.go /src/goroot/src/crypto/tls/auth_test.go /src/goroot/src/crypto/tls/boring.go /src/goroot/src/crypto/tls/boring_test.go /src/goroot/src/crypto/tls/cache.go /src/goroot/src/crypto/tls/cache_test.go /src/goroot/src/crypto/tls/cipher_suites.go /src/goroot/src/crypto/tls/common.go /src/goroot/src/crypto/tls/common_string.go /src/goroot/src/crypto/tls/conn.go /src/goroot/src/crypto/tls/conn_test.go /src/goroot/src/crypto/tls/example_test.go /src/goroot/src/crypto/tls/generate_cert.go /src/goroot/src/crypto/tls/handshake_client.go /src/goroot/src/crypto/tls/handshake_client_test.go /src/goroot/src/crypto/tls/handshake_client_tls13.go /src/goroot/src/crypto/tls/handshake_messages.go /src/goroot/src/crypto/tls/handshake_messages_test.go /src/goroot/src/crypto/tls/handshake_server.go /src/goroot/src/crypto/tls/handshake_server_test.go /src/goroot/src/crypto/tls/handshake_server_tls13.go /src/goroot/src/crypto/tls/handshake_test.go /src/goroot/src/crypto/tls/handshake_unix_test.go /src/goroot/src/crypto/tls/key_agreement.go /src/goroot/src/crypto/tls/key_schedule.go /src/goroot/src/crypto/tls/key_schedule_test.go /src/goroot/src/crypto/tls/link_test.go /src/goroot/src/crypto/tls/notboring.go /src/goroot/src/crypto/tls/prf.go /src/goroot/src/crypto/tls/prf_test.go /src/goroot/src/crypto/tls/quic.go /src/goroot/src/crypto/tls/quic_test.go /src/goroot/src/crypto/tls/ticket.go /src/goroot/src/crypto/tls/ticket_test.go /src/goroot/src/crypto/tls/tls.go /src/goroot/src/crypto/tls/tls_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 37 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_tls '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/tls fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Found package in /src/goroot/src/crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for CipherSuite is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for CipherSuite is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Type AlertError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Type RecordHeaderError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Type CertificateVerificationError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Type QUICEncryptionLevel is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function Error has unproduced recv AlertError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function SetSessionTicketKeys has unproduced argument byte
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function Error has unproduced recv CertificateVerificationError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function Unwrap has unproduced recv CertificateVerificationError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function SetDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function SetReadDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function SetWriteDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function Error has unproduced recv RecordHeaderError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function HandshakeContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function String has unproduced recv QUICEncryptionLevel
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function QUICClient has unproduced argument QUICConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function QUICServer has unproduced argument QUICConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function Start has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function HandleData has unproduced argument QUICEncryptionLevel
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function SendSessionTicket has unproduced argument QUICSessionTicketOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function NewListener has unproduced argument net.Listener
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function DialWithDialer has unproduced argument net.Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function Dial has unproduced recv Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:10 Function DialContext has unproduced recv Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_tls.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_tls.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/tls: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_tls/copy/alert.go fuzz_ng_crypto_tls/copy/auth.go fuzz_ng_crypto_tls/copy/cache.go fuzz_ng_crypto_tls/copy/cipher_suites.go fuzz_ng_crypto_tls/copy/common.go fuzz_ng_crypto_tls/copy/common_string.go fuzz_ng_crypto_tls/copy/conn.go fuzz_ng_crypto_tls/copy/handshake_client.go fuzz_ng_crypto_tls/copy/handshake_client_tls13.go fuzz_ng_crypto_tls/copy/handshake_messages.go fuzz_ng_crypto_tls/copy/handshake_server.go fuzz_ng_crypto_tls/copy/handshake_server_tls13.go fuzz_ng_crypto_tls/copy/key_agreement.go fuzz_ng_crypto_tls/copy/key_schedule.go fuzz_ng_crypto_tls/copy/notboring.go fuzz_ng_crypto_tls/copy/prf.go fuzz_ng_crypto_tls/copy/quic.go fuzz_ng_crypto_tls/copy/ticket.go fuzz_ng_crypto_tls/copy/tls.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_tls/copy/alert.go fuzz_ng_crypto_tls/copy/auth.go fuzz_ng_crypto_tls/copy/cache.go fuzz_ng_crypto_tls/copy/cipher_suites.go fuzz_ng_crypto_tls/copy/common.go fuzz_ng_crypto_tls/copy/common_string.go fuzz_ng_crypto_tls/copy/conn.go fuzz_ng_crypto_tls/copy/handshake_client.go fuzz_ng_crypto_tls/copy/handshake_client_tls13.go fuzz_ng_crypto_tls/copy/handshake_messages.go fuzz_ng_crypto_tls/copy/handshake_server.go fuzz_ng_crypto_tls/copy/handshake_server_tls13.go fuzz_ng_crypto_tls/copy/key_agreement.go fuzz_ng_crypto_tls/copy/key_schedule.go fuzz_ng_crypto_tls/copy/notboring.go fuzz_ng_crypto_tls/copy/prf.go fuzz_ng_crypto_tls/copy/quic.go fuzz_ng_crypto_tls/copy/ticket.go fuzz_ng_crypto_tls/copy/tls.go /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_tls/fuzz_ng.go fuzz_ng_crypto_tls/fuzzng_unsure_test.go fuzz_ng_crypto_tls/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/tls/auth_test.go /src/goroot/src/crypto/tls/boring_test.go /src/goroot/src/crypto/tls/cache_test.go /src/goroot/src/crypto/tls/conn_test.go /src/goroot/src/crypto/tls/example_test.go /src/goroot/src/crypto/tls/handshake_client_test.go /src/goroot/src/crypto/tls/handshake_messages_test.go /src/goroot/src/crypto/tls/handshake_server_test.go /src/goroot/src/crypto/tls/handshake_test.go /src/goroot/src/crypto/tls/handshake_unix_test.go /src/goroot/src/crypto/tls/key_schedule_test.go /src/goroot/src/crypto/tls/link_test.go /src/goroot/src/crypto/tls/prf_test.go /src/goroot/src/crypto/tls/quic_test.go /src/goroot/src/crypto/tls/ticket_test.go /src/goroot/src/crypto/tls/tls_test.go /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/tls/testdata /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_tls/' /src/goroot/src/fuzz_ng_crypto_tls/alert.go /src/goroot/src/fuzz_ng_crypto_tls/auth.go /src/goroot/src/fuzz_ng_crypto_tls/auth_test.go /src/goroot/src/fuzz_ng_crypto_tls/boring_test.go /src/goroot/src/fuzz_ng_crypto_tls/cache.go /src/goroot/src/fuzz_ng_crypto_tls/cache_test.go /src/goroot/src/fuzz_ng_crypto_tls/cipher_suites.go /src/goroot/src/fuzz_ng_crypto_tls/common.go /src/goroot/src/fuzz_ng_crypto_tls/common_string.go /src/goroot/src/fuzz_ng_crypto_tls/conn.go /src/goroot/src/fuzz_ng_crypto_tls/conn_test.go /src/goroot/src/fuzz_ng_crypto_tls/example_test.go /src/goroot/src/fuzz_ng_crypto_tls/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_tls/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_client.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_client_test.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_client_tls13.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_messages.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_messages_test.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_server.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_server_test.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_server_tls13.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_test.go /src/goroot/src/fuzz_ng_crypto_tls/handshake_unix_test.go /src/goroot/src/fuzz_ng_crypto_tls/key_agreement.go /src/goroot/src/fuzz_ng_crypto_tls/key_schedule.go /src/goroot/src/fuzz_ng_crypto_tls/key_schedule_test.go /src/goroot/src/fuzz_ng_crypto_tls/link_test.go /src/goroot/src/fuzz_ng_crypto_tls/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_tls/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_tls/notboring.go /src/goroot/src/fuzz_ng_crypto_tls/prf.go /src/goroot/src/fuzz_ng_crypto_tls/prf_test.go /src/goroot/src/fuzz_ng_crypto_tls/quic.go /src/goroot/src/fuzz_ng_crypto_tls/quic_test.go /src/goroot/src/fuzz_ng_crypto_tls/ticket.go /src/goroot/src/fuzz_ng_crypto_tls/ticket_test.go /src/goroot/src/fuzz_ng_crypto_tls/tls.go /src/goroot/src/fuzz_ng_crypto_tls/tls_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_tls/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_tls/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_tls /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": 	cipher_suites.go:13:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_tls/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_tls_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/tls/fipsonly/fipsonly.go /src/goroot/src/crypto/tls/fipsonly/fipsonly_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_tls_fipsonly '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/tls/fipsonly fuzz_ng_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:19 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:19 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_tls_fipsonly.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_tls_fipsonly.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_crypto_tls_fipsonly: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_crypto_tls_fipsonly: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/tls/fipsonly: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package crypto/tls/fipsonly: build constraints exclude all Go files in /src/goroot/src/crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_crypto_tls_fipsonly/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_crypto_tls_fipsonly/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_crypto_tls_fipsonly/copy/*.go' /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_crypto_tls_fipsonly/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_crypto_tls_fipsonly/*.go' /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_crypto_tls_fipsonly/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/tls/fipsonly/fipsonly_test.go /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/tls/fipsonly/testdata /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/tls/fipsonly/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_tls_fipsonly/' /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/fipsonly_test.go /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_tls_fipsonly/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_tls_fipsonly/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_tls_fipsonly /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto_tls_fipsonly [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_tls_fipsonly/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_tls_fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_crypto_tls_fipsonly: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_tls_fipsonly_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/tls/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/tls/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/rc4/rc4.go /src/goroot/src/crypto/rc4/rc4_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_rc4 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/rc4 fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:21 Found package in /src/goroot/src/crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:21 Type KeySizeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:21 Function Error has unproduced recv KeySizeError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_rc4.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_rc4.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/rc4: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_rc4/copy/rc4.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_rc4/copy/rc4.go /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_rc4/fuzz_ng.go fuzz_ng_crypto_rc4/fuzzng_unsure_test.go fuzz_ng_crypto_rc4/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/rc4/rc4_test.go /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/rc4/testdata /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/rc4/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_rc4/' /src/goroot/src/fuzz_ng_crypto_rc4/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_rc4/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_rc4/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_rc4/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_rc4/rc4.go /src/goroot/src/fuzz_ng_crypto_rc4/rc4_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_rc4/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_rc4/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_rc4 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": 	rc4.go:13:2: use of internal package crypto/internal/alias not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_rc4/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_rc4_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/sha1/example_test.go /src/goroot/src/crypto/sha1/fallback_test.go /src/goroot/src/crypto/sha1/issue15617_test.go /src/goroot/src/crypto/sha1/sha1.go /src/goroot/src/crypto/sha1/sha1_test.go /src/goroot/src/crypto/sha1/sha1block.go /src/goroot/src/crypto/sha1/sha1block_amd64.go /src/goroot/src/crypto/sha1/sha1block_arm64.go /src/goroot/src/crypto/sha1/sha1block_decl.go /src/goroot/src/crypto/sha1/sha1block_generic.go /src/goroot/src/crypto/sha1/sha1block_s390x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_sha1 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/sha1 fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:27 Found package in /src/goroot/src/crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:27 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_sha1.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_sha1.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/sha1: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_sha1/copy/sha1.go fuzz_ng_crypto_sha1/copy/sha1block.go fuzz_ng_crypto_sha1/copy/sha1block_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_sha1/copy/sha1.go fuzz_ng_crypto_sha1/copy/sha1block.go fuzz_ng_crypto_sha1/copy/sha1block_amd64.go /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_sha1/fuzz_ng.go fuzz_ng_crypto_sha1/fuzzng_unsure_test.go fuzz_ng_crypto_sha1/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/sha1/example_test.go /src/goroot/src/crypto/sha1/fallback_test.go /src/goroot/src/crypto/sha1/issue15617_test.go /src/goroot/src/crypto/sha1/sha1_test.go /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/sha1/testdata /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/sha1/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_sha1/' /src/goroot/src/fuzz_ng_crypto_sha1/example_test.go /src/goroot/src/fuzz_ng_crypto_sha1/fallback_test.go /src/goroot/src/fuzz_ng_crypto_sha1/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_sha1/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_sha1/issue15617_test.go /src/goroot/src/fuzz_ng_crypto_sha1/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_sha1/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_sha1/sha1.go /src/goroot/src/fuzz_ng_crypto_sha1/sha1_test.go /src/goroot/src/fuzz_ng_crypto_sha1/sha1block.go /src/goroot/src/fuzz_ng_crypto_sha1/sha1block_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_sha1/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_sha1/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_sha1 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": 	sha1.go:13:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_sha1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_sha1_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/sha512/fallback_test.go /src/goroot/src/crypto/sha512/sha512.go /src/goroot/src/crypto/sha512/sha512_test.go /src/goroot/src/crypto/sha512/sha512block.go /src/goroot/src/crypto/sha512/sha512block_amd64.go /src/goroot/src/crypto/sha512/sha512block_arm64.go /src/goroot/src/crypto/sha512/sha512block_decl.go /src/goroot/src/crypto/sha512/sha512block_generic.go /src/goroot/src/crypto/sha512/sha512block_s390x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_sha512 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/sha512 fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:33 Found package in /src/goroot/src/crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:33 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:33 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:33 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:33 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_sha512.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_sha512.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/sha512: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_sha512/copy/sha512.go fuzz_ng_crypto_sha512/copy/sha512block.go fuzz_ng_crypto_sha512/copy/sha512block_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_sha512/copy/sha512.go fuzz_ng_crypto_sha512/copy/sha512block.go fuzz_ng_crypto_sha512/copy/sha512block_amd64.go /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_sha512/fuzz_ng.go fuzz_ng_crypto_sha512/fuzzng_unsure_test.go fuzz_ng_crypto_sha512/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/sha512/fallback_test.go /src/goroot/src/crypto/sha512/sha512_test.go /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/sha512/testdata /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/sha512/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_sha512/' /src/goroot/src/fuzz_ng_crypto_sha512/fallback_test.go /src/goroot/src/fuzz_ng_crypto_sha512/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_sha512/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_sha512/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_sha512/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_sha512/sha512.go /src/goroot/src/fuzz_ng_crypto_sha512/sha512_test.go /src/goroot/src/fuzz_ng_crypto_sha512/sha512block.go /src/goroot/src/fuzz_ng_crypto_sha512/sha512block_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_sha512/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_sha512/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_sha512 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": 	sha512.go:15:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_sha512/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_sha512_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/subtle/constant_time.go /src/goroot/src/crypto/subtle/constant_time_test.go /src/goroot/src/crypto/subtle/xor.go /src/goroot/src/crypto/subtle/xor_amd64.go /src/goroot/src/crypto/subtle/xor_arm64.go /src/goroot/src/crypto/subtle/xor_generic.go /src/goroot/src/crypto/subtle/xor_ppc64x.go /src/goroot/src/crypto/subtle/xor_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_subtle '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/subtle fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:39 Found package in /src/goroot/src/crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_subtle.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_subtle.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/subtle: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_subtle/copy/constant_time.go fuzz_ng_crypto_subtle/copy/xor.go fuzz_ng_crypto_subtle/copy/xor_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_subtle/copy/constant_time.go fuzz_ng_crypto_subtle/copy/xor.go fuzz_ng_crypto_subtle/copy/xor_amd64.go /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_subtle/fuzz_ng.go fuzz_ng_crypto_subtle/fuzzng_unsure_test.go fuzz_ng_crypto_subtle/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/subtle/constant_time_test.go /src/goroot/src/crypto/subtle/xor_test.go /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/subtle/testdata /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/subtle/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_subtle/' /src/goroot/src/fuzz_ng_crypto_subtle/constant_time.go /src/goroot/src/fuzz_ng_crypto_subtle/constant_time_test.go /src/goroot/src/fuzz_ng_crypto_subtle/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_subtle/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_subtle/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_subtle/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_subtle/xor.go /src/goroot/src/fuzz_ng_crypto_subtle/xor_amd64.go /src/goroot/src/fuzz_ng_crypto_subtle/xor_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_subtle/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_subtle/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_subtle /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto_subtle [fuzz_ng_crypto_subtle.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./constant_time.go:13:6: ConstantTimeCompare already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/constant_time.go:13:6: other declaration of ConstantTimeCompare
Step #3 - "compile-libfuzzer-coverage-x86_64": ./constant_time.go:29:6: ConstantTimeSelect already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/constant_time.go:29:6: other declaration of ConstantTimeSelect
Step #3 - "compile-libfuzzer-coverage-x86_64": ./constant_time.go:32:6: ConstantTimeByteEq already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/constant_time.go:32:6: other declaration of ConstantTimeByteEq
Step #3 - "compile-libfuzzer-coverage-x86_64": ./constant_time.go:37:6: ConstantTimeEq already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/constant_time.go:37:6: other declaration of ConstantTimeEq
Step #3 - "compile-libfuzzer-coverage-x86_64": ./constant_time.go:44:6: ConstantTimeCopy already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/constant_time.go:44:6: other declaration of ConstantTimeCopy
Step #3 - "compile-libfuzzer-coverage-x86_64": ./constant_time.go:58:6: ConstantTimeLessOrEq already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/constant_time.go:58:6: other declaration of ConstantTimeLessOrEq
Step #3 - "compile-libfuzzer-coverage-x86_64": ./xor.go:11:6: XORBytes already declared through dot-import of package subtle ("crypto/subtle")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/crypto/subtle/xor.go:11:6: other declaration of XORBytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto_subtle [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_subtle/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_subtle_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/sha256/example_test.go /src/goroot/src/crypto/sha256/fallback_test.go /src/goroot/src/crypto/sha256/sha256.go /src/goroot/src/crypto/sha256/sha256_test.go /src/goroot/src/crypto/sha256/sha256block.go /src/goroot/src/crypto/sha256/sha256block_amd64.go /src/goroot/src/crypto/sha256/sha256block_arm64.go /src/goroot/src/crypto/sha256/sha256block_decl.go /src/goroot/src/crypto/sha256/sha256block_generic.go /src/goroot/src/crypto/sha256/sha256block_s390x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_sha256 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/sha256 fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:45 Found package in /src/goroot/src/crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:45 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:45 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_sha256.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_sha256.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/sha256: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_sha256/copy/sha256.go fuzz_ng_crypto_sha256/copy/sha256block.go fuzz_ng_crypto_sha256/copy/sha256block_amd64.go fuzz_ng_crypto_sha256/copy/sha256block_decl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_sha256/copy/sha256.go fuzz_ng_crypto_sha256/copy/sha256block.go fuzz_ng_crypto_sha256/copy/sha256block_amd64.go fuzz_ng_crypto_sha256/copy/sha256block_decl.go /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_sha256/fuzz_ng.go fuzz_ng_crypto_sha256/fuzzng_unsure_test.go fuzz_ng_crypto_sha256/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/sha256/example_test.go /src/goroot/src/crypto/sha256/fallback_test.go /src/goroot/src/crypto/sha256/sha256_test.go /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/sha256/testdata /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/sha256/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_sha256/' /src/goroot/src/fuzz_ng_crypto_sha256/example_test.go /src/goroot/src/fuzz_ng_crypto_sha256/fallback_test.go /src/goroot/src/fuzz_ng_crypto_sha256/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_sha256/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_sha256/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_sha256/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_sha256/sha256.go /src/goroot/src/fuzz_ng_crypto_sha256/sha256_test.go /src/goroot/src/fuzz_ng_crypto_sha256/sha256block.go /src/goroot/src/fuzz_ng_crypto_sha256/sha256block_amd64.go /src/goroot/src/fuzz_ng_crypto_sha256/sha256block_decl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_sha256/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_sha256/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_sha256 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": 	sha256.go:11:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_sha256/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_sha256_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/cipher/benchmark_test.go /src/goroot/src/crypto/cipher/cbc.go /src/goroot/src/crypto/cipher/cbc_aes_test.go /src/goroot/src/crypto/cipher/cfb.go /src/goroot/src/crypto/cipher/cfb_test.go /src/goroot/src/crypto/cipher/cipher.go /src/goroot/src/crypto/cipher/cipher_test.go /src/goroot/src/crypto/cipher/common_test.go /src/goroot/src/crypto/cipher/ctr.go /src/goroot/src/crypto/cipher/ctr_aes_test.go /src/goroot/src/crypto/cipher/ctr_test.go /src/goroot/src/crypto/cipher/example_test.go /src/goroot/src/crypto/cipher/export_test.go /src/goroot/src/crypto/cipher/fuzz_test.go /src/goroot/src/crypto/cipher/gcm.go /src/goroot/src/crypto/cipher/gcm_test.go /src/goroot/src/crypto/cipher/io.go /src/goroot/src/crypto/cipher/ofb.go /src/goroot/src/crypto/cipher/ofb_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 19 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_cipher '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude StreamReader'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude StreamReader crypto/cipher fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Found package in /src/goroot/src/crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Type Block is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewCBCEncrypter has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewCBCDecrypter has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewCFBEncrypter has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewCFBDecrypter has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewCTR has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewGCM has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewGCMWithNonceSize has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewGCMWithTagSize has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function Read has unproduced recv StreamReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function Write has unproduced recv StreamWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function Close has unproduced recv StreamWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:51 Function NewOFB has unproduced argument Block
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_cipher.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_cipher.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/cipher: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_cipher [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_cipher.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "crypto/cipher" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_cipher/copy/cbc.go fuzz_ng_crypto_cipher/copy/cfb.go fuzz_ng_crypto_cipher/copy/cipher.go fuzz_ng_crypto_cipher/copy/ctr.go fuzz_ng_crypto_cipher/copy/gcm.go fuzz_ng_crypto_cipher/copy/io.go fuzz_ng_crypto_cipher/copy/ofb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_cipher/copy/cbc.go fuzz_ng_crypto_cipher/copy/cfb.go fuzz_ng_crypto_cipher/copy/cipher.go fuzz_ng_crypto_cipher/copy/ctr.go fuzz_ng_crypto_cipher/copy/gcm.go fuzz_ng_crypto_cipher/copy/io.go fuzz_ng_crypto_cipher/copy/ofb.go /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_cipher/fuzz_ng.go fuzz_ng_crypto_cipher/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/cipher/benchmark_test.go /src/goroot/src/crypto/cipher/cbc_aes_test.go /src/goroot/src/crypto/cipher/cfb_test.go /src/goroot/src/crypto/cipher/cipher_test.go /src/goroot/src/crypto/cipher/common_test.go /src/goroot/src/crypto/cipher/ctr_aes_test.go /src/goroot/src/crypto/cipher/ctr_test.go /src/goroot/src/crypto/cipher/example_test.go /src/goroot/src/crypto/cipher/export_test.go /src/goroot/src/crypto/cipher/fuzz_test.go /src/goroot/src/crypto/cipher/gcm_test.go /src/goroot/src/crypto/cipher/ofb_test.go /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/cipher/testdata /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/cipher/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_cipher/' /src/goroot/src/fuzz_ng_crypto_cipher/benchmark_test.go /src/goroot/src/fuzz_ng_crypto_cipher/cbc.go /src/goroot/src/fuzz_ng_crypto_cipher/cbc_aes_test.go /src/goroot/src/fuzz_ng_crypto_cipher/cfb.go /src/goroot/src/fuzz_ng_crypto_cipher/cfb_test.go /src/goroot/src/fuzz_ng_crypto_cipher/cipher.go /src/goroot/src/fuzz_ng_crypto_cipher/cipher_test.go /src/goroot/src/fuzz_ng_crypto_cipher/common_test.go /src/goroot/src/fuzz_ng_crypto_cipher/ctr.go /src/goroot/src/fuzz_ng_crypto_cipher/ctr_aes_test.go /src/goroot/src/fuzz_ng_crypto_cipher/ctr_test.go /src/goroot/src/fuzz_ng_crypto_cipher/example_test.go /src/goroot/src/fuzz_ng_crypto_cipher/export_test.go /src/goroot/src/fuzz_ng_crypto_cipher/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_cipher/fuzz_test.go /src/goroot/src/fuzz_ng_crypto_cipher/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_cipher/gcm.go /src/goroot/src/fuzz_ng_crypto_cipher/gcm_test.go /src/goroot/src/fuzz_ng_crypto_cipher/io.go /src/goroot/src/fuzz_ng_crypto_cipher/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_cipher/ofb.go /src/goroot/src/fuzz_ng_crypto_cipher/ofb_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_cipher/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_cipher/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_cipher /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": 	cbc.go:16:2: use of internal package crypto/internal/alias not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_cipher/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_cipher_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/boring/aes.go /src/goroot/src/crypto/internal/boring/boring.go /src/goroot/src/crypto/internal/boring/boring_test.go /src/goroot/src/crypto/internal/boring/doc.go /src/goroot/src/crypto/internal/boring/ecdh.go /src/goroot/src/crypto/internal/boring/ecdsa.go /src/goroot/src/crypto/internal/boring/hmac.go /src/goroot/src/crypto/internal/boring/notboring.go /src/goroot/src/crypto/internal/boring/rand.go /src/goroot/src/crypto/internal/boring/rsa.go /src/goroot/src/crypto/internal/boring/sha.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/boring/fipstls/tls.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/boring/fipstls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/boring/bbig/big.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/boring/bbig
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/boring/sig/sig.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/boring/sig
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/boring/syso/syso.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/boring/syso
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/boring/bcache/cache.go /src/goroot/src/crypto/internal/boring/bcache/cache_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/boring/bcache
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/alias/alias.go /src/goroot/src/crypto/internal/alias/alias_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/alias
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/nistec/generate.go /src/goroot/src/crypto/internal/nistec/nistec.go /src/goroot/src/crypto/internal/nistec/nistec_test.go /src/goroot/src/crypto/internal/nistec/p224.go /src/goroot/src/crypto/internal/nistec/p224_sqrt.go /src/goroot/src/crypto/internal/nistec/p256.go /src/goroot/src/crypto/internal/nistec/p256_asm.go /src/goroot/src/crypto/internal/nistec/p256_asm_table_test.go /src/goroot/src/crypto/internal/nistec/p256_ordinv.go /src/goroot/src/crypto/internal/nistec/p256_ordinv_noasm.go /src/goroot/src/crypto/internal/nistec/p256_ordinv_test.go /src/goroot/src/crypto/internal/nistec/p384.go /src/goroot/src/crypto/internal/nistec/p521.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/nistec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/nistec/fiat/fiat_test.go /src/goroot/src/crypto/internal/nistec/fiat/generate.go /src/goroot/src/crypto/internal/nistec/fiat/p224.go /src/goroot/src/crypto/internal/nistec/fiat/p224_fiat64.go /src/goroot/src/crypto/internal/nistec/fiat/p224_invert.go /src/goroot/src/crypto/internal/nistec/fiat/p256.go /src/goroot/src/crypto/internal/nistec/fiat/p256_fiat64.go /src/goroot/src/crypto/internal/nistec/fiat/p256_invert.go /src/goroot/src/crypto/internal/nistec/fiat/p384.go /src/goroot/src/crypto/internal/nistec/fiat/p384_fiat64.go /src/goroot/src/crypto/internal/nistec/fiat/p384_invert.go /src/goroot/src/crypto/internal/nistec/fiat/p521.go /src/goroot/src/crypto/internal/nistec/fiat/p521_fiat64.go /src/goroot/src/crypto/internal/nistec/fiat/p521_invert.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/nistec/fiat
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/edwards25519/doc.go /src/goroot/src/crypto/internal/edwards25519/edwards25519.go /src/goroot/src/crypto/internal/edwards25519/edwards25519_test.go /src/goroot/src/crypto/internal/edwards25519/scalar.go /src/goroot/src/crypto/internal/edwards25519/scalar_alias_test.go /src/goroot/src/crypto/internal/edwards25519/scalar_fiat.go /src/goroot/src/crypto/internal/edwards25519/scalar_test.go /src/goroot/src/crypto/internal/edwards25519/scalarmult.go /src/goroot/src/crypto/internal/edwards25519/scalarmult_test.go /src/goroot/src/crypto/internal/edwards25519/tables.go /src/goroot/src/crypto/internal/edwards25519/tables_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/edwards25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/edwards25519/field/fe.go /src/goroot/src/crypto/internal/edwards25519/field/fe_alias_test.go /src/goroot/src/crypto/internal/edwards25519/field/fe_amd64.go /src/goroot/src/crypto/internal/edwards25519/field/fe_amd64_noasm.go /src/goroot/src/crypto/internal/edwards25519/field/fe_arm64.go /src/goroot/src/crypto/internal/edwards25519/field/fe_arm64_noasm.go /src/goroot/src/crypto/internal/edwards25519/field/fe_bench_test.go /src/goroot/src/crypto/internal/edwards25519/field/fe_generic.go /src/goroot/src/crypto/internal/edwards25519/field/fe_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/edwards25519/field
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/edwards25519/field/_asm/fe_amd64_asm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/edwards25519/field/_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/bigmod/nat.go /src/goroot/src/crypto/internal/bigmod/nat_asm.go /src/goroot/src/crypto/internal/bigmod/nat_noasm.go /src/goroot/src/crypto/internal/bigmod/nat_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/bigmod
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/bigmod/_asm/nat_amd64_asm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/bigmod/_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/internal/randutil/randutil.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/internal/randutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/des/block.go /src/goroot/src/crypto/des/cipher.go /src/goroot/src/crypto/des/const.go /src/goroot/src/crypto/des/des_test.go /src/goroot/src/crypto/des/example_test.go /src/goroot/src/crypto/des/internal_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_des '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/des fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:54 Found package in /src/goroot/src/crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:54 Type KeySizeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:10:54 Function Error has unproduced recv KeySizeError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_des.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_des.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/des: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_des/copy/block.go fuzz_ng_crypto_des/copy/cipher.go fuzz_ng_crypto_des/copy/const.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_des/copy/block.go fuzz_ng_crypto_des/copy/cipher.go fuzz_ng_crypto_des/copy/const.go /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_des/fuzz_ng.go fuzz_ng_crypto_des/fuzzng_unsure_test.go fuzz_ng_crypto_des/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/des/des_test.go /src/goroot/src/crypto/des/example_test.go /src/goroot/src/crypto/des/internal_test.go /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/des/testdata /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/des/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_des/' /src/goroot/src/fuzz_ng_crypto_des/block.go /src/goroot/src/fuzz_ng_crypto_des/cipher.go /src/goroot/src/fuzz_ng_crypto_des/const.go /src/goroot/src/fuzz_ng_crypto_des/des_test.go /src/goroot/src/fuzz_ng_crypto_des/example_test.go /src/goroot/src/fuzz_ng_crypto_des/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_des/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_des/internal_test.go /src/goroot/src/fuzz_ng_crypto_des/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_des/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_des/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_des/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_des /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": 	cipher.go:9:2: use of internal package crypto/internal/alias not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_des/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_des
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_des_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/md5/example_test.go /src/goroot/src/crypto/md5/gen.go /src/goroot/src/crypto/md5/md5.go /src/goroot/src/crypto/md5/md5_test.go /src/goroot/src/crypto/md5/md5block.go /src/goroot/src/crypto/md5/md5block_decl.go /src/goroot/src/crypto/md5/md5block_generic.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_md5 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/md5 fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:00 Found package in /src/goroot/src/crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:00 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_md5.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_md5.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/md5: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_md5/copy/md5.go fuzz_ng_crypto_md5/copy/md5block.go fuzz_ng_crypto_md5/copy/md5block_decl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_md5/copy/md5.go fuzz_ng_crypto_md5/copy/md5block.go fuzz_ng_crypto_md5/copy/md5block_decl.go /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_md5/fuzz_ng.go fuzz_ng_crypto_md5/fuzzng_unsure_test.go fuzz_ng_crypto_md5/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/md5/example_test.go /src/goroot/src/crypto/md5/md5_test.go /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/md5/testdata /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/md5/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_md5/' /src/goroot/src/fuzz_ng_crypto_md5/example_test.go /src/goroot/src/fuzz_ng_crypto_md5/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_md5/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_md5/md5.go /src/goroot/src/fuzz_ng_crypto_md5/md5_test.go /src/goroot/src/fuzz_ng_crypto_md5/md5block.go /src/goroot/src/fuzz_ng_crypto_md5/md5block_decl.go /src/goroot/src/fuzz_ng_crypto_md5/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_md5/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_md5/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_md5/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_md5 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_crypto_md5 [fuzz_ng_crypto_md5.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_crypto_md5 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_md5/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_md5_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/elliptic/elliptic.go /src/goroot/src/crypto/elliptic/elliptic_test.go /src/goroot/src/crypto/elliptic/nistec.go /src/goroot/src/crypto/elliptic/nistec_p256.go /src/goroot/src/crypto/elliptic/p224_test.go /src/goroot/src/crypto/elliptic/p256_test.go /src/goroot/src/crypto/elliptic/params.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_elliptic '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/elliptic fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Found package in /src/goroot/src/crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function Params has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0001d11c0)}, Type:(*ast.StarExpr)(0xc0002f8f18), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function IsOnCurve has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0001d12e0)}, Type:(*ast.StarExpr)(0xc0002f8f78), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function Add has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000300960)}, Type:(*ast.StarExpr)(0xc0002f9560), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function Double has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000300f80)}, Type:(*ast.StarExpr)(0xc0002f96b0), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function ScalarMult has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000301960)}, Type:(*ast.StarExpr)(0xc0002f9950), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function ScalarBaseMult has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000301f60)}, Type:(*ast.StarExpr)(0xc0002f9aa0), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function CombinedMult has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0003043c0)}, Type:(*ast.StarExpr)(0xc0002f9c08), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function Unmarshal has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000304c40)}, Type:(*ast.StarExpr)(0xc0002f9d88), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:06 Function UnmarshalCompressed has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000305440)}, Type:(*ast.StarExpr)(0xc0002f9f68), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_elliptic.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_elliptic.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/elliptic: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_elliptic/copy/elliptic.go fuzz_ng_crypto_elliptic/copy/nistec.go fuzz_ng_crypto_elliptic/copy/nistec_p256.go fuzz_ng_crypto_elliptic/copy/params.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_elliptic/copy/elliptic.go fuzz_ng_crypto_elliptic/copy/nistec.go fuzz_ng_crypto_elliptic/copy/nistec_p256.go fuzz_ng_crypto_elliptic/copy/params.go /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_elliptic/fuzz_ng.go fuzz_ng_crypto_elliptic/fuzzng_unsure_test.go fuzz_ng_crypto_elliptic/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/elliptic/elliptic_test.go /src/goroot/src/crypto/elliptic/p224_test.go /src/goroot/src/crypto/elliptic/p256_test.go /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/elliptic/testdata /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/elliptic/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_elliptic/' /src/goroot/src/fuzz_ng_crypto_elliptic/elliptic.go /src/goroot/src/fuzz_ng_crypto_elliptic/elliptic_test.go /src/goroot/src/fuzz_ng_crypto_elliptic/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_elliptic/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_elliptic/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_elliptic/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_elliptic/nistec.go /src/goroot/src/fuzz_ng_crypto_elliptic/nistec_p256.go /src/goroot/src/fuzz_ng_crypto_elliptic/p224_test.go /src/goroot/src/fuzz_ng_crypto_elliptic/p256_test.go /src/goroot/src/fuzz_ng_crypto_elliptic/params.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_elliptic/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_elliptic/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_elliptic /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": 	nistec.go:8:2: use of internal package crypto/internal/nistec not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_elliptic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_elliptic_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/rsa/boring.go /src/goroot/src/crypto/rsa/boring_test.go /src/goroot/src/crypto/rsa/equal_test.go /src/goroot/src/crypto/rsa/example_test.go /src/goroot/src/crypto/rsa/notboring.go /src/goroot/src/crypto/rsa/pkcs1v15.go /src/goroot/src/crypto/rsa/pkcs1v15_test.go /src/goroot/src/crypto/rsa/pss.go /src/goroot/src/crypto/rsa/pss_test.go /src/goroot/src/crypto/rsa/rsa.go /src/goroot/src/crypto/rsa/rsa_export_test.go /src/goroot/src/crypto/rsa/rsa_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_rsa '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits Prime.nprimes,GenerateMultiPrimeKey.nprimes,GenerateMultiPrimeKey.bits,GenerateKey.bits'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits Prime.nprimes,GenerateMultiPrimeKey.nprimes,GenerateMultiPrimeKey.bits,GenerateKey.bits crypto/rsa fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Found package in /src/goroot/src/crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function EncryptPKCS1v15 has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function SignPKCS1v15 has unproduced argument crypto.Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function VerifyPKCS1v15 has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function VerifyPKCS1v15 has unproduced argument crypto.Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function HashFunc has unproduced recv PSSOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function SignPSS has unproduced argument crypto.Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function SignPSS has unproduced argument PSSOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function VerifyPSS has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function VerifyPSS has unproduced argument crypto.Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function VerifyPSS has unproduced argument PSSOptions
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function Equal has unproduced argument crypto.PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function Equal has unproduced argument crypto.PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function Sign has unproduced argument crypto.SignerOpts
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function Decrypt has unproduced argument crypto.DecrypterOpts
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function EncryptOAEP has unproduced argument hash.Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function EncryptOAEP has unproduced argument PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:13 Function DecryptOAEP has unproduced argument hash.Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_rsa.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_rsa.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/rsa: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_rsa/copy/notboring.go fuzz_ng_crypto_rsa/copy/pkcs1v15.go fuzz_ng_crypto_rsa/copy/pss.go fuzz_ng_crypto_rsa/copy/rsa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_rsa/copy/notboring.go fuzz_ng_crypto_rsa/copy/pkcs1v15.go fuzz_ng_crypto_rsa/copy/pss.go fuzz_ng_crypto_rsa/copy/rsa.go /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_rsa/fuzz_ng.go fuzz_ng_crypto_rsa/fuzzng_unsure_test.go fuzz_ng_crypto_rsa/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/rsa/boring_test.go /src/goroot/src/crypto/rsa/equal_test.go /src/goroot/src/crypto/rsa/example_test.go /src/goroot/src/crypto/rsa/pkcs1v15_test.go /src/goroot/src/crypto/rsa/pss_test.go /src/goroot/src/crypto/rsa/rsa_export_test.go /src/goroot/src/crypto/rsa/rsa_test.go /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/rsa/testdata /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_rsa/' /src/goroot/src/fuzz_ng_crypto_rsa/boring_test.go /src/goroot/src/fuzz_ng_crypto_rsa/equal_test.go /src/goroot/src/fuzz_ng_crypto_rsa/example_test.go /src/goroot/src/fuzz_ng_crypto_rsa/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_rsa/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_rsa/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_rsa/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_rsa/notboring.go /src/goroot/src/fuzz_ng_crypto_rsa/pkcs1v15.go /src/goroot/src/fuzz_ng_crypto_rsa/pkcs1v15_test.go /src/goroot/src/fuzz_ng_crypto_rsa/pss.go /src/goroot/src/fuzz_ng_crypto_rsa/pss_test.go /src/goroot/src/fuzz_ng_crypto_rsa/rsa.go /src/goroot/src/fuzz_ng_crypto_rsa/rsa_export_test.go /src/goroot/src/fuzz_ng_crypto_rsa/rsa_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_rsa/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_rsa/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_rsa /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": 	rsa.go:30:2: use of internal package crypto/internal/bigmod not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_rsa/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_rsa_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/rsa/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/rsa/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/ed25519/ed25519.go /src/goroot/src/crypto/ed25519/ed25519_test.go /src/goroot/src/crypto/ed25519/ed25519vectors_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_ed25519 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/ed25519 fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Found package in /src/goroot/src/crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Function Equal has unproduced argument crypto.PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Function Equal has unproduced argument crypto.PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Function Sign has unproduced argument crypto.SignerOpts
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Function HashFunc has unproduced recv Options
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:19 Function VerifyWithOptions has unproduced argument Options
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_ed25519.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_ed25519.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/ed25519: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_ed25519/copy/ed25519.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_ed25519/copy/ed25519.go /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_ed25519/fuzz_ng.go fuzz_ng_crypto_ed25519/fuzzng_unsure_test.go fuzz_ng_crypto_ed25519/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/ed25519/ed25519_test.go /src/goroot/src/crypto/ed25519/ed25519vectors_test.go /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/ed25519/testdata /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_ed25519/' /src/goroot/src/fuzz_ng_crypto_ed25519/ed25519.go /src/goroot/src/fuzz_ng_crypto_ed25519/ed25519_test.go /src/goroot/src/fuzz_ng_crypto_ed25519/ed25519vectors_test.go /src/goroot/src/fuzz_ng_crypto_ed25519/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_ed25519/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_ed25519/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_ed25519/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_ed25519/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_ed25519/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_ed25519 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": 	ed25519.go:18:2: use of internal package crypto/internal/edwards25519 not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_ed25519/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_ed25519_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/crypto/ed25519/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/crypto/ed25519/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/crypto/ecdh/ecdh.go /src/goroot/src/crypto/ecdh/ecdh_test.go /src/goroot/src/crypto/ecdh/nist.go /src/goroot/src/crypto/ecdh/x25519.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^crypto_ecdh '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing crypto/ecdh fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Found package in /src/goroot/src/crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Function Equal has unproduced argument crypto.PublicKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Function Equal has unproduced argument crypto.PrivateKey
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Function String has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0002146a0)}, Type:(*ast.StarExpr)(0xc00022a1b0), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Function GenerateKey has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000214840)}, Type:(*ast.StarExpr)(0xc00022a210), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Function NewPrivateKey has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000215380)}, Type:(*ast.StarExpr)(0xc00022a468), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:25 Function NewPublicKey has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc00024b3a0)}, Type:(*ast.StarExpr)(0xc00022a990), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/crypto_ecdh.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/crypto_ecdh.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module crypto/ecdh: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ecdh [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_crypto_ecdh.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:183:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:264:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_crypto_ecdh/copy/ecdh.go fuzz_ng_crypto_ecdh/copy/nist.go fuzz_ng_crypto_ecdh/copy/x25519.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_ecdh/copy/ecdh.go fuzz_ng_crypto_ecdh/copy/nist.go fuzz_ng_crypto_ecdh/copy/x25519.go /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_crypto_ecdh/fuzz_ng.go fuzz_ng_crypto_ecdh/fuzzng_unsure_test.go fuzz_ng_crypto_ecdh/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/crypto/ecdh/ecdh_test.go /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/crypto/ecdh/testdata /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/crypto/ecdh/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_crypto_ecdh/' /src/goroot/src/fuzz_ng_crypto_ecdh/ecdh.go /src/goroot/src/fuzz_ng_crypto_ecdh/ecdh_test.go /src/goroot/src/fuzz_ng_crypto_ecdh/fuzz_ng.go /src/goroot/src/fuzz_ng_crypto_ecdh/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_crypto_ecdh/ngolo_helper.go /src/goroot/src/fuzz_ng_crypto_ecdh/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_crypto_ecdh/nist.go /src/goroot/src/fuzz_ng_crypto_ecdh/x25519.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_ecdh/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_crypto_ecdh/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_crypto_ecdh /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": 	ecdh.go:11:2: use of internal package crypto/internal/boring not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_crypto_ecdh/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_crypto_ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_crypto_ecdh_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/constant/example_test.go /src/goroot/src/go/constant/kind_string.go /src/goroot/src/go/constant/value.go /src/goroot/src/go/constant/value_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_constant '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/constant fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Found package in /src/goroot/src/go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Function MakeFromLiteral has unproduced argument token.Token
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Function UnaryOp has unproduced argument token.Token
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Function BinaryOp has unproduced argument token.Token
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Function Shift has unproduced argument token.Token
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:31 Function Compare has unproduced argument token.Token
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_constant.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_constant.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/constant: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_constant/copy/kind_string.go fuzz_ng_go_constant/copy/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_constant/copy/kind_string.go fuzz_ng_go_constant/copy/value.go /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_constant/fuzz_ng.go fuzz_ng_go_constant/fuzzng_unsure_test.go fuzz_ng_go_constant/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/constant/example_test.go /src/goroot/src/go/constant/value_test.go /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/constant/testdata /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/constant/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_constant/' /src/goroot/src/fuzz_ng_go_constant/example_test.go /src/goroot/src/fuzz_ng_go_constant/fuzz_ng.go /src/goroot/src/fuzz_ng_go_constant/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_constant/kind_string.go /src/goroot/src/fuzz_ng_go_constant/ngolo_helper.go /src/goroot/src/fuzz_ng_go_constant/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_constant/value.go /src/goroot/src/fuzz_ng_go_constant/value_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_constant/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_constant/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_constant /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_constant [fuzz_ng_go_constant.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_constant [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_constant/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_constant_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/types/alias.go /src/goroot/src/go/types/api.go /src/goroot/src/go/types/api_predicates.go /src/goroot/src/go/types/api_test.go /src/goroot/src/go/types/array.go /src/goroot/src/go/types/assignments.go /src/goroot/src/go/types/basic.go /src/goroot/src/go/types/builtins.go /src/goroot/src/go/types/builtins_test.go /src/goroot/src/go/types/call.go /src/goroot/src/go/types/chan.go /src/goroot/src/go/types/check.go /src/goroot/src/go/types/check_test.go /src/goroot/src/go/types/commentMap_test.go /src/goroot/src/go/types/const.go /src/goroot/src/go/types/context.go /src/goroot/src/go/types/context_test.go /src/goroot/src/go/types/conversions.go /src/goroot/src/go/types/decl.go /src/goroot/src/go/types/errorcalls_test.go /src/goroot/src/go/types/errors.go /src/goroot/src/go/types/errors_test.go /src/goroot/src/go/types/eval.go /src/goroot/src/go/types/eval_test.go /src/goroot/src/go/types/example_test.go /src/goroot/src/go/types/expr.go /src/goroot/src/go/types/exprstring.go /src/goroot/src/go/types/exprstring_test.go /src/goroot/src/go/types/gccgosizes.go /src/goroot/src/go/types/gcsizes.go /src/goroot/src/go/types/generate.go /src/goroot/src/go/types/generate_test.go /src/goroot/src/go/types/gotype.go /src/goroot/src/go/types/hilbert_test.go /src/goroot/src/go/types/index.go /src/goroot/src/go/types/infer.go /src/goroot/src/go/types/initorder.go /src/goroot/src/go/types/instantiate.go /src/goroot/src/go/types/instantiate_test.go /src/goroot/src/go/types/interface.go /src/goroot/src/go/types/issues_test.go /src/goroot/src/go/types/labels.go /src/goroot/src/go/types/lookup.go /src/goroot/src/go/types/lookup_test.go /src/goroot/src/go/types/main_test.go /src/goroot/src/go/types/map.go /src/goroot/src/go/types/methodset.go /src/goroot/src/go/types/methodset_test.go /src/goroot/src/go/types/mono.go /src/goroot/src/go/types/mono_test.go /src/goroot/src/go/types/named.go /src/goroot/src/go/types/named_test.go /src/goroot/src/go/types/object.go /src/goroot/src/go/types/object_test.go /src/goroot/src/go/types/objset.go /src/goroot/src/go/types/operand.go /src/goroot/src/go/types/package.go /src/goroot/src/go/types/pointer.go /src/goroot/src/go/types/predicates.go /src/goroot/src/go/types/resolver.go /src/goroot/src/go/types/resolver_test.go /src/goroot/src/go/types/return.go /src/goroot/src/go/types/scope.go /src/goroot/src/go/types/selection.go /src/goroot/src/go/types/self_test.go /src/goroot/src/go/types/signature.go /src/goroot/src/go/types/sizeof_test.go /src/goroot/src/go/types/sizes.go /src/goroot/src/go/types/sizes_test.go /src/goroot/src/go/types/slice.go /src/goroot/src/go/types/stdlib_test.go /src/goroot/src/go/types/stmt.go /src/goroot/src/go/types/struct.go /src/goroot/src/go/types/subst.go /src/goroot/src/go/types/termlist.go /src/goroot/src/go/types/termlist_test.go /src/goroot/src/go/types/token_test.go /src/goroot/src/go/types/tuple.go /src/goroot/src/go/types/type.go /src/goroot/src/go/types/typelists.go /src/goroot/src/go/types/typeparam.go /src/goroot/src/go/types/typeset.go /src/goroot/src/go/types/typeset_test.go /src/goroot/src/go/types/typestring.go /src/goroot/src/go/types/typestring_test.go /src/goroot/src/go/types/typeterm.go /src/goroot/src/go/types/typeterm_test.go /src/goroot/src/go/types/typexpr.go /src/goroot/src/go/types/under.go /src/goroot/src/go/types/unify.go /src/goroot/src/go/types/union.go /src/goroot/src/go/types/universe.go /src/goroot/src/go/types/util.go /src/goroot/src/go/types/util_test.go /src/goroot/src/go/types/validtype.go /src/goroot/src/go/types/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 96 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_types '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/types fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Found package in /src/goroot/src/go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Array result for Package is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Array result for int64 is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Type Builtin is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Type ArgumentError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Type Basic is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Type Nil is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:154951, Key:(*ast.SelectorExpr)(0xc000695350), Value:(*ast.Ident)(0xc0006a3260)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:155631, Key:(*ast.StarExpr)(0xc0006954b8), Value:(*ast.Ident)(0xc0006a3300)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:156134, Key:(*ast.StarExpr)(0xc0003b26f0), Value:(*ast.Ident)(0xc0003b8a40)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:156333, Key:(*ast.StarExpr)(0xc0003b2828), Value:(*ast.Ident)(0xc0003b8b00)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:156780, Key:(*ast.SelectorExpr)(0xc0003b29f0), Value:(*ast.Ident)(0xc0003b8ba0)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:156927, Key:(*ast.StarExpr)(0xc0003b2a68), Value:(*ast.StarExpr)(0xc0003b2a80)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled field &ast.MapType{Map:158386, Key:(*ast.SelectorExpr)(0xc0003b2dc8), Value:(*ast.StarExpr)(0xc0003b2de0)} for struct Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Error has unproduced recv ArgumentError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Unwrap has unproduced recv ArgumentError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function TypeOf has unproduced recv Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function ObjectOf has unproduced recv Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function PkgNameOf has unproduced recv Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function String has unproduced recv Initializer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Check has unproduced recv Config
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Kind has unproduced recv Basic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Info has unproduced recv Basic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Name has unproduced recv Basic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Underlying has unproduced recv Basic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function String has unproduced recv Basic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewChecker has unproduced argument Config
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewChecker has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewChecker has unproduced argument Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Files has unproduced argument ast.File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Eval has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Eval has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function CheckExpr has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function CheckExpr has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function CheckExpr has unproduced argument ast.Expr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function CheckExpr has unproduced argument Info
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function ExprString has unproduced argument ast.Expr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function WriteExpr has unproduced argument bytes.Buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function WriteExpr has unproduced argument ast.Expr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Instantiate has unproduced array argument Type
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewInterfaceType has unproduced array argument Type
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewPkgName has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewConst has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewConst has unproduced argument constant.Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewTypeName has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewVar has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewParam has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewField has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewFunc has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewLabel has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function String has unproduced recv Builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function String has unproduced recv Nil
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function NewScope has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function LookupParent has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Contains has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function Innermost has unproduced argument token.Pos
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Unhandled argument &ast.Ellipsis{Ellipsis:412938, Elt:(*ast.StarExpr)(0xc000462768)} for NewTuple
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function WriteType has unproduced argument bytes.Buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:38 Function WriteSignature has unproduced argument bytes.Buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_types.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_types.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/types: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_types [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_types.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:547:29: cannot use arg0 (variable of type *types.Func) as []*types.Func value in argument to types.NewInterface
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:547:35: cannot use arg1 (variable of type *types.Named) as []*types.Named value in argument to types.NewInterface
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:814:37: cannot use arg2 (variable of type *types.Func) as []*types.Func value in argument to types.NewNamed
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:859:23: cannot use arg1 (variable of type *types.TypeParam) as []*types.TypeParam value in argument to arg0.SetTypeParams
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1156:20: cannot use arg1 (variable of type *types.Package) as []*types.Package value in argument to arg0.SetImports
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1422:39: cannot use arg1 (variable of type *types.TypeParam) as []*types.TypeParam value in argument to types.NewSignatureType
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1422:45: cannot use arg2 (variable of type *types.TypeParam) as []*types.TypeParam value in argument to types.NewSignatureType
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1519:19: cannot use arg1 (variable of type *types.Var) as []*types.Var value in argument to arg0.Offsetsof
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1572:26: cannot use arg0 (variable of type *types.Var) as []*types.Var value in argument to types.NewStruct
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1777:25: cannot use arg0 (variable of type *types.Term) as []*types.Term value in argument to types.NewUnion
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:1777:25: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_types/copy/alias.go fuzz_ng_go_types/copy/api.go fuzz_ng_go_types/copy/api_predicates.go fuzz_ng_go_types/copy/array.go fuzz_ng_go_types/copy/assignments.go fuzz_ng_go_types/copy/basic.go fuzz_ng_go_types/copy/builtins.go fuzz_ng_go_types/copy/call.go fuzz_ng_go_types/copy/chan.go fuzz_ng_go_types/copy/check.go fuzz_ng_go_types/copy/const.go fuzz_ng_go_types/copy/context.go fuzz_ng_go_types/copy/conversions.go fuzz_ng_go_types/copy/decl.go fuzz_ng_go_types/copy/errors.go fuzz_ng_go_types/copy/eval.go fuzz_ng_go_types/copy/expr.go fuzz_ng_go_types/copy/exprstring.go fuzz_ng_go_types/copy/gccgosizes.go fuzz_ng_go_types/copy/gcsizes.go fuzz_ng_go_types/copy/generate.go fuzz_ng_go_types/copy/index.go fuzz_ng_go_types/copy/infer.go fuzz_ng_go_types/copy/initorder.go fuzz_ng_go_types/copy/instantiate.go fuzz_ng_go_types/copy/interface.go fuzz_ng_go_types/copy/labels.go fuzz_ng_go_types/copy/lookup.go fuzz_ng_go_types/copy/map.go fuzz_ng_go_types/copy/methodset.go fuzz_ng_go_types/copy/mono.go fuzz_ng_go_types/copy/named.go fuzz_ng_go_types/copy/object.go fuzz_ng_go_types/copy/objset.go fuzz_ng_go_types/copy/operand.go fuzz_ng_go_types/copy/package.go fuzz_ng_go_types/copy/pointer.go fuzz_ng_go_types/copy/predicates.go fuzz_ng_go_types/copy/resolver.go fuzz_ng_go_types/copy/return.go fuzz_ng_go_types/copy/scope.go fuzz_ng_go_types/copy/selection.go fuzz_ng_go_types/copy/signature.go fuzz_ng_go_types/copy/sizes.go fuzz_ng_go_types/copy/slice.go fuzz_ng_go_types/copy/stmt.go fuzz_ng_go_types/copy/struct.go fuzz_ng_go_types/copy/subst.go fuzz_ng_go_types/copy/termlist.go fuzz_ng_go_types/copy/tuple.go fuzz_ng_go_types/copy/type.go fuzz_ng_go_types/copy/typelists.go fuzz_ng_go_types/copy/typeparam.go fuzz_ng_go_types/copy/typeset.go fuzz_ng_go_types/copy/typestring.go fuzz_ng_go_types/copy/typeterm.go fuzz_ng_go_types/copy/typexpr.go fuzz_ng_go_types/copy/under.go fuzz_ng_go_types/copy/unify.go fuzz_ng_go_types/copy/union.go fuzz_ng_go_types/copy/universe.go fuzz_ng_go_types/copy/util.go fuzz_ng_go_types/copy/validtype.go fuzz_ng_go_types/copy/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_types/copy/alias.go fuzz_ng_go_types/copy/api.go fuzz_ng_go_types/copy/api_predicates.go fuzz_ng_go_types/copy/array.go fuzz_ng_go_types/copy/assignments.go fuzz_ng_go_types/copy/basic.go fuzz_ng_go_types/copy/builtins.go fuzz_ng_go_types/copy/call.go fuzz_ng_go_types/copy/chan.go fuzz_ng_go_types/copy/check.go fuzz_ng_go_types/copy/const.go fuzz_ng_go_types/copy/context.go fuzz_ng_go_types/copy/conversions.go fuzz_ng_go_types/copy/decl.go fuzz_ng_go_types/copy/errors.go fuzz_ng_go_types/copy/eval.go fuzz_ng_go_types/copy/expr.go fuzz_ng_go_types/copy/exprstring.go fuzz_ng_go_types/copy/gccgosizes.go fuzz_ng_go_types/copy/gcsizes.go fuzz_ng_go_types/copy/generate.go fuzz_ng_go_types/copy/index.go fuzz_ng_go_types/copy/infer.go fuzz_ng_go_types/copy/initorder.go fuzz_ng_go_types/copy/instantiate.go fuzz_ng_go_types/copy/interface.go fuzz_ng_go_types/copy/labels.go fuzz_ng_go_types/copy/lookup.go fuzz_ng_go_types/copy/map.go fuzz_ng_go_types/copy/methodset.go fuzz_ng_go_types/copy/mono.go fuzz_ng_go_types/copy/named.go fuzz_ng_go_types/copy/object.go fuzz_ng_go_types/copy/objset.go fuzz_ng_go_types/copy/operand.go fuzz_ng_go_types/copy/package.go fuzz_ng_go_types/copy/pointer.go fuzz_ng_go_types/copy/predicates.go fuzz_ng_go_types/copy/resolver.go fuzz_ng_go_types/copy/return.go fuzz_ng_go_types/copy/scope.go fuzz_ng_go_types/copy/selection.go fuzz_ng_go_types/copy/signature.go fuzz_ng_go_types/copy/sizes.go fuzz_ng_go_types/copy/slice.go fuzz_ng_go_types/copy/stmt.go fuzz_ng_go_types/copy/struct.go fuzz_ng_go_types/copy/subst.go fuzz_ng_go_types/copy/termlist.go fuzz_ng_go_types/copy/tuple.go fuzz_ng_go_types/copy/type.go fuzz_ng_go_types/copy/typelists.go fuzz_ng_go_types/copy/typeparam.go fuzz_ng_go_types/copy/typeset.go fuzz_ng_go_types/copy/typestring.go fuzz_ng_go_types/copy/typeterm.go fuzz_ng_go_types/copy/typexpr.go fuzz_ng_go_types/copy/under.go fuzz_ng_go_types/copy/unify.go fuzz_ng_go_types/copy/union.go fuzz_ng_go_types/copy/universe.go fuzz_ng_go_types/copy/util.go fuzz_ng_go_types/copy/validtype.go fuzz_ng_go_types/copy/version.go /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_types/fuzz_ng.go fuzz_ng_go_types/fuzzng_unsure_test.go fuzz_ng_go_types/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/types/api_test.go /src/goroot/src/go/types/builtins_test.go /src/goroot/src/go/types/check_test.go /src/goroot/src/go/types/commentMap_test.go /src/goroot/src/go/types/context_test.go /src/goroot/src/go/types/errorcalls_test.go /src/goroot/src/go/types/errors_test.go /src/goroot/src/go/types/eval_test.go /src/goroot/src/go/types/example_test.go /src/goroot/src/go/types/exprstring_test.go /src/goroot/src/go/types/generate_test.go /src/goroot/src/go/types/hilbert_test.go /src/goroot/src/go/types/instantiate_test.go /src/goroot/src/go/types/issues_test.go /src/goroot/src/go/types/lookup_test.go /src/goroot/src/go/types/main_test.go /src/goroot/src/go/types/methodset_test.go /src/goroot/src/go/types/mono_test.go /src/goroot/src/go/types/named_test.go /src/goroot/src/go/types/object_test.go /src/goroot/src/go/types/resolver_test.go /src/goroot/src/go/types/self_test.go /src/goroot/src/go/types/sizeof_test.go /src/goroot/src/go/types/sizes_test.go /src/goroot/src/go/types/stdlib_test.go /src/goroot/src/go/types/termlist_test.go /src/goroot/src/go/types/token_test.go /src/goroot/src/go/types/typeset_test.go /src/goroot/src/go/types/typestring_test.go /src/goroot/src/go/types/typeterm_test.go /src/goroot/src/go/types/util_test.go /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/types/testdata /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_types/' /src/goroot/src/fuzz_ng_go_types/alias.go /src/goroot/src/fuzz_ng_go_types/api.go /src/goroot/src/fuzz_ng_go_types/api_predicates.go /src/goroot/src/fuzz_ng_go_types/api_test.go /src/goroot/src/fuzz_ng_go_types/array.go /src/goroot/src/fuzz_ng_go_types/assignments.go /src/goroot/src/fuzz_ng_go_types/basic.go /src/goroot/src/fuzz_ng_go_types/builtins.go /src/goroot/src/fuzz_ng_go_types/builtins_test.go /src/goroot/src/fuzz_ng_go_types/call.go /src/goroot/src/fuzz_ng_go_types/chan.go /src/goroot/src/fuzz_ng_go_types/check.go /src/goroot/src/fuzz_ng_go_types/check_test.go /src/goroot/src/fuzz_ng_go_types/commentMap_test.go /src/goroot/src/fuzz_ng_go_types/const.go /src/goroot/src/fuzz_ng_go_types/context.go /src/goroot/src/fuzz_ng_go_types/context_test.go /src/goroot/src/fuzz_ng_go_types/conversions.go /src/goroot/src/fuzz_ng_go_types/decl.go /src/goroot/src/fuzz_ng_go_types/errorcalls_test.go /src/goroot/src/fuzz_ng_go_types/errors.go /src/goroot/src/fuzz_ng_go_types/errors_test.go /src/goroot/src/fuzz_ng_go_types/eval.go /src/goroot/src/fuzz_ng_go_types/eval_test.go /src/goroot/src/fuzz_ng_go_types/example_test.go /src/goroot/src/fuzz_ng_go_types/expr.go /src/goroot/src/fuzz_ng_go_types/exprstring.go /src/goroot/src/fuzz_ng_go_types/exprstring_test.go /src/goroot/src/fuzz_ng_go_types/fuzz_ng.go /src/goroot/src/fuzz_ng_go_types/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_types/gccgosizes.go /src/goroot/src/fuzz_ng_go_types/gcsizes.go /src/goroot/src/fuzz_ng_go_types/generate.go /src/goroot/src/fuzz_ng_go_types/generate_test.go /src/goroot/src/fuzz_ng_go_types/hilbert_test.go /src/goroot/src/fuzz_ng_go_types/index.go /src/goroot/src/fuzz_ng_go_types/infer.go /src/goroot/src/fuzz_ng_go_types/initorder.go /src/goroot/src/fuzz_ng_go_types/instantiate.go /src/goroot/src/fuzz_ng_go_types/instantiate_test.go /src/goroot/src/fuzz_ng_go_types/interface.go /src/goroot/src/fuzz_ng_go_types/issues_test.go /src/goroot/src/fuzz_ng_go_types/labels.go /src/goroot/src/fuzz_ng_go_types/lookup.go /src/goroot/src/fuzz_ng_go_types/lookup_test.go /src/goroot/src/fuzz_ng_go_types/main_test.go /src/goroot/src/fuzz_ng_go_types/map.go /src/goroot/src/fuzz_ng_go_types/methodset.go /src/goroot/src/fuzz_ng_go_types/methodset_test.go /src/goroot/src/fuzz_ng_go_types/mono.go /src/goroot/src/fuzz_ng_go_types/mono_test.go /src/goroot/src/fuzz_ng_go_types/named.go /src/goroot/src/fuzz_ng_go_types/named_test.go /src/goroot/src/fuzz_ng_go_types/ngolo_helper.go /src/goroot/src/fuzz_ng_go_types/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_types/object.go /src/goroot/src/fuzz_ng_go_types/object_test.go /src/goroot/src/fuzz_ng_go_types/objset.go /src/goroot/src/fuzz_ng_go_types/operand.go /src/goroot/src/fuzz_ng_go_types/package.go /src/goroot/src/fuzz_ng_go_types/pointer.go /src/goroot/src/fuzz_ng_go_types/predicates.go /src/goroot/src/fuzz_ng_go_types/resolver.go /src/goroot/src/fuzz_ng_go_types/resolver_test.go /src/goroot/src/fuzz_ng_go_types/return.go /src/goroot/src/fuzz_ng_go_types/scope.go /src/goroot/src/fuzz_ng_go_types/selection.go /src/goroot/src/fuzz_ng_go_types/self_test.go /src/goroot/src/fuzz_ng_go_types/signature.go /src/goroot/src/fuzz_ng_go_types/sizeof_test.go /src/goroot/src/fuzz_ng_go_types/sizes.go /src/goroot/src/fuzz_ng_go_types/sizes_test.go /src/goroot/src/fuzz_ng_go_types/slice.go /src/goroot/src/fuzz_ng_go_types/stdlib_test.go /src/goroot/src/fuzz_ng_go_types/stmt.go /src/goroot/src/fuzz_ng_go_types/struct.go /src/goroot/src/fuzz_ng_go_types/subst.go /src/goroot/src/fuzz_ng_go_types/termlist.go /src/goroot/src/fuzz_ng_go_types/termlist_test.go /src/goroot/src/fuzz_ng_go_types/token_test.go /src/goroot/src/fuzz_ng_go_types/tuple.go /src/goroot/src/fuzz_ng_go_types/type.go /src/goroot/src/fuzz_ng_go_types/typelists.go /src/goroot/src/fuzz_ng_go_types/typeparam.go /src/goroot/src/fuzz_ng_go_types/typeset.go /src/goroot/src/fuzz_ng_go_types/typeset_test.go /src/goroot/src/fuzz_ng_go_types/typestring.go /src/goroot/src/fuzz_ng_go_types/typestring_test.go /src/goroot/src/fuzz_ng_go_types/typeterm.go /src/goroot/src/fuzz_ng_go_types/typeterm_test.go /src/goroot/src/fuzz_ng_go_types/typexpr.go /src/goroot/src/fuzz_ng_go_types/under.go /src/goroot/src/fuzz_ng_go_types/unify.go /src/goroot/src/fuzz_ng_go_types/union.go /src/goroot/src/fuzz_ng_go_types/universe.go /src/goroot/src/fuzz_ng_go_types/util.go /src/goroot/src/fuzz_ng_go_types/util_test.go /src/goroot/src/fuzz_ng_go_types/validtype.go /src/goroot/src/fuzz_ng_go_types/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_types/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_types/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_types /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": 	call.go:11:2: use of internal package go/internal/typeparams not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_types/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_types
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_types_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/types/testdata/manual.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/types/testdata/local/issue47996.go /src/goroot/src/go/types/testdata/local/shifts.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types/testdata/local
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types/testdata/local
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/types/testdata/local
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/importer/importer.go /src/goroot/src/go/importer/importer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_importer '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/importer fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:50 Found package in /src/goroot/src/go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:50 Type Lookup is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:50 Function ForCompiler has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:50 Function ForCompiler has unproduced argument Lookup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:50 Function For has unproduced argument Lookup
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_importer.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_importer.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/importer: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_importer [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_importer.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:189:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_importer/copy/importer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_importer/copy/importer.go /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_importer/fuzz_ng.go fuzz_ng_go_importer/fuzzng_unsure_test.go fuzz_ng_go_importer/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/importer/importer_test.go /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/importer/testdata /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/importer/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_importer/' /src/goroot/src/fuzz_ng_go_importer/fuzz_ng.go /src/goroot/src/fuzz_ng_go_importer/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_importer/importer.go /src/goroot/src/fuzz_ng_go_importer/importer_test.go /src/goroot/src/fuzz_ng_go_importer/ngolo_helper.go /src/goroot/src/fuzz_ng_go_importer/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_importer/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_importer/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_importer /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": 	importer.go:10:2: use of internal package go/internal/gccgoimporter not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_importer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_importer_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/token/example_test.go /src/goroot/src/go/token/position.go /src/goroot/src/go/token/position_bench_test.go /src/goroot/src/go/token/position_test.go /src/goroot/src/go/token/serialize.go /src/goroot/src/go/token/serialize_test.go /src/goroot/src/go/token/token.go /src/goroot/src/go/token/token_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_token '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/token fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:55 Found package in /src/goroot/src/go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:55 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:55 Unhandled argument &ast.FuncType{Func:22982, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001a1d40), Results:(*ast.FieldList)(0xc0001a1d70)} for FileSetNgdotIterate
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:55 Unhandled argument &ast.FuncType{Func:26035, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000014150), Results:(*ast.FieldList)(0xc000014180)} for FileSetNgdotRead
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:11:55 Unhandled argument &ast.FuncType{Func:26542, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0000144e0), Results:(*ast.FieldList)(0xc000014510)} for FileSetNgdotWrite
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_token.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_token.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/token: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_token/copy/position.go fuzz_ng_go_token/copy/serialize.go fuzz_ng_go_token/copy/token.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_token/copy/position.go fuzz_ng_go_token/copy/serialize.go fuzz_ng_go_token/copy/token.go /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_token/fuzz_ng.go fuzz_ng_go_token/fuzzng_unsure_test.go fuzz_ng_go_token/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/token/example_test.go /src/goroot/src/go/token/position_bench_test.go /src/goroot/src/go/token/position_test.go /src/goroot/src/go/token/serialize_test.go /src/goroot/src/go/token/token_test.go /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/token/testdata /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/token/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_token/' /src/goroot/src/fuzz_ng_go_token/example_test.go /src/goroot/src/fuzz_ng_go_token/fuzz_ng.go /src/goroot/src/fuzz_ng_go_token/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_token/ngolo_helper.go /src/goroot/src/fuzz_ng_go_token/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_token/position.go /src/goroot/src/fuzz_ng_go_token/position_bench_test.go /src/goroot/src/fuzz_ng_go_token/position_test.go /src/goroot/src/fuzz_ng_go_token/serialize.go /src/goroot/src/fuzz_ng_go_token/serialize_test.go /src/goroot/src/fuzz_ng_go_token/token.go /src/goroot/src/fuzz_ng_go_token/token_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_token/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_token/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_token /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_token [fuzz_ng_go_token.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_token [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_token/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_token
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_token_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/printer/comment.go /src/goroot/src/go/printer/example_test.go /src/goroot/src/go/printer/gobuild.go /src/goroot/src/go/printer/nodes.go /src/goroot/src/go/printer/performance_test.go /src/goroot/src/go/printer/printer.go /src/goroot/src/go/printer/printer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_printer '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/printer fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:04 Found package in /src/goroot/src/go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:04 Function Fprint has unproduced recv Config
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:04 Function Fprint has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_printer.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_printer.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/printer: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_printer [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_printer.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "go/printer" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_printer/copy/comment.go fuzz_ng_go_printer/copy/gobuild.go fuzz_ng_go_printer/copy/nodes.go fuzz_ng_go_printer/copy/printer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_printer/copy/comment.go fuzz_ng_go_printer/copy/gobuild.go fuzz_ng_go_printer/copy/nodes.go fuzz_ng_go_printer/copy/printer.go /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_printer/fuzz_ng.go fuzz_ng_go_printer/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/printer/example_test.go /src/goroot/src/go/printer/performance_test.go /src/goroot/src/go/printer/printer_test.go /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/printer/testdata /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_printer/' /src/goroot/src/fuzz_ng_go_printer/comment.go /src/goroot/src/fuzz_ng_go_printer/example_test.go /src/goroot/src/fuzz_ng_go_printer/fuzz_ng.go /src/goroot/src/fuzz_ng_go_printer/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_printer/gobuild.go /src/goroot/src/fuzz_ng_go_printer/ngolo_helper.go /src/goroot/src/fuzz_ng_go_printer/nodes.go /src/goroot/src/fuzz_ng_go_printer/performance_test.go /src/goroot/src/fuzz_ng_go_printer/printer.go /src/goroot/src/fuzz_ng_go_printer/printer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_printer/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_printer/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_printer /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_printer [fuzz_ng_go_printer.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./printer.go:54:6: printer already declared through import of package printer ("go/printer")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./example_test.go:12:2: other declaration of printer
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_printer [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_printer/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_printer_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/printer/testdata/parser.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/printer/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/ast/ast.go /src/goroot/src/go/ast/ast_test.go /src/goroot/src/go/ast/commentmap.go /src/goroot/src/go/ast/commentmap_test.go /src/goroot/src/go/ast/example_test.go /src/goroot/src/go/ast/filter.go /src/goroot/src/go/ast/filter_test.go /src/goroot/src/go/ast/import.go /src/goroot/src/go/ast/issues_test.go /src/goroot/src/go/ast/print.go /src/goroot/src/go/ast/print_test.go /src/goroot/src/go/ast/resolve.go /src/goroot/src/go/ast/scope.go /src/goroot/src/go/ast/walk.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_ast '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude InterfaceType'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude InterfaceType go/ast fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Found package in /src/goroot/src/go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Array result for CommentGroup is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Type Importer is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Type Visitor is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Type Filter is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Type Decl is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Type FieldFilter is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv Comment
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv Comment
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv CommentGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv CommentGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Text has unproduced recv CommentGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv Field
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv Field
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv FieldList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv FieldList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function NumFields has unproduced recv FieldList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BadExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv Ellipsis
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BasicLit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv FuncLit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv CompositeLit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ParenExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv SelectorExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv IndexExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv IndexListExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv SliceExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv TypeAssertExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv CallExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv StarExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv UnaryExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BinaryExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv KeyValueExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ArrayType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv StructType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv FuncType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv InterfaceType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv MapType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ChanType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BadExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv Ellipsis
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BasicLit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv FuncLit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv CompositeLit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ParenExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv SelectorExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv IndexExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv IndexListExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv SliceExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv TypeAssertExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv CallExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv StarExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv UnaryExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BinaryExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv KeyValueExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ArrayType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv StructType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv FuncType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv InterfaceType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv MapType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ChanType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BadStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv DeclStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv EmptyStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv LabeledStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ExprStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv SendStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv IncDecStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv AssignStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv GoStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv DeferStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ReturnStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BranchStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BlockStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv IfStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv CaseClause
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv SwitchStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv TypeSwitchStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv CommClause
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv SelectStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ForStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv RangeStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BadStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv DeclStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv EmptyStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv LabeledStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ExprStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv SendStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv IncDecStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv AssignStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv GoStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv DeferStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ReturnStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BranchStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BlockStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv IfStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv CaseClause
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv SwitchStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv TypeSwitchStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv CommClause
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv SelectStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ForStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv RangeStmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ImportSpec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv ValueSpec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv TypeSpec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ImportSpec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv ValueSpec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv TypeSpec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv BadDecl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv GenDecl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Pos has unproduced recv FuncDecl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv BadDecl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv GenDecl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function End has unproduced recv FuncDecl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function NewCommentMap has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function NewCommentMap has unproduced argument CommentGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function FilterDecl has unproduced argument Decl
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function FilterDecl has unproduced argument Filter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function FilterFile has unproduced argument Filter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function FilterPackage has unproduced argument Filter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function SortImports has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function NotNilFilter has unproduced argument reflect.Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Fprint has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Fprint has unproduced argument FieldFilter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Print has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function NewPackage has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Unhandled argument &ast.MapType{Map:24202, Key:(*ast.Ident)(0xc00022b3a0), Value:(*ast.StarExpr)(0xc0002387b0)} for NewPackage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function NewPackage has unproduced argument Importer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Function Walk has unproduced argument Visitor
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:07 Unhandled argument &ast.FuncType{Func:6539, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001b92f0), Results:(*ast.FieldList)(0xc0001b9320)} for Inspect
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_ast.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_ast.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/ast: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_ast/copy/ast.go fuzz_ng_go_ast/copy/commentmap.go fuzz_ng_go_ast/copy/filter.go fuzz_ng_go_ast/copy/import.go fuzz_ng_go_ast/copy/print.go fuzz_ng_go_ast/copy/resolve.go fuzz_ng_go_ast/copy/scope.go fuzz_ng_go_ast/copy/walk.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_go_ast/copy/ast.go:581:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_ast/copy/ast.go fuzz_ng_go_ast/copy/commentmap.go fuzz_ng_go_ast/copy/filter.go fuzz_ng_go_ast/copy/import.go fuzz_ng_go_ast/copy/print.go fuzz_ng_go_ast/copy/resolve.go fuzz_ng_go_ast/copy/scope.go fuzz_ng_go_ast/copy/walk.go /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_ast/fuzz_ng.go fuzz_ng_go_ast/fuzzng_unsure_test.go fuzz_ng_go_ast/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/ast/ast_test.go /src/goroot/src/go/ast/commentmap_test.go /src/goroot/src/go/ast/example_test.go /src/goroot/src/go/ast/filter_test.go /src/goroot/src/go/ast/issues_test.go /src/goroot/src/go/ast/print_test.go /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/ast/testdata /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/ast/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_ast/' /src/goroot/src/fuzz_ng_go_ast/ast.go /src/goroot/src/fuzz_ng_go_ast/ast_test.go /src/goroot/src/fuzz_ng_go_ast/commentmap.go /src/goroot/src/fuzz_ng_go_ast/commentmap_test.go /src/goroot/src/fuzz_ng_go_ast/example_test.go /src/goroot/src/fuzz_ng_go_ast/filter.go /src/goroot/src/fuzz_ng_go_ast/filter_test.go /src/goroot/src/fuzz_ng_go_ast/fuzz_ng.go /src/goroot/src/fuzz_ng_go_ast/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_ast/import.go /src/goroot/src/fuzz_ng_go_ast/issues_test.go /src/goroot/src/fuzz_ng_go_ast/ngolo_helper.go /src/goroot/src/fuzz_ng_go_ast/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_ast/print.go /src/goroot/src/fuzz_ng_go_ast/print_test.go /src/goroot/src/fuzz_ng_go_ast/resolve.go /src/goroot/src/fuzz_ng_go_ast/scope.go /src/goroot/src/fuzz_ng_go_ast/walk.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_ast/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_ast/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_ast /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": issues_test.go:56:22: missing ',' before newline in composite literal
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_ast [setup failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_ast/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_ast_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/scanner/errors.go /src/goroot/src/go/scanner/example_test.go /src/goroot/src/go/scanner/scanner.go /src/goroot/src/go/scanner/scanner_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_scanner '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/scanner fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Found package in /src/goroot/src/go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Type ErrorList is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Type ErrorHandler is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Type Scanner is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Add has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Reset has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Len has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Swap has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Less has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Sort has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function RemoveMultiples has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Error has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Err has unproduced recv ErrorList
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function PrintError has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Init has unproduced recv Scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:14 Function Scan has unproduced recv Scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_scanner.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_scanner.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:12:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:12:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/scanner: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_scanner [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_scanner.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:24: undefined: ModeEnum
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:125:33: undefined: ModeEnum
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:134:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:155:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:176:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:199:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_scanner/copy/errors.go fuzz_ng_go_scanner/copy/scanner.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_scanner/copy/errors.go fuzz_ng_go_scanner/copy/scanner.go /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_scanner/fuzz_ng.go fuzz_ng_go_scanner/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/scanner/example_test.go /src/goroot/src/go/scanner/scanner_test.go /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/scanner/testdata /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/scanner/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_scanner/' /src/goroot/src/fuzz_ng_go_scanner/errors.go /src/goroot/src/fuzz_ng_go_scanner/example_test.go /src/goroot/src/fuzz_ng_go_scanner/fuzz_ng.go /src/goroot/src/fuzz_ng_go_scanner/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_scanner/ngolo_helper.go /src/goroot/src/fuzz_ng_go_scanner/scanner.go /src/goroot/src/fuzz_ng_go_scanner/scanner_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_scanner/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_scanner/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_scanner /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_scanner [fuzz_ng_go_scanner.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_scanner [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_scanner/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_scanner_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/parser/error_test.go /src/goroot/src/go/parser/example_test.go /src/goroot/src/go/parser/interface.go /src/goroot/src/go/parser/parser.go /src/goroot/src/go/parser/parser_test.go /src/goroot/src/go/parser/performance_test.go /src/goroot/src/go/parser/resolver.go /src/goroot/src/go/parser/resolver_test.go /src/goroot/src/go/parser/short_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_parser '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/parser fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:17 Found package in /src/goroot/src/go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:17 Function ParseFile has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:17 Function ParseDir has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:17 Unhandled argument &ast.FuncType{Func:21002, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00029e930), Results:(*ast.FieldList)(0xc00029e960)} for ParseDir
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:17 Function ParseExprFrom has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_parser.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_parser.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/parser: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_parser/copy/interface.go fuzz_ng_go_parser/copy/parser.go fuzz_ng_go_parser/copy/resolver.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_parser/copy/interface.go fuzz_ng_go_parser/copy/parser.go fuzz_ng_go_parser/copy/resolver.go /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_parser/fuzz_ng.go fuzz_ng_go_parser/fuzzng_unsure_test.go fuzz_ng_go_parser/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/parser/error_test.go /src/goroot/src/go/parser/example_test.go /src/goroot/src/go/parser/parser_test.go /src/goroot/src/go/parser/performance_test.go /src/goroot/src/go/parser/resolver_test.go /src/goroot/src/go/parser/short_test.go /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/parser/testdata /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_parser/' /src/goroot/src/fuzz_ng_go_parser/error_test.go /src/goroot/src/fuzz_ng_go_parser/example_test.go /src/goroot/src/fuzz_ng_go_parser/fuzz_ng.go /src/goroot/src/fuzz_ng_go_parser/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_parser/interface.go /src/goroot/src/fuzz_ng_go_parser/ngolo_helper.go /src/goroot/src/fuzz_ng_go_parser/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_parser/parser.go /src/goroot/src/fuzz_ng_go_parser/parser_test.go /src/goroot/src/fuzz_ng_go_parser/performance_test.go /src/goroot/src/fuzz_ng_go_parser/resolver.go /src/goroot/src/fuzz_ng_go_parser/resolver_test.go /src/goroot/src/fuzz_ng_go_parser/short_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_parser/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_parser/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_parser /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": 	parser.go:22:2: use of internal package go/internal/typeparams not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_parser/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_parser_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/parser/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/parser/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/parser/testdata/issue42951/not_a_file.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/issue42951
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/issue42951
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/issue42951
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/parser/testdata/issue42951/not_a_file.go/invalid.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/issue42951/not_a_file.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/issue42951/not_a_file.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/issue42951/not_a_file.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/parser/testdata/goversion/t01.go /src/goroot/src/go/parser/testdata/goversion/t02.go /src/goroot/src/go/parser/testdata/goversion/t03.go /src/goroot/src/go/parser/testdata/goversion/t04.go /src/goroot/src/go/parser/testdata/goversion/t05.go /src/goroot/src/go/parser/testdata/goversion/t06.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/goversion
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/goversion
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/parser/testdata/goversion
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/parser/testdata/resolution/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/parser/testdata/resolution/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/format/benchmark_test.go /src/goroot/src/go/format/example_test.go /src/goroot/src/go/format/format.go /src/goroot/src/go/format/format_test.go /src/goroot/src/go/format/internal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_format '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/format fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:23 Found package in /src/goroot/src/go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:23 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:23 Function Node has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_format.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_format.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/format: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_format/copy/format.go fuzz_ng_go_format/copy/internal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_format/copy/format.go fuzz_ng_go_format/copy/internal.go /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_format/fuzz_ng.go fuzz_ng_go_format/fuzzng_unsure_test.go fuzz_ng_go_format/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/format/benchmark_test.go /src/goroot/src/go/format/example_test.go /src/goroot/src/go/format/format_test.go /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/format/testdata /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/format/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_format/' /src/goroot/src/fuzz_ng_go_format/benchmark_test.go /src/goroot/src/fuzz_ng_go_format/example_test.go /src/goroot/src/fuzz_ng_go_format/format.go /src/goroot/src/fuzz_ng_go_format/format_test.go /src/goroot/src/fuzz_ng_go_format/fuzz_ng.go /src/goroot/src/fuzz_ng_go_format/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_format/internal.go /src/goroot/src/fuzz_ng_go_format/ngolo_helper.go /src/goroot/src/fuzz_ng_go_format/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_format/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_format/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_format /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_format [fuzz_ng_go_format.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:114:5: tests redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./benchmark_test.go:51:5: other declaration of tests
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:170:24: cannot use src (variable of type struct{name string; gen func(*bytes.Buffer, int); n int}) as string value in argument to strings.HasPrefix
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:172:10: invalid operation: cannot slice src (variable of type struct{name string; gen func(*bytes.Buffer, int); n int})
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:173:23: cannot use src (variable of type struct{name string; gen func(*bytes.Buffer, int); n int}) as string value in argument to String
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:174:28: invalid operation: res == src (mismatched types string and struct{name string; gen func(*bytes.Buffer, int); n int})
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:179:23: cannot use src (variable of type struct{name string; gen func(*bytes.Buffer, int); n int}) as string value in argument to String
Step #3 - "compile-libfuzzer-coverage-x86_64": ./format_test.go:182:21: invalid operation: res != src (mismatched types string and struct{name string; gen func(*bytes.Buffer, int); n int})
Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal.go:94:6: format already declared through import of package format ("go/format")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./benchmark_test.go:14:2: other declaration of format
Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal.go:94:6: format already declared through import of package format ("go/format")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./example_test.go:10:2: other declaration of format
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_format [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_format/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_format
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_format_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/doc/comment.go /src/goroot/src/go/doc/comment_test.go /src/goroot/src/go/doc/doc.go /src/goroot/src/go/doc/doc_test.go /src/goroot/src/go/doc/example.go /src/goroot/src/go/doc/example_internal_test.go /src/goroot/src/go/doc/example_test.go /src/goroot/src/go/doc/exports.go /src/goroot/src/go/doc/filter.go /src/goroot/src/go/doc/headscan.go /src/goroot/src/go/doc/reader.go /src/goroot/src/go/doc/synopsis.go /src/goroot/src/go/doc/synopsis_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_doc '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/doc fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Found package in /src/goroot/src/go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Array result for Example is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Type Filter is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Function New has unproduced argument ast.Package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Function NewFromFiles has unproduced argument token.FileSet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Function NewFromFiles has unproduced argument ast.File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Unhandled argument &ast.Ellipsis{Ellipsis:70151, Elt:(*ast.Ident)(0xc0003b0f40)} for NewFromFiles
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Unhandled argument &ast.Ellipsis{Ellipsis:4157, Elt:(*ast.StarExpr)(0xc000214468)} for Examples
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:30 Function Filter has unproduced argument Filter
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_doc.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_doc.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/doc: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_doc/copy/comment.go fuzz_ng_go_doc/copy/doc.go fuzz_ng_go_doc/copy/example.go fuzz_ng_go_doc/copy/exports.go fuzz_ng_go_doc/copy/filter.go fuzz_ng_go_doc/copy/reader.go fuzz_ng_go_doc/copy/synopsis.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_doc/copy/comment.go fuzz_ng_go_doc/copy/doc.go fuzz_ng_go_doc/copy/example.go fuzz_ng_go_doc/copy/exports.go fuzz_ng_go_doc/copy/filter.go fuzz_ng_go_doc/copy/reader.go fuzz_ng_go_doc/copy/synopsis.go /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_doc/fuzz_ng.go fuzz_ng_go_doc/fuzzng_unsure_test.go fuzz_ng_go_doc/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/doc/comment_test.go /src/goroot/src/go/doc/doc_test.go /src/goroot/src/go/doc/example_internal_test.go /src/goroot/src/go/doc/example_test.go /src/goroot/src/go/doc/synopsis_test.go /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/doc/testdata /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_doc/' /src/goroot/src/fuzz_ng_go_doc/comment.go /src/goroot/src/fuzz_ng_go_doc/comment_test.go /src/goroot/src/fuzz_ng_go_doc/doc.go /src/goroot/src/fuzz_ng_go_doc/doc_test.go /src/goroot/src/fuzz_ng_go_doc/example.go /src/goroot/src/fuzz_ng_go_doc/example_internal_test.go /src/goroot/src/fuzz_ng_go_doc/example_test.go /src/goroot/src/fuzz_ng_go_doc/exports.go /src/goroot/src/fuzz_ng_go_doc/filter.go /src/goroot/src/fuzz_ng_go_doc/fuzz_ng.go /src/goroot/src/fuzz_ng_go_doc/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_doc/ngolo_helper.go /src/goroot/src/fuzz_ng_go_doc/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_doc/reader.go /src/goroot/src/fuzz_ng_go_doc/synopsis.go /src/goroot/src/fuzz_ng_go_doc/synopsis_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_doc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_doc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_doc /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_doc [fuzz_ng_go_doc.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_doc [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_doc_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/doc/comment/doc.go /src/goroot/src/go/doc/comment/html.go /src/goroot/src/go/doc/comment/markdown.go /src/goroot/src/go/doc/comment/old_test.go /src/goroot/src/go/doc/comment/parse.go /src/goroot/src/go/doc/comment/parse_test.go /src/goroot/src/go/doc/comment/print.go /src/goroot/src/go/doc/comment/std.go /src/goroot/src/go/doc/comment/std_test.go /src/goroot/src/go/doc/comment/testdata_test.go /src/goroot/src/go/doc/comment/text.go /src/goroot/src/go/doc/comment/wrap_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_doc_comment '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/doc/comment fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Found package in /src/goroot/src/go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Unhandled field &ast.FuncType{Func:19410, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000230db0), Results:(*ast.FieldList)(0xc000230e10)} for struct Parser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Unhandled field &ast.FuncType{Func:19951, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000230e70), Results:(*ast.FieldList)(0xc000230ea0)} for struct Parser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Unhandled field &ast.FuncType{Func:47801, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000014e70), Results:(*ast.FieldList)(0xc000014ea0)} for struct Printer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Unhandled field &ast.FuncType{Func:47986, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000014ed0), Results:(*ast.FieldList)(0xc000014f00)} for struct Printer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Function BlankBefore has unproduced recv List
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Function BlankBetween has unproduced recv List
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Function DefaultURL has unproduced recv DocLink
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:37 Function DefaultID has unproduced recv Heading
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_doc_comment.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_doc_comment.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/doc/comment: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_doc_comment/copy/doc.go fuzz_ng_go_doc_comment/copy/html.go fuzz_ng_go_doc_comment/copy/markdown.go fuzz_ng_go_doc_comment/copy/parse.go fuzz_ng_go_doc_comment/copy/print.go fuzz_ng_go_doc_comment/copy/std.go fuzz_ng_go_doc_comment/copy/text.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_doc_comment/copy/doc.go fuzz_ng_go_doc_comment/copy/html.go fuzz_ng_go_doc_comment/copy/markdown.go fuzz_ng_go_doc_comment/copy/parse.go fuzz_ng_go_doc_comment/copy/print.go fuzz_ng_go_doc_comment/copy/std.go fuzz_ng_go_doc_comment/copy/text.go /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_doc_comment/fuzz_ng.go fuzz_ng_go_doc_comment/fuzzng_unsure_test.go fuzz_ng_go_doc_comment/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/doc/comment/old_test.go /src/goroot/src/go/doc/comment/parse_test.go /src/goroot/src/go/doc/comment/std_test.go /src/goroot/src/go/doc/comment/testdata_test.go /src/goroot/src/go/doc/comment/wrap_test.go /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/doc/comment/testdata /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_doc_comment/' /src/goroot/src/fuzz_ng_go_doc_comment/doc.go /src/goroot/src/fuzz_ng_go_doc_comment/fuzz_ng.go /src/goroot/src/fuzz_ng_go_doc_comment/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_doc_comment/html.go /src/goroot/src/fuzz_ng_go_doc_comment/markdown.go /src/goroot/src/fuzz_ng_go_doc_comment/ngolo_helper.go /src/goroot/src/fuzz_ng_go_doc_comment/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_doc_comment/old_test.go /src/goroot/src/fuzz_ng_go_doc_comment/parse.go /src/goroot/src/fuzz_ng_go_doc_comment/parse_test.go /src/goroot/src/fuzz_ng_go_doc_comment/print.go /src/goroot/src/fuzz_ng_go_doc_comment/std.go /src/goroot/src/fuzz_ng_go_doc_comment/std_test.go /src/goroot/src/fuzz_ng_go_doc_comment/testdata_test.go /src/goroot/src/fuzz_ng_go_doc_comment/text.go /src/goroot/src/fuzz_ng_go_doc_comment/wrap_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_doc_comment/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_doc_comment/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_doc_comment /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_doc_comment [fuzz_ng_go_doc_comment.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_doc_comment [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_doc_comment/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_doc_comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_doc_comment_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/doc/comment/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/doc/comment/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/doc/testdata/a0.go /src/goroot/src/go/doc/testdata/a1.go /src/goroot/src/go/doc/testdata/b.go /src/goroot/src/go/doc/testdata/benchmark.go /src/goroot/src/go/doc/testdata/blank.go /src/goroot/src/go/doc/testdata/bugpara.go /src/goroot/src/go/doc/testdata/c.go /src/goroot/src/go/doc/testdata/d1.go /src/goroot/src/go/doc/testdata/d2.go /src/goroot/src/go/doc/testdata/e.go /src/goroot/src/go/doc/testdata/error1.go /src/goroot/src/go/doc/testdata/error2.go /src/goroot/src/go/doc/testdata/example.go /src/goroot/src/go/doc/testdata/f.go /src/goroot/src/go/doc/testdata/g.go /src/goroot/src/go/doc/testdata/generics.go /src/goroot/src/go/doc/testdata/issue12839.go /src/goroot/src/go/doc/testdata/issue13742.go /src/goroot/src/go/doc/testdata/issue16153.go /src/goroot/src/go/doc/testdata/issue17788.go /src/goroot/src/go/doc/testdata/issue22856.go /src/goroot/src/go/doc/testdata/predeclared.go /src/goroot/src/go/doc/testdata/testing.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 23 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/doc/testdata/examples/empty.go /src/goroot/src/go/doc/testdata/examples/generic_constraints.go /src/goroot/src/go/doc/testdata/examples/import_groups.go /src/goroot/src/go/doc/testdata/examples/import_groups_named.go /src/goroot/src/go/doc/testdata/examples/inspect_signature.go /src/goroot/src/go/doc/testdata/examples/iota.go /src/goroot/src/go/doc/testdata/examples/issue43658.go /src/goroot/src/go/doc/testdata/examples/multiple.go /src/goroot/src/go/doc/testdata/examples/values.go /src/goroot/src/go/doc/testdata/examples/whole_file.go /src/goroot/src/go/doc/testdata/examples/whole_function.go /src/goroot/src/go/doc/testdata/examples/whole_function_external.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata/examples
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata/examples
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata/examples
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/doc/testdata/pkgdoc/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata/pkgdoc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata/pkgdoc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/doc/testdata/pkgdoc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/typeparams/typeparams.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/typeparams
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/srcimporter/srcimporter.go /src/goroot/src/go/internal/srcimporter/srcimporter_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/srcimporter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/internal/srcimporter/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/internal/srcimporter/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/srcimporter/testdata/issue23092/issue23092.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/srcimporter/testdata/issue23092
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/srcimporter/testdata/issue20855/issue20855.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/srcimporter/testdata/issue20855
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/srcimporter/testdata/issue24392/issue24392.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/srcimporter/testdata/issue24392
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/gcimporter/exportdata.go /src/goroot/src/go/internal/gcimporter/gcimporter.go /src/goroot/src/go/internal/gcimporter/gcimporter_test.go /src/goroot/src/go/internal/gcimporter/iimport.go /src/goroot/src/go/internal/gcimporter/support.go /src/goroot/src/go/internal/gcimporter/ureader.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/gcimporter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/gcimporter/testdata/a.go /src/goroot/src/go/internal/gcimporter/testdata/b.go /src/goroot/src/go/internal/gcimporter/testdata/exports.go /src/goroot/src/go/internal/gcimporter/testdata/g.go /src/goroot/src/go/internal/gcimporter/testdata/generics.go /src/goroot/src/go/internal/gcimporter/testdata/issue15920.go /src/goroot/src/go/internal/gcimporter/testdata/issue20046.go /src/goroot/src/go/internal/gcimporter/testdata/issue25301.go /src/goroot/src/go/internal/gcimporter/testdata/issue25596.go /src/goroot/src/go/internal/gcimporter/testdata/issue57015.go /src/goroot/src/go/internal/gcimporter/testdata/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/gcimporter/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/gcimporter/testdata/versions/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/gcimporter/testdata/versions
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/gccgoimporter/ar.go /src/goroot/src/go/internal/gccgoimporter/gccgoinstallation.go /src/goroot/src/go/internal/gccgoimporter/gccgoinstallation_test.go /src/goroot/src/go/internal/gccgoimporter/importer.go /src/goroot/src/go/internal/gccgoimporter/importer_test.go /src/goroot/src/go/internal/gccgoimporter/parser.go /src/goroot/src/go/internal/gccgoimporter/parser_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/gccgoimporter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/internal/gccgoimporter/testdata/aliases.go /src/goroot/src/go/internal/gccgoimporter/testdata/complexnums.go /src/goroot/src/go/internal/gccgoimporter/testdata/conversions.go /src/goroot/src/go/internal/gccgoimporter/testdata/escapeinfo.go /src/goroot/src/go/internal/gccgoimporter/testdata/imports.go /src/goroot/src/go/internal/gccgoimporter/testdata/issue27856.go /src/goroot/src/go/internal/gccgoimporter/testdata/issue29198.go /src/goroot/src/go/internal/gccgoimporter/testdata/issue30628.go /src/goroot/src/go/internal/gccgoimporter/testdata/issue31540.go /src/goroot/src/go/internal/gccgoimporter/testdata/issue34182.go /src/goroot/src/go/internal/gccgoimporter/testdata/nointerface.go /src/goroot/src/go/internal/gccgoimporter/testdata/notinheap.go /src/goroot/src/go/internal/gccgoimporter/testdata/pointer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/internal/gccgoimporter/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/build.go /src/goroot/src/go/build/build_test.go /src/goroot/src/go/build/deps_test.go /src/goroot/src/go/build/doc.go /src/goroot/src/go/build/gc.go /src/goroot/src/go/build/gccgo.go /src/goroot/src/go/build/read.go /src/goroot/src/go/build/read_test.go /src/goroot/src/go/build/syslist.go /src/goroot/src/go/build/syslist_test.go /src/goroot/src/go/build/zcgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_build '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/build fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Found package in /src/goroot/src/go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Type NoGoError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Type MultiplePackageError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:3427, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000236510), Results:(*ast.FieldList)(0xc000236540)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:3605, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000236570), Results:(*ast.FieldList)(0xc0002365d0)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:3753, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000236600), Results:(*ast.FieldList)(0xc000236630)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:3916, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000236660), Results:(*ast.FieldList)(0xc000236690)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:4321, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002366f0), Results:(*ast.FieldList)(0xc000236750)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:4534, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000236780), Results:(*ast.FieldList)(0xc000236810)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Unhandled field &ast.FuncType{Func:4687, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000236840), Results:(*ast.FieldList)(0xc0002368a0)} for struct Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Function Error has unproduced recv NoGoError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:44 Function Error has unproduced recv MultiplePackageError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_build.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_build.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/build: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_build/copy/build.go fuzz_ng_go_build/copy/doc.go fuzz_ng_go_build/copy/gc.go fuzz_ng_go_build/copy/read.go fuzz_ng_go_build/copy/syslist.go fuzz_ng_go_build/copy/zcgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_build/copy/build.go fuzz_ng_go_build/copy/doc.go fuzz_ng_go_build/copy/gc.go fuzz_ng_go_build/copy/read.go fuzz_ng_go_build/copy/syslist.go fuzz_ng_go_build/copy/zcgo.go /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_build/fuzz_ng.go fuzz_ng_go_build/fuzzng_unsure_test.go fuzz_ng_go_build/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/build/build_test.go /src/goroot/src/go/build/deps_test.go /src/goroot/src/go/build/read_test.go /src/goroot/src/go/build/syslist_test.go /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/build/testdata /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_build/' /src/goroot/src/fuzz_ng_go_build/build.go /src/goroot/src/fuzz_ng_go_build/build_test.go /src/goroot/src/fuzz_ng_go_build/deps_test.go /src/goroot/src/fuzz_ng_go_build/doc.go /src/goroot/src/fuzz_ng_go_build/fuzz_ng.go /src/goroot/src/fuzz_ng_go_build/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_build/gc.go /src/goroot/src/fuzz_ng_go_build/ngolo_helper.go /src/goroot/src/fuzz_ng_go_build/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_build/read.go /src/goroot/src/fuzz_ng_go_build/read_test.go /src/goroot/src/fuzz_ng_go_build/syslist.go /src/goroot/src/fuzz_ng_go_build/syslist_test.go /src/goroot/src/fuzz_ng_go_build/zcgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_build/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_build/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_build /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_build [fuzz_ng_go_build.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_build [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_build/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_build
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_build_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/alltags/alltags.go /src/goroot/src/go/build/testdata/alltags/x_netbsd_arm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/alltags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/alltags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/alltags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/withvendor/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/withvendor/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/withvendor/src/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/withvendor/src/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/withvendor/src/a/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/withvendor/src/a/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/withvendor/src/a/vendor/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/withvendor/src/a/vendor/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/withvendor/src/a/vendor/c/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/withvendor/src/a/vendor/c/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/withvendor/src/a/vendor/c/d/d.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/withvendor/src/a/vendor/c/d
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/withvendor/src/a/vendor/c/d
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/withvendor/src/a/b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/withvendor/src/a/b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/withvendor/src/a/b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/empty/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/empty/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/go/build/testdata/bads/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/go/build/testdata/bads/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/multi/file.go /src/goroot/src/go/build/testdata/multi/file_appengine.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/multi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/multi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/multi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/cgo_disabled/cgo_disabled.go /src/goroot/src/go/build/testdata/cgo_disabled/empty.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/cgo_disabled
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/cgo_disabled
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/cgo_disabled
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/doc/a_test.go /src/goroot/src/go/build/testdata/doc/b_test.go /src/goroot/src/go/build/testdata/doc/c_test.go /src/goroot/src/go/build/testdata/doc/d_test.go /src/goroot/src/go/build/testdata/doc/e.go /src/goroot/src/go/build/testdata/doc/f.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/directives/a.go /src/goroot/src/go/build/testdata/directives/a_test.go /src/goroot/src/go/build/testdata/directives/b_test.go /src/goroot/src/go/build/testdata/directives/c_test.go /src/goroot/src/go/build/testdata/directives/d_test.go /src/goroot/src/go/build/testdata/directives/eve.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/directives
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/directives
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/directives
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/non_source_tags/non_source_tags.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/non_source_tags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/non_source_tags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/non_source_tags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/other/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/other
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/other
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/other
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/testdata/other/file/file.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/other/file
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/other/file
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/testdata/other/file
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/build/constraint/expr.go /src/goroot/src/go/build/constraint/expr_test.go /src/goroot/src/go/build/constraint/vers.go /src/goroot/src/go/build/constraint/vers_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_build_constraint '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/build/constraint fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Found package in /src/goroot/src/go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Type SyntaxError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Unhandled argument &ast.FuncType{Func:3765, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002a2360), Results:(*ast.FieldList)(0xc0002a2390)} for TagExprNgdotEval
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function Eval has unproduced recv NotExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function String has unproduced recv NotExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function Eval has unproduced recv AndExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function String has unproduced recv AndExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function Eval has unproduced recv OrExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function String has unproduced recv OrExpr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:51 Function Error has unproduced recv SyntaxError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_build_constraint.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_build_constraint.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/build/constraint: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_build_constraint/copy/expr.go fuzz_ng_go_build_constraint/copy/vers.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_build_constraint/copy/expr.go fuzz_ng_go_build_constraint/copy/vers.go /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_build_constraint/fuzz_ng.go fuzz_ng_go_build_constraint/fuzzng_unsure_test.go fuzz_ng_go_build_constraint/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/build/constraint/expr_test.go /src/goroot/src/go/build/constraint/vers_test.go /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/build/constraint/testdata /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/build/constraint/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_build_constraint/' /src/goroot/src/fuzz_ng_go_build_constraint/expr.go /src/goroot/src/fuzz_ng_go_build_constraint/expr_test.go /src/goroot/src/fuzz_ng_go_build_constraint/fuzz_ng.go /src/goroot/src/fuzz_ng_go_build_constraint/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_build_constraint/ngolo_helper.go /src/goroot/src/fuzz_ng_go_build_constraint/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_build_constraint/vers.go /src/goroot/src/fuzz_ng_go_build_constraint/vers_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_build_constraint/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_build_constraint/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_build_constraint /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_build_constraint [fuzz_ng_go_build_constraint.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_build_constraint [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_build_constraint/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_build_constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_build_constraint_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/go/version/version.go /src/goroot/src/go/version/version_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^go_version '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing go/version fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:12:57 Found package in /src/goroot/src/go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/go_version.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/go_version.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module go/version: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_go_version/copy/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_version/copy/version.go /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_go_version/fuzz_ng.go fuzz_ng_go_version/fuzzng_unsure_test.go fuzz_ng_go_version/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/go/version/version_test.go /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/go/version/testdata /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/go/version/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_go_version/' /src/goroot/src/fuzz_ng_go_version/fuzz_ng.go /src/goroot/src/fuzz_ng_go_version/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_go_version/ngolo_helper.go /src/goroot/src/fuzz_ng_go_version/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_go_version/version.go /src/goroot/src/fuzz_ng_go_version/version_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_version/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_go_version/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_go_version /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_go_version [fuzz_ng_go_version.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_go_version [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_go_version/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_go_version
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_go_version_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/sort/example_interface_test.go /src/goroot/src/sort/example_keys_test.go /src/goroot/src/sort/example_multi_test.go /src/goroot/src/sort/example_search_test.go /src/goroot/src/sort/example_test.go /src/goroot/src/sort/example_wrapper_test.go /src/goroot/src/sort/export_test.go /src/goroot/src/sort/gen_sort_variants.go /src/goroot/src/sort/search.go /src/goroot/src/sort/search_test.go /src/goroot/src/sort/slice.go /src/goroot/src/sort/sort.go /src/goroot/src/sort/sort_impl_120.go /src/goroot/src/sort/sort_impl_go121.go /src/goroot/src/sort/sort_slices_benchmark_test.go /src/goroot/src/sort/sort_test.go /src/goroot/src/sort/zsortfunc.go /src/goroot/src/sort/zsortinterface.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 18 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^sort '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing sort fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Found package in /src/goroot/src/sort
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Type IntSlice is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Type Float64Slice is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Type StringSlice is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Unhandled argument &ast.FuncType{Func:38633, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000356000), Results:(*ast.FieldList)(0xc000356030)} for Search
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Unhandled argument &ast.FuncType{Func:40150, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0003562a0), Results:(*ast.FieldList)(0xc0003562d0)} for Find
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Search has unproduced recv IntSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Search has unproduced recv Float64Slice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Search has unproduced recv StringSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Unhandled argument &ast.FuncType{Func:35214, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002a0840), Results:(*ast.FieldList)(0xc0002a0870)} for Slice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Unhandled argument &ast.FuncType{Func:35802, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002a0990), Results:(*ast.FieldList)(0xc0002a09c0)} for SliceStable
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Unhandled argument &ast.FuncType{Func:36207, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002a0ae0), Results:(*ast.FieldList)(0xc0002a0b10)} for SliceIsSorted
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Len has unproduced recv IntSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Less has unproduced recv IntSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Swap has unproduced recv IntSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Sort has unproduced recv IntSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Len has unproduced recv Float64Slice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Less has unproduced recv Float64Slice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Swap has unproduced recv Float64Slice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Sort has unproduced recv Float64Slice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Len has unproduced recv StringSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Less has unproduced recv StringSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Swap has unproduced recv StringSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:03 Function Sort has unproduced recv StringSlice
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/sort.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/sort.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:10:12: "float64" is not defined.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:27:12: "float64" is not defined.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:36:12: "float64" is not defined.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:10:12: "float64" is not defined.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:27:12: "float64" is not defined.
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:36:12: "float64" is not defined.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module sort: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sort [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sort.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:175:38: InterfaceResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:176:2: InterfaceResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:238:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:239:2: InterfaceNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:240:2: InterfaceResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_sort/copy/search.go fuzz_ng_sort/copy/slice.go fuzz_ng_sort/copy/sort.go fuzz_ng_sort/copy/sort_impl_go121.go fuzz_ng_sort/copy/zsortfunc.go fuzz_ng_sort/copy/zsortinterface.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_sort/copy/search.go fuzz_ng_sort/copy/slice.go fuzz_ng_sort/copy/sort.go fuzz_ng_sort/copy/sort_impl_go121.go fuzz_ng_sort/copy/zsortfunc.go fuzz_ng_sort/copy/zsortinterface.go /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_sort/fuzz_ng.go fuzz_ng_sort/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/sort/example_interface_test.go /src/goroot/src/sort/example_keys_test.go /src/goroot/src/sort/example_multi_test.go /src/goroot/src/sort/example_search_test.go /src/goroot/src/sort/example_test.go /src/goroot/src/sort/example_wrapper_test.go /src/goroot/src/sort/export_test.go /src/goroot/src/sort/search_test.go /src/goroot/src/sort/sort_slices_benchmark_test.go /src/goroot/src/sort/sort_test.go /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/sort/testdata /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/sort/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_sort/' /src/goroot/src/fuzz_ng_sort/example_interface_test.go /src/goroot/src/fuzz_ng_sort/example_keys_test.go /src/goroot/src/fuzz_ng_sort/example_multi_test.go /src/goroot/src/fuzz_ng_sort/example_search_test.go /src/goroot/src/fuzz_ng_sort/example_test.go /src/goroot/src/fuzz_ng_sort/example_wrapper_test.go /src/goroot/src/fuzz_ng_sort/export_test.go /src/goroot/src/fuzz_ng_sort/fuzz_ng.go /src/goroot/src/fuzz_ng_sort/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_sort/ngolo_helper.go /src/goroot/src/fuzz_ng_sort/search.go /src/goroot/src/fuzz_ng_sort/search_test.go /src/goroot/src/fuzz_ng_sort/slice.go /src/goroot/src/fuzz_ng_sort/sort.go /src/goroot/src/fuzz_ng_sort/sort_impl_go121.go /src/goroot/src/fuzz_ng_sort/sort_slices_benchmark_test.go /src/goroot/src/fuzz_ng_sort/sort_test.go /src/goroot/src/fuzz_ng_sort/zsortfunc.go /src/goroot/src/fuzz_ng_sort/zsortinterface.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_sort/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_sort/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_sort /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_sort [fuzz_ng_sort.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.go:58:6: Search already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/search.go:58:6: other declaration of Search
Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.go:123:6: SearchInts already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/search.go:123:6: other declaration of SearchInts
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slice.go:41:6: SliceStable already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/slice.go:41:6: other declaration of SliceStable
Step #3 - "compile-libfuzzer-coverage-x86_64": ./slice.go:52:6: SliceIsSorted already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/slice.go:52:6: other declaration of SliceIsSorted
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:14:6: Interface already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/sort.go:14:6: other declaration of Interface
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:45:6: Sort already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/sort.go:45:6: other declaration of Sort
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:165:6: Ints already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/sort.go:165:6: other declaration of Ints
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:171:6: Float64s already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/sort.go:171:6: other declaration of Float64s
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:181:6: IntsAreSorted already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/sort.go:181:6: other declaration of IntsAreSorted
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sort.go:187:6: Float64sAreSorted already declared through dot-import of package sort ("sort")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sort/sort.go:187:6: other declaration of Float64sAreSorted
Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.go:58:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_sort [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_sort/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_sort_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo sort
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/strings/builder.go /src/goroot/src/strings/builder_test.go /src/goroot/src/strings/clone.go /src/goroot/src/strings/clone_test.go /src/goroot/src/strings/compare.go /src/goroot/src/strings/compare_test.go /src/goroot/src/strings/example_test.go /src/goroot/src/strings/export_test.go /src/goroot/src/strings/reader.go /src/goroot/src/strings/reader_test.go /src/goroot/src/strings/replace.go /src/goroot/src/strings/replace_test.go /src/goroot/src/strings/search.go /src/goroot/src/strings/search_test.go /src/goroot/src/strings/strings.go /src/goroot/src/strings/strings_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 16 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^strings '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits Repeat.count'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits Repeat.count strings fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Found package in /src/goroot/src/strings
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Type Builder is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function String has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function Len has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function Cap has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function Reset has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function Grow has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function Write has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function WriteByte has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function WriteRune has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function WriteString has unproduced recv Builder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.Ellipsis{Ellipsis:38378, Elt:(*ast.Ident)(0xc000244bc0)} for NewReplacer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:1881, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001b64b0), Results:(*ast.FieldList)(0xc0001b64e0)} for ContainsFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:9734, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c2e40), Results:(*ast.FieldList)(0xc0001c2e70)} for FieldsFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:12132, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c39e0), Results:(*ast.FieldList)(0xc0001c3a10)} for Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function ToUpperSpecial has unproduced argument unicode.SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function ToLowerSpecial has unproduced argument unicode.SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Function ToTitleSpecial has unproduced argument unicode.SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:19642, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001d9d10), Results:(*ast.FieldList)(0xc0001d9d40)} for TrimLeftFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:19891, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001d9ec0), Results:(*ast.FieldList)(0xc0001d9ef0)} for TrimRightFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:20229, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001e81b0), Results:(*ast.FieldList)(0xc0001e81e0)} for TrimFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:20438, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001e8300), Results:(*ast.FieldList)(0xc0001e8330)} for IndexFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:08 Unhandled argument &ast.FuncType{Func:20636, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001e8450), Results:(*ast.FieldList)(0xc0001e8480)} for LastIndexFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/strings.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/strings.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo strings
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module strings: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_strings/copy/builder.go fuzz_ng_strings/copy/clone.go fuzz_ng_strings/copy/compare.go fuzz_ng_strings/copy/reader.go fuzz_ng_strings/copy/replace.go fuzz_ng_strings/copy/search.go fuzz_ng_strings/copy/strings.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_strings/copy/reader.go:161:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_strings/copy/strings.go:314:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_strings/copy/strings.go:691:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_strings/copy/strings.go:717:2: expected declaration, found 'for'
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_strings/copy/builder.go fuzz_ng_strings/copy/clone.go fuzz_ng_strings/copy/compare.go fuzz_ng_strings/copy/reader.go fuzz_ng_strings/copy/replace.go fuzz_ng_strings/copy/search.go fuzz_ng_strings/copy/strings.go /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_strings/fuzz_ng.go fuzz_ng_strings/fuzzng_unsure_test.go fuzz_ng_strings/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/strings/builder_test.go /src/goroot/src/strings/clone_test.go /src/goroot/src/strings/compare_test.go /src/goroot/src/strings/example_test.go /src/goroot/src/strings/export_test.go /src/goroot/src/strings/reader_test.go /src/goroot/src/strings/replace_test.go /src/goroot/src/strings/search_test.go /src/goroot/src/strings/strings_test.go /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/strings/testdata /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/strings/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_strings/' /src/goroot/src/fuzz_ng_strings/builder.go /src/goroot/src/fuzz_ng_strings/builder_test.go /src/goroot/src/fuzz_ng_strings/clone.go /src/goroot/src/fuzz_ng_strings/clone_test.go /src/goroot/src/fuzz_ng_strings/compare.go /src/goroot/src/fuzz_ng_strings/compare_test.go /src/goroot/src/fuzz_ng_strings/example_test.go /src/goroot/src/fuzz_ng_strings/export_test.go /src/goroot/src/fuzz_ng_strings/fuzz_ng.go /src/goroot/src/fuzz_ng_strings/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_strings/ngolo_helper.go /src/goroot/src/fuzz_ng_strings/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_strings/reader.go /src/goroot/src/fuzz_ng_strings/reader_test.go /src/goroot/src/fuzz_ng_strings/replace.go /src/goroot/src/fuzz_ng_strings/replace_test.go /src/goroot/src/fuzz_ng_strings/search.go /src/goroot/src/fuzz_ng_strings/search_test.go /src/goroot/src/fuzz_ng_strings/strings.go /src/goroot/src/fuzz_ng_strings/strings_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_strings/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_strings/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_strings /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_strings [fuzz_ng_strings.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./reader.go:161:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./strings.go:314:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./strings.go:691:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_strings [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_strings/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_strings_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo strings
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/html/entity.go /src/goroot/src/html/entity_test.go /src/goroot/src/html/escape.go /src/goroot/src/html/escape_test.go /src/goroot/src/html/example_test.go /src/goroot/src/html/fuzz_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package html
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^html '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing html fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:18 Found package in /src/goroot/src/html
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/html.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/html.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=html
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_html
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module html: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_html/copy/entity.go fuzz_ng_html/copy/escape.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_html/copy/entity.go fuzz_ng_html/copy/escape.go /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_html/fuzz_ng.go fuzz_ng_html/fuzzng_unsure_test.go fuzz_ng_html/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/html/entity_test.go /src/goroot/src/html/escape_test.go /src/goroot/src/html/example_test.go /src/goroot/src/html/fuzz_test.go /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/html/testdata /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/html/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_html/' /src/goroot/src/fuzz_ng_html/entity.go /src/goroot/src/fuzz_ng_html/entity_test.go /src/goroot/src/fuzz_ng_html/escape.go /src/goroot/src/fuzz_ng_html/escape_test.go /src/goroot/src/fuzz_ng_html/example_test.go /src/goroot/src/fuzz_ng_html/fuzz_ng.go /src/goroot/src/fuzz_ng_html/fuzz_test.go /src/goroot/src/fuzz_ng_html/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_html/ngolo_helper.go /src/goroot/src/fuzz_ng_html/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_html/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_html/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_html /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_html [fuzz_ng_html.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_html [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_html/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_html
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_html_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo html
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/html/template/attr.go /src/goroot/src/html/template/attr_string.go /src/goroot/src/html/template/clone_test.go /src/goroot/src/html/template/content.go /src/goroot/src/html/template/content_test.go /src/goroot/src/html/template/context.go /src/goroot/src/html/template/css.go /src/goroot/src/html/template/css_test.go /src/goroot/src/html/template/delim_string.go /src/goroot/src/html/template/doc.go /src/goroot/src/html/template/element_string.go /src/goroot/src/html/template/error.go /src/goroot/src/html/template/escape.go /src/goroot/src/html/template/escape_test.go /src/goroot/src/html/template/example_test.go /src/goroot/src/html/template/examplefiles_test.go /src/goroot/src/html/template/exec_test.go /src/goroot/src/html/template/html.go /src/goroot/src/html/template/html_test.go /src/goroot/src/html/template/js.go /src/goroot/src/html/template/js_test.go /src/goroot/src/html/template/jsctx_string.go /src/goroot/src/html/template/multi_test.go /src/goroot/src/html/template/state_string.go /src/goroot/src/html/template/template.go /src/goroot/src/html/template/template_test.go /src/goroot/src/html/template/transition.go /src/goroot/src/html/template/transition_test.go /src/goroot/src/html/template/url.go /src/goroot/src/html/template/url_test.go /src/goroot/src/html/template/urlpart_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 31 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^html_template '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude ParseGlob'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude ParseGlob html/template fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Found package in /src/goroot/src/html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Array result for Template is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Type FuncMap is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:146933, Elt:(*ast.Ident)(0xc000383640)} for HTMLEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:147431, Elt:(*ast.Ident)(0xc000170c20)} for JSEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:147657, Elt:(*ast.Ident)(0xc000490ba0)} for URLQueryEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:17299, Elt:(*ast.Ident)(0xc000298aa0)} for TemplateNgdotOption
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Function AddParseTree has unproduced argument parse.Tree
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Function Funcs has unproduced argument FuncMap
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Function Must has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:26926, Elt:(*ast.Ident)(0xc0002ee0a0)} for ParseFiles
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:27489, Elt:(*ast.Ident)(0xc0002ee280)} for TemplateNgdotParseFiles
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Function ParseFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:31119, Elt:(*ast.Ident)(0xc0002efa40)} for ParseFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Function ParseFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:24 Unhandled argument &ast.Ellipsis{Ellipsis:31486, Elt:(*ast.Ident)(0xc0002efc80)} for TemplateNgdotParseFS
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/html_template.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/html_template.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module html/template: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_html_template/copy/attr.go fuzz_ng_html_template/copy/attr_string.go fuzz_ng_html_template/copy/content.go fuzz_ng_html_template/copy/context.go fuzz_ng_html_template/copy/css.go fuzz_ng_html_template/copy/delim_string.go fuzz_ng_html_template/copy/doc.go fuzz_ng_html_template/copy/element_string.go fuzz_ng_html_template/copy/error.go fuzz_ng_html_template/copy/escape.go fuzz_ng_html_template/copy/html.go fuzz_ng_html_template/copy/js.go fuzz_ng_html_template/copy/jsctx_string.go fuzz_ng_html_template/copy/state_string.go fuzz_ng_html_template/copy/template.go fuzz_ng_html_template/copy/transition.go fuzz_ng_html_template/copy/url.go fuzz_ng_html_template/copy/urlpart_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_html_template/copy/attr.go fuzz_ng_html_template/copy/attr_string.go fuzz_ng_html_template/copy/content.go fuzz_ng_html_template/copy/context.go fuzz_ng_html_template/copy/css.go fuzz_ng_html_template/copy/delim_string.go fuzz_ng_html_template/copy/doc.go fuzz_ng_html_template/copy/element_string.go fuzz_ng_html_template/copy/error.go fuzz_ng_html_template/copy/escape.go fuzz_ng_html_template/copy/html.go fuzz_ng_html_template/copy/js.go fuzz_ng_html_template/copy/jsctx_string.go fuzz_ng_html_template/copy/state_string.go fuzz_ng_html_template/copy/template.go fuzz_ng_html_template/copy/transition.go fuzz_ng_html_template/copy/url.go fuzz_ng_html_template/copy/urlpart_string.go /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_html_template/fuzz_ng.go fuzz_ng_html_template/fuzzng_unsure_test.go fuzz_ng_html_template/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/html/template/clone_test.go /src/goroot/src/html/template/content_test.go /src/goroot/src/html/template/css_test.go /src/goroot/src/html/template/escape_test.go /src/goroot/src/html/template/example_test.go /src/goroot/src/html/template/examplefiles_test.go /src/goroot/src/html/template/exec_test.go /src/goroot/src/html/template/html_test.go /src/goroot/src/html/template/js_test.go /src/goroot/src/html/template/multi_test.go /src/goroot/src/html/template/template_test.go /src/goroot/src/html/template/transition_test.go /src/goroot/src/html/template/url_test.go /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/html/template/testdata /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_html_template/' /src/goroot/src/fuzz_ng_html_template/attr.go /src/goroot/src/fuzz_ng_html_template/attr_string.go /src/goroot/src/fuzz_ng_html_template/clone_test.go /src/goroot/src/fuzz_ng_html_template/content.go /src/goroot/src/fuzz_ng_html_template/content_test.go /src/goroot/src/fuzz_ng_html_template/context.go /src/goroot/src/fuzz_ng_html_template/css.go /src/goroot/src/fuzz_ng_html_template/css_test.go /src/goroot/src/fuzz_ng_html_template/delim_string.go /src/goroot/src/fuzz_ng_html_template/doc.go /src/goroot/src/fuzz_ng_html_template/element_string.go /src/goroot/src/fuzz_ng_html_template/error.go /src/goroot/src/fuzz_ng_html_template/escape.go /src/goroot/src/fuzz_ng_html_template/escape_test.go /src/goroot/src/fuzz_ng_html_template/example_test.go /src/goroot/src/fuzz_ng_html_template/examplefiles_test.go /src/goroot/src/fuzz_ng_html_template/exec_test.go /src/goroot/src/fuzz_ng_html_template/fuzz_ng.go /src/goroot/src/fuzz_ng_html_template/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_html_template/html.go /src/goroot/src/fuzz_ng_html_template/html_test.go /src/goroot/src/fuzz_ng_html_template/js.go /src/goroot/src/fuzz_ng_html_template/js_test.go /src/goroot/src/fuzz_ng_html_template/jsctx_string.go /src/goroot/src/fuzz_ng_html_template/multi_test.go /src/goroot/src/fuzz_ng_html_template/ngolo_helper.go /src/goroot/src/fuzz_ng_html_template/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_html_template/state_string.go /src/goroot/src/fuzz_ng_html_template/template.go /src/goroot/src/fuzz_ng_html_template/template_test.go /src/goroot/src/fuzz_ng_html_template/transition.go /src/goroot/src/fuzz_ng_html_template/transition_test.go /src/goroot/src/fuzz_ng_html_template/url.go /src/goroot/src/fuzz_ng_html_template/url_test.go /src/goroot/src/fuzz_ng_html_template/urlpart_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_html_template/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_html_template/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_html_template /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_html_template [fuzz_ng_html_template.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./error.go:13:6: Error already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/error.go:13:6: other declaration of Error
Step #3 - "compile-libfuzzer-coverage-x86_64": ./error.go:115:2: ErrEndContext already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/error.go:115:2: other declaration of ErrEndContext
Step #3 - "compile-libfuzzer-coverage-x86_64": ./error.go:160:2: ErrPartialEscape already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/error.go:160:2: other declaration of ErrPartialEscape
Step #3 - "compile-libfuzzer-coverage-x86_64": ./error.go:173:2: ErrRangeLoopReentry already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/error.go:173:2: other declaration of ErrRangeLoopReentry
Step #3 - "compile-libfuzzer-coverage-x86_64": ./error.go:228:2: ErrJSTemplate already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/error.go:228:2: other declaration of ErrJSTemplate
Step #3 - "compile-libfuzzer-coverage-x86_64": ./escape.go:969:6: HTMLEscape already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/escape.go:969:6: other declaration of HTMLEscape
Step #3 - "compile-libfuzzer-coverage-x86_64": ./escape.go:1004:6: URLQueryEscaper already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/escape.go:1002:6: other declaration of URLQueryEscaper
Step #3 - "compile-libfuzzer-coverage-x86_64": ./template.go:492:6: ParseFS already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/template.go:491:6: other declaration of ParseFS
Step #3 - "compile-libfuzzer-coverage-x86_64": ./content.go:25:2: CSS already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/content.go:25:2: other declaration of CSS
Step #3 - "compile-libfuzzer-coverage-x86_64": ./content.go:43:2: HTMLAttr already declared through dot-import of package template ("html/template")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/html/template/content.go:43:2: other declaration of HTMLAttr
Step #3 - "compile-libfuzzer-coverage-x86_64": ./escape.go:1004:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_html_template [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_html_template/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_html_template
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_html_template_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/html/template/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/html/template/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/unsafe/unsafe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^unsafe '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing unsafe fuzz_ng_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:31 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:31 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/unsafe.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/unsafe.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_unsafe: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_unsafe: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module unsafe: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing [github.com/catenacyber/ngolo-fuzzing.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_unsafe/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_unsafe/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_unsafe/copy/*.go' /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_unsafe/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_unsafe/*.go' /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_unsafe/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/unsafe/*_test.go' /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/unsafe/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/unsafe/testdata /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/unsafe/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_unsafe/' /src/goroot/src/fuzz_ng_unsafe/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unsafe/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unsafe/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_unsafe /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_unsafe [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_unsafe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_unsafe: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_unsafe_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/container/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/container/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/container/list/example_test.go /src/goroot/src/container/list/list.go /src/goroot/src/container/list/list_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^container_list '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing container/list fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:33 Found package in /src/goroot/src/container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/container_list.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/container_list.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module container/list: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_container_list/copy/list.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_container_list/copy/list.go /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_container_list/fuzz_ng.go fuzz_ng_container_list/fuzzng_unsure_test.go fuzz_ng_container_list/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/container/list/example_test.go /src/goroot/src/container/list/list_test.go /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/container/list/testdata /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/container/list/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_container_list/' /src/goroot/src/fuzz_ng_container_list/example_test.go /src/goroot/src/fuzz_ng_container_list/fuzz_ng.go /src/goroot/src/fuzz_ng_container_list/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_container_list/list.go /src/goroot/src/fuzz_ng_container_list/list_test.go /src/goroot/src/fuzz_ng_container_list/ngolo_helper.go /src/goroot/src/fuzz_ng_container_list/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_container_list/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_container_list/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_container_list /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_container_list [fuzz_ng_container_list.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_container_list [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_container_list/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_list
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_container_list_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/container/ring/example_test.go /src/goroot/src/container/ring/ring.go /src/goroot/src/container/ring/ring_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^container_ring '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits RingNgdotMove.n,New.n,RingNgdotUnlink.n'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits RingNgdotMove.n,New.n,RingNgdotUnlink.n container/ring fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:40 Found package in /src/goroot/src/container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:40 Unhandled argument &ast.FuncType{Func:3116, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001b24e0), Results:(*ast.FieldList)(nil)} for RingNgdotDo
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/container_ring.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/container_ring.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module container/ring: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_container_ring/copy/ring.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_container_ring/copy/ring.go /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_container_ring/fuzz_ng.go fuzz_ng_container_ring/fuzzng_unsure_test.go fuzz_ng_container_ring/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/container/ring/example_test.go /src/goroot/src/container/ring/ring_test.go /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/container/ring/testdata /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/container/ring/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_container_ring/' /src/goroot/src/fuzz_ng_container_ring/example_test.go /src/goroot/src/fuzz_ng_container_ring/fuzz_ng.go /src/goroot/src/fuzz_ng_container_ring/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_container_ring/ngolo_helper.go /src/goroot/src/fuzz_ng_container_ring/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_container_ring/ring.go /src/goroot/src/fuzz_ng_container_ring/ring_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_container_ring/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_container_ring/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_container_ring /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_container_ring [fuzz_ng_container_ring.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_container_ring [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_container_ring/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_container_ring_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/container/heap/example_intheap_test.go /src/goroot/src/container/heap/example_pq_test.go /src/goroot/src/container/heap/heap.go /src/goroot/src/container/heap/heap_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^container_heap '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing container/heap fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Found package in /src/goroot/src/container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Type Interface is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Function Init has unproduced argument Interface
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Function Push has unproduced argument Interface
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Function Pop has unproduced argument Interface
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Function Remove has unproduced argument Interface
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:46 Function Fix has unproduced argument Interface
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/container_heap.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/container_heap.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module container/heap: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_heap [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_container_heap.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "container/heap" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_container_heap/copy/heap.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_container_heap/copy/heap.go /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_container_heap/fuzz_ng.go fuzz_ng_container_heap/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/container/heap/example_intheap_test.go /src/goroot/src/container/heap/example_pq_test.go /src/goroot/src/container/heap/heap_test.go /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/container/heap/testdata /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/container/heap/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_container_heap/' /src/goroot/src/fuzz_ng_container_heap/example_intheap_test.go /src/goroot/src/fuzz_ng_container_heap/example_pq_test.go /src/goroot/src/fuzz_ng_container_heap/fuzz_ng.go /src/goroot/src/fuzz_ng_container_heap/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_container_heap/heap.go /src/goroot/src/fuzz_ng_container_heap/heap_test.go /src/goroot/src/fuzz_ng_container_heap/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_container_heap/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_container_heap/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_container_heap /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_container_heap [fuzz_ng_container_heap.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_container_heap [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_container_heap/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_container_heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_container_heap_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/archive/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/archive/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/archive/tar/common.go /src/goroot/src/archive/tar/example_test.go /src/goroot/src/archive/tar/format.go /src/goroot/src/archive/tar/fuzz_test.go /src/goroot/src/archive/tar/reader.go /src/goroot/src/archive/tar/reader_test.go /src/goroot/src/archive/tar/stat_actime1.go /src/goroot/src/archive/tar/stat_actime2.go /src/goroot/src/archive/tar/stat_unix.go /src/goroot/src/archive/tar/strconv.go /src/goroot/src/archive/tar/strconv_test.go /src/goroot/src/archive/tar/tar_test.go /src/goroot/src/archive/tar/writer.go /src/goroot/src/archive/tar/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^archive_tar '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing archive/tar fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:48 Found package in /src/goroot/src/archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:48 Function FileInfoHeader has unproduced argument fs.FileInfo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:48 Function AddFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/archive_tar.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/archive_tar.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module archive/tar: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_archive_tar/copy/common.go fuzz_ng_archive_tar/copy/format.go fuzz_ng_archive_tar/copy/reader.go fuzz_ng_archive_tar/copy/stat_actime1.go fuzz_ng_archive_tar/copy/stat_unix.go fuzz_ng_archive_tar/copy/strconv.go fuzz_ng_archive_tar/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_archive_tar/copy/common.go fuzz_ng_archive_tar/copy/format.go fuzz_ng_archive_tar/copy/reader.go fuzz_ng_archive_tar/copy/stat_actime1.go fuzz_ng_archive_tar/copy/stat_unix.go fuzz_ng_archive_tar/copy/strconv.go fuzz_ng_archive_tar/copy/writer.go /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_archive_tar/fuzz_ng.go fuzz_ng_archive_tar/fuzzng_unsure_test.go fuzz_ng_archive_tar/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/archive/tar/example_test.go /src/goroot/src/archive/tar/fuzz_test.go /src/goroot/src/archive/tar/reader_test.go /src/goroot/src/archive/tar/strconv_test.go /src/goroot/src/archive/tar/tar_test.go /src/goroot/src/archive/tar/writer_test.go /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/archive/tar/testdata /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_archive_tar/' /src/goroot/src/fuzz_ng_archive_tar/common.go /src/goroot/src/fuzz_ng_archive_tar/example_test.go /src/goroot/src/fuzz_ng_archive_tar/format.go /src/goroot/src/fuzz_ng_archive_tar/fuzz_ng.go /src/goroot/src/fuzz_ng_archive_tar/fuzz_test.go /src/goroot/src/fuzz_ng_archive_tar/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_archive_tar/ngolo_helper.go /src/goroot/src/fuzz_ng_archive_tar/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_archive_tar/reader.go /src/goroot/src/fuzz_ng_archive_tar/reader_test.go /src/goroot/src/fuzz_ng_archive_tar/stat_actime1.go /src/goroot/src/fuzz_ng_archive_tar/stat_unix.go /src/goroot/src/fuzz_ng_archive_tar/strconv.go /src/goroot/src/fuzz_ng_archive_tar/strconv_test.go /src/goroot/src/fuzz_ng_archive_tar/tar_test.go /src/goroot/src/fuzz_ng_archive_tar/writer.go /src/goroot/src/fuzz_ng_archive_tar/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_archive_tar/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_archive_tar/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_archive_tar /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_archive_tar [fuzz_ng_archive_tar.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_archive_tar [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_archive_tar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_archive_tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_archive_tar_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/archive/tar/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/archive/tar/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/archive/zip/example_test.go /src/goroot/src/archive/zip/fuzz_test.go /src/goroot/src/archive/zip/reader.go /src/goroot/src/archive/zip/reader_test.go /src/goroot/src/archive/zip/register.go /src/goroot/src/archive/zip/struct.go /src/goroot/src/archive/zip/writer.go /src/goroot/src/archive/zip/writer_test.go /src/goroot/src/archive/zip/zip_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^archive_zip '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing archive/zip fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Found package in /src/goroot/src/archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Type File is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Type Compressor is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Type Decompressor is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function RegisterDecompressor has unproduced argument Decompressor
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function DataOffset has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function Open has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function OpenRaw has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function RegisterDecompressor has unproduced argument Decompressor
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function RegisterCompressor has unproduced argument Compressor
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function FileInfoHeader has unproduced argument fs.FileInfo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function SetModTime has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function SetMode has unproduced argument fs.FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function Copy has unproduced argument File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function RegisterCompressor has unproduced argument Compressor
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:13:55 Function AddFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/archive_zip.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/archive_zip.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module archive/zip: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_archive_zip/copy/reader.go fuzz_ng_archive_zip/copy/register.go fuzz_ng_archive_zip/copy/struct.go fuzz_ng_archive_zip/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_archive_zip/copy/reader.go fuzz_ng_archive_zip/copy/register.go fuzz_ng_archive_zip/copy/struct.go fuzz_ng_archive_zip/copy/writer.go /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_archive_zip/fuzz_ng.go fuzz_ng_archive_zip/fuzzng_unsure_test.go fuzz_ng_archive_zip/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/archive/zip/example_test.go /src/goroot/src/archive/zip/fuzz_test.go /src/goroot/src/archive/zip/reader_test.go /src/goroot/src/archive/zip/writer_test.go /src/goroot/src/archive/zip/zip_test.go /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/archive/zip/testdata /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_archive_zip/' /src/goroot/src/fuzz_ng_archive_zip/example_test.go /src/goroot/src/fuzz_ng_archive_zip/fuzz_ng.go /src/goroot/src/fuzz_ng_archive_zip/fuzz_test.go /src/goroot/src/fuzz_ng_archive_zip/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_archive_zip/ngolo_helper.go /src/goroot/src/fuzz_ng_archive_zip/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_archive_zip/reader.go /src/goroot/src/fuzz_ng_archive_zip/reader_test.go /src/goroot/src/fuzz_ng_archive_zip/register.go /src/goroot/src/fuzz_ng_archive_zip/struct.go /src/goroot/src/fuzz_ng_archive_zip/writer.go /src/goroot/src/fuzz_ng_archive_zip/writer_test.go /src/goroot/src/fuzz_ng_archive_zip/zip_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_archive_zip/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_archive_zip/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_archive_zip /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_archive_zip [fuzz_ng_archive_zip.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_archive_zip [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_archive_zip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_archive_zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_archive_zip_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/archive/zip/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/archive/zip/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/path/example_test.go /src/goroot/src/path/match.go /src/goroot/src/path/match_test.go /src/goroot/src/path/path.go /src/goroot/src/path/path_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package path
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^path '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing path fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:01 Found package in /src/goroot/src/path
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:01 Unhandled argument &ast.Ellipsis{Ellipsis:4152, Elt:(*ast.Ident)(0xc0001b1420)} for Join
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/path.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/path.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=path
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_path
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module path: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_path/copy/match.go fuzz_ng_path/copy/path.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_path/copy/match.go fuzz_ng_path/copy/path.go /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_path/fuzz_ng.go fuzz_ng_path/fuzzng_unsure_test.go fuzz_ng_path/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/path/example_test.go /src/goroot/src/path/match_test.go /src/goroot/src/path/path_test.go /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/path/testdata /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/path/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_path/' /src/goroot/src/fuzz_ng_path/example_test.go /src/goroot/src/fuzz_ng_path/fuzz_ng.go /src/goroot/src/fuzz_ng_path/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_path/match.go /src/goroot/src/fuzz_ng_path/match_test.go /src/goroot/src/fuzz_ng_path/ngolo_helper.go /src/goroot/src/fuzz_ng_path/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_path/path.go /src/goroot/src/fuzz_ng_path/path_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_path/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_path/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_path /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_path [fuzz_ng_path.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:72:6: Clean already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:72:6: other declaration of Clean
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:146:6: Split already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:145:6: other declaration of Split
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:157:6: Join already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:155:6: other declaration of Join
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:181:6: Ext already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:179:6: other declaration of Ext
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:195:6: Base already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:192:6: other declaration of Base
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:216:6: IsAbs already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:212:6: other declaration of IsAbs
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:228:6: Dir already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/path.go:223:6: other declaration of Dir
Step #3 - "compile-libfuzzer-coverage-x86_64": ./match.go:14:5: ErrBadPattern already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/match.go:14:5: other declaration of ErrBadPattern
Step #3 - "compile-libfuzzer-coverage-x86_64": ./match.go:37:6: Match already declared through dot-import of package path ("path")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/match.go:37:6: other declaration of Match
Step #3 - "compile-libfuzzer-coverage-x86_64": ./match.go:37:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_path [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_path/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_path
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_path_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo path
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/path/filepath/example_test.go /src/goroot/src/path/filepath/example_unix_test.go /src/goroot/src/path/filepath/example_unix_walk_test.go /src/goroot/src/path/filepath/export_test.go /src/goroot/src/path/filepath/export_windows_test.go /src/goroot/src/path/filepath/match.go /src/goroot/src/path/filepath/match_test.go /src/goroot/src/path/filepath/path.go /src/goroot/src/path/filepath/path_nonwindows.go /src/goroot/src/path/filepath/path_plan9.go /src/goroot/src/path/filepath/path_test.go /src/goroot/src/path/filepath/path_unix.go /src/goroot/src/path/filepath/path_windows.go /src/goroot/src/path/filepath/path_windows_test.go /src/goroot/src/path/filepath/symlink.go /src/goroot/src/path/filepath/symlink_plan9.go /src/goroot/src/path/filepath/symlink_unix.go /src/goroot/src/path/filepath/symlink_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 18 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^path_filepath '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Glob'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Glob path/filepath fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:09 Found package in /src/goroot/src/path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:09 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:09 Type WalkFunc is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:09 Unhandled argument &ast.Ellipsis{Ellipsis:9331, Elt:(*ast.Ident)(0xc000247dc0)} for Join
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:09 Function WalkDir has unproduced argument fs.WalkDirFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:09 Function Walk has unproduced argument WalkFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/path_filepath.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/path_filepath.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module path/filepath: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_path_filepath/copy/match.go fuzz_ng_path_filepath/copy/path.go fuzz_ng_path_filepath/copy/path_nonwindows.go fuzz_ng_path_filepath/copy/path_unix.go fuzz_ng_path_filepath/copy/symlink.go fuzz_ng_path_filepath/copy/symlink_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_path_filepath/copy/match.go fuzz_ng_path_filepath/copy/path.go fuzz_ng_path_filepath/copy/path_nonwindows.go fuzz_ng_path_filepath/copy/path_unix.go fuzz_ng_path_filepath/copy/symlink.go fuzz_ng_path_filepath/copy/symlink_unix.go /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_path_filepath/fuzz_ng.go fuzz_ng_path_filepath/fuzzng_unsure_test.go fuzz_ng_path_filepath/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/path/filepath/example_test.go /src/goroot/src/path/filepath/example_unix_test.go /src/goroot/src/path/filepath/example_unix_walk_test.go /src/goroot/src/path/filepath/export_test.go /src/goroot/src/path/filepath/export_windows_test.go /src/goroot/src/path/filepath/match_test.go /src/goroot/src/path/filepath/path_test.go /src/goroot/src/path/filepath/path_windows_test.go /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/path/filepath/testdata /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/path/filepath/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_path_filepath/' /src/goroot/src/fuzz_ng_path_filepath/example_test.go /src/goroot/src/fuzz_ng_path_filepath/example_unix_test.go /src/goroot/src/fuzz_ng_path_filepath/example_unix_walk_test.go /src/goroot/src/fuzz_ng_path_filepath/export_test.go /src/goroot/src/fuzz_ng_path_filepath/export_windows_test.go /src/goroot/src/fuzz_ng_path_filepath/fuzz_ng.go /src/goroot/src/fuzz_ng_path_filepath/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_path_filepath/match.go /src/goroot/src/fuzz_ng_path_filepath/match_test.go /src/goroot/src/fuzz_ng_path_filepath/ngolo_helper.go /src/goroot/src/fuzz_ng_path_filepath/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_path_filepath/path.go /src/goroot/src/fuzz_ng_path_filepath/path_nonwindows.go /src/goroot/src/fuzz_ng_path_filepath/path_test.go /src/goroot/src/fuzz_ng_path_filepath/path_unix.go /src/goroot/src/fuzz_ng_path_filepath/path_windows_test.go /src/goroot/src/fuzz_ng_path_filepath/symlink.go /src/goroot/src/fuzz_ng_path_filepath/symlink_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_path_filepath/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_path_filepath/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_path_filepath /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_path_filepath [fuzz_ng_path_filepath.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:69:2: ListSeparator already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path.go:69:2: other declaration of ListSeparator
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:252:6: Split already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path.go:247:6: other declaration of Split
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:407:5: SkipAll already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path.go:397:5: other declaration of SkipAll
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:447:6: WalkFunc already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path.go:437:6: other declaration of WalkFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:598:6: Base already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path.go:588:6: other declaration of Base
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path.go:630:6: Dir already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path.go:619:6: other declaration of Dir
Step #3 - "compile-libfuzzer-coverage-x86_64": ./match.go:43:6: Match already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/match.go:43:6: other declaration of Match
Step #3 - "compile-libfuzzer-coverage-x86_64": ./match.go:243:6: Glob already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/match.go:242:6: other declaration of Glob
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path_unix.go:16:6: IsAbs already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path_unix.go:16:6: other declaration of IsAbs
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path_unix.go:31:6: HasPrefix already declared through dot-import of package filepath ("path/filepath")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/path/filepath/path_unix.go:30:6: other declaration of HasPrefix
Step #3 - "compile-libfuzzer-coverage-x86_64": ./path_unix.go:16:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_path_filepath [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_path_filepath/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_path_filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_path_filepath_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/sync/cond.go /src/goroot/src/sync/cond_test.go /src/goroot/src/sync/example_pool_test.go /src/goroot/src/sync/example_test.go /src/goroot/src/sync/export_test.go /src/goroot/src/sync/map.go /src/goroot/src/sync/map_bench_test.go /src/goroot/src/sync/map_reference_test.go /src/goroot/src/sync/map_test.go /src/goroot/src/sync/mutex.go /src/goroot/src/sync/mutex_test.go /src/goroot/src/sync/once.go /src/goroot/src/sync/once_test.go /src/goroot/src/sync/oncefunc.go /src/goroot/src/sync/oncefunc_test.go /src/goroot/src/sync/pool.go /src/goroot/src/sync/pool_test.go /src/goroot/src/sync/poolqueue.go /src/goroot/src/sync/runtime.go /src/goroot/src/sync/runtime2.go /src/goroot/src/sync/runtime2_lockrank.go /src/goroot/src/sync/runtime_sema_test.go /src/goroot/src/sync/rwmutex.go /src/goroot/src/sync/rwmutex_test.go /src/goroot/src/sync/waitgroup.go /src/goroot/src/sync/waitgroup_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 26 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^sync '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing sync fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Found package in /src/goroot/src/sync
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Type Map is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Type Mutex is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Type Once is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Type Pool is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Type RWMutex is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Type WaitGroup is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Load has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Store has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function LoadOrStore has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function LoadAndDelete has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Delete has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Swap has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function CompareAndSwap has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function CompareAndDelete has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Range has unproduced recv Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Lock has unproduced recv Mutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function TryLock has unproduced recv Mutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Unlock has unproduced recv Mutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Do has unproduced recv Once
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Unhandled argument &ast.FuncType{Func:47861, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001bab40), Results:(*ast.FieldList)(nil)} for OnceFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Unhandled argument &ast.FuncType{Func:48629, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001bae10), Results:(*ast.FieldList)(0xc0001bae40)} for OnceValue
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Unhandled argument &ast.FuncType{Func:49193, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001bb1a0), Results:(*ast.FieldList)(0xc0001bb200)} for OnceValues
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Put has unproduced recv Pool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Get has unproduced recv Pool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function RLock has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function TryRLock has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function RUnlock has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Lock has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function TryLock has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Unlock has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function RLocker has unproduced recv RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Add has unproduced recv WaitGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Done has unproduced recv WaitGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:17 Function Wait has unproduced recv WaitGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/sync.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/sync.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module sync: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:183:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:226:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_sync/copy/cond.go fuzz_ng_sync/copy/map.go fuzz_ng_sync/copy/mutex.go fuzz_ng_sync/copy/once.go fuzz_ng_sync/copy/oncefunc.go fuzz_ng_sync/copy/pool.go fuzz_ng_sync/copy/poolqueue.go fuzz_ng_sync/copy/runtime.go fuzz_ng_sync/copy/runtime2.go fuzz_ng_sync/copy/rwmutex.go fuzz_ng_sync/copy/waitgroup.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_sync/copy/cond.go fuzz_ng_sync/copy/map.go fuzz_ng_sync/copy/mutex.go fuzz_ng_sync/copy/once.go fuzz_ng_sync/copy/oncefunc.go fuzz_ng_sync/copy/pool.go fuzz_ng_sync/copy/poolqueue.go fuzz_ng_sync/copy/runtime.go fuzz_ng_sync/copy/runtime2.go fuzz_ng_sync/copy/rwmutex.go fuzz_ng_sync/copy/waitgroup.go /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_sync/fuzz_ng.go fuzz_ng_sync/fuzzng_unsure_test.go fuzz_ng_sync/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/sync/cond_test.go /src/goroot/src/sync/example_pool_test.go /src/goroot/src/sync/example_test.go /src/goroot/src/sync/export_test.go /src/goroot/src/sync/map_bench_test.go /src/goroot/src/sync/map_reference_test.go /src/goroot/src/sync/map_test.go /src/goroot/src/sync/mutex_test.go /src/goroot/src/sync/once_test.go /src/goroot/src/sync/oncefunc_test.go /src/goroot/src/sync/pool_test.go /src/goroot/src/sync/runtime_sema_test.go /src/goroot/src/sync/rwmutex_test.go /src/goroot/src/sync/waitgroup_test.go /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/sync/testdata /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/sync/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_sync/' /src/goroot/src/fuzz_ng_sync/cond.go /src/goroot/src/fuzz_ng_sync/cond_test.go /src/goroot/src/fuzz_ng_sync/example_pool_test.go /src/goroot/src/fuzz_ng_sync/example_test.go /src/goroot/src/fuzz_ng_sync/export_test.go /src/goroot/src/fuzz_ng_sync/fuzz_ng.go /src/goroot/src/fuzz_ng_sync/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_sync/map.go /src/goroot/src/fuzz_ng_sync/map_bench_test.go /src/goroot/src/fuzz_ng_sync/map_reference_test.go /src/goroot/src/fuzz_ng_sync/map_test.go /src/goroot/src/fuzz_ng_sync/mutex.go /src/goroot/src/fuzz_ng_sync/mutex_test.go /src/goroot/src/fuzz_ng_sync/ngolo_helper.go /src/goroot/src/fuzz_ng_sync/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_sync/once.go /src/goroot/src/fuzz_ng_sync/once_test.go /src/goroot/src/fuzz_ng_sync/oncefunc.go /src/goroot/src/fuzz_ng_sync/oncefunc_test.go /src/goroot/src/fuzz_ng_sync/pool.go /src/goroot/src/fuzz_ng_sync/pool_test.go /src/goroot/src/fuzz_ng_sync/poolqueue.go /src/goroot/src/fuzz_ng_sync/runtime.go /src/goroot/src/fuzz_ng_sync/runtime2.go /src/goroot/src/fuzz_ng_sync/runtime_sema_test.go /src/goroot/src/fuzz_ng_sync/rwmutex.go /src/goroot/src/fuzz_ng_sync/rwmutex_test.go /src/goroot/src/fuzz_ng_sync/waitgroup.go /src/goroot/src/fuzz_ng_sync/waitgroup_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_sync/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_sync/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_sync /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_sync [fuzz_ng_sync.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./oncefunc.go:43:6: OnceValue already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/oncefunc.go:43:6: other declaration of OnceValue
Step #3 - "compile-libfuzzer-coverage-x86_64": ./oncefunc.go:74:6: OnceValues already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/oncefunc.go:74:6: other declaration of OnceValues
Step #3 - "compile-libfuzzer-coverage-x86_64": ./waitgroup.go:23:6: WaitGroup already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/waitgroup.go:23:6: other declaration of WaitGroup
Step #3 - "compile-libfuzzer-coverage-x86_64": ./once.go:18:6: Once already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/once.go:18:6: other declaration of Once
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cond.go:36:6: Cond already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/cond.go:36:6: other declaration of Cond
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cond.go:47:6: NewCond already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/cond.go:47:6: other declaration of NewCond
Step #3 - "compile-libfuzzer-coverage-x86_64": ./mutex.go:34:6: Mutex already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/mutex.go:34:6: other declaration of Mutex
Step #3 - "compile-libfuzzer-coverage-x86_64": ./mutex.go:40:6: Locker already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/mutex.go:40:6: other declaration of Locker
Step #3 - "compile-libfuzzer-coverage-x86_64": ./rwmutex.go:35:6: RWMutex already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/rwmutex.go:35:6: other declaration of RWMutex
Step #3 - "compile-libfuzzer-coverage-x86_64": ./map.go:35:6: Map already declared through dot-import of package sync ("sync")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/map.go:35:6: other declaration of Map
Step #3 - "compile-libfuzzer-coverage-x86_64": ./oncefunc.go:43:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_sync [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_sync/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_sync_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo sync
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/sync/atomic/atomic_test.go /src/goroot/src/sync/atomic/doc.go /src/goroot/src/sync/atomic/example_test.go /src/goroot/src/sync/atomic/type.go /src/goroot/src/sync/atomic/value.go /src/goroot/src/sync/atomic/value_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^sync_atomic '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing sync/atomic fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Found package in /src/goroot/src/sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Uint32 is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Uint64 is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Uintptr is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Value is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Bool is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Int32 is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Type Int64 is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapInt32 has unproduced argument int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapInt64 has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapUint32 has unproduced argument uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapUint64 has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapPointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function SwapPointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapInt32 has unproduced argument int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapInt64 has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapUint32 has unproduced argument uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapUint64 has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapPointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwapPointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function AddInt32 has unproduced argument int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function AddUint32 has unproduced argument uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function AddInt64 has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function AddUint64 has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function AddUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function AddUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function LoadInt32 has unproduced argument int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function LoadInt64 has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function LoadUint32 has unproduced argument uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function LoadUint64 has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function LoadUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function LoadPointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StoreInt32 has unproduced argument int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StoreInt64 has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StoreUint32 has unproduced argument uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StoreUint64 has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StoreUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StoreUintptr has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StorePointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function StorePointer has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Bool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Bool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Bool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Bool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0000b6ea0)}, Type:(*ast.StarExpr)(0xc0000106d8), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0000b7040)}, Type:(*ast.StarExpr)(0xc000010780), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0000b7220)}, Type:(*ast.StarExpr)(0xc000010840), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc0000b74a0)}, Type:(*ast.StarExpr)(0xc000010948), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Add has unproduced recv Int32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Add has unproduced recv Int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Add has unproduced recv Uint32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Add has unproduced recv Uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Add has unproduced recv Uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Load has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Store has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function Swap has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:25 Function CompareAndSwap has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/sync_atomic.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/sync_atomic.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module sync/atomic: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync_atomic [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_sync_atomic.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:17:2: "sync/atomic" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_sync_atomic/copy/doc.go fuzz_ng_sync_atomic/copy/type.go fuzz_ng_sync_atomic/copy/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_sync_atomic/copy/doc.go fuzz_ng_sync_atomic/copy/type.go fuzz_ng_sync_atomic/copy/value.go /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_sync_atomic/fuzz_ng.go fuzz_ng_sync_atomic/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/sync/atomic/atomic_test.go /src/goroot/src/sync/atomic/example_test.go /src/goroot/src/sync/atomic/value_test.go /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/sync/atomic/testdata /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/sync/atomic/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_sync_atomic/' /src/goroot/src/fuzz_ng_sync_atomic/atomic_test.go /src/goroot/src/fuzz_ng_sync_atomic/doc.go /src/goroot/src/fuzz_ng_sync_atomic/example_test.go /src/goroot/src/fuzz_ng_sync_atomic/fuzz_ng.go /src/goroot/src/fuzz_ng_sync_atomic/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_sync_atomic/ngolo_helper.go /src/goroot/src/fuzz_ng_sync_atomic/type.go /src/goroot/src/fuzz_ng_sync_atomic/value.go /src/goroot/src/fuzz_ng_sync_atomic/value_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_sync_atomic/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_sync_atomic/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_sync_atomic /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_sync_atomic [fuzz_ng_sync_atomic.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./type.go:11:6: Bool already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/type.go:11:6: other declaration of Bool
Step #3 - "compile-libfuzzer-coverage-x86_64": ./type.go:162:6: Uintptr already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/type.go:162:6: other declaration of Uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ./value.go:16:6: Value already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/value.go:16:6: other declaration of Value
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:92:6: CompareAndSwapInt32 already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:92:6: other declaration of CompareAndSwapInt32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:110:6: CompareAndSwapUintptr already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:110:6: other declaration of CompareAndSwapUintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:114:6: CompareAndSwapPointer already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:114:6: other declaration of CompareAndSwapPointer
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:136:6: AddUint64 already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:136:6: other declaration of AddUint64
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:140:6: AddUintptr already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:140:6: other declaration of AddUintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:144:6: LoadInt32 already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:144:6: other declaration of LoadInt32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:149:6: LoadInt64 already declared through dot-import of package atomic ("sync/atomic")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/sync/atomic/doc.go:149:6: other declaration of LoadInt64
Step #3 - "compile-libfuzzer-coverage-x86_64": ./doc.go:140:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_sync_atomic [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_sync_atomic/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_sync_atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_sync_atomic_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/addrselect.go /src/goroot/src/net/addrselect_test.go /src/goroot/src/net/cgo_aix.go /src/goroot/src/net/cgo_android.go /src/goroot/src/net/cgo_bsd.go /src/goroot/src/net/cgo_darwin.go /src/goroot/src/net/cgo_linux.go /src/goroot/src/net/cgo_netbsd.go /src/goroot/src/net/cgo_openbsd.go /src/goroot/src/net/cgo_resnew.go /src/goroot/src/net/cgo_resold.go /src/goroot/src/net/cgo_socknew.go /src/goroot/src/net/cgo_sockold.go /src/goroot/src/net/cgo_solaris.go /src/goroot/src/net/cgo_stub.go /src/goroot/src/net/cgo_unix.go /src/goroot/src/net/cgo_unix_cgo.go /src/goroot/src/net/cgo_unix_cgo_darwin.go /src/goroot/src/net/cgo_unix_cgo_res.go /src/goroot/src/net/cgo_unix_cgo_resn.go /src/goroot/src/net/cgo_unix_syscall.go /src/goroot/src/net/cgo_unix_test.go /src/goroot/src/net/conf.go /src/goroot/src/net/conf_test.go /src/goroot/src/net/conn_test.go /src/goroot/src/net/dial.go /src/goroot/src/net/dial_test.go /src/goroot/src/net/dial_unix_test.go /src/goroot/src/net/dnsclient.go /src/goroot/src/net/dnsclient_test.go /src/goroot/src/net/dnsclient_unix.go /src/goroot/src/net/dnsclient_unix_test.go /src/goroot/src/net/dnsconfig.go /src/goroot/src/net/dnsconfig_unix.go /src/goroot/src/net/dnsconfig_unix_test.go /src/goroot/src/net/dnsconfig_windows.go /src/goroot/src/net/dnsname_test.go /src/goroot/src/net/error_plan9.go /src/goroot/src/net/error_plan9_test.go /src/goroot/src/net/error_posix.go /src/goroot/src/net/error_posix_test.go /src/goroot/src/net/error_test.go /src/goroot/src/net/error_unix.go /src/goroot/src/net/error_unix_test.go /src/goroot/src/net/error_windows.go /src/goroot/src/net/error_windows_test.go /src/goroot/src/net/example_test.go /src/goroot/src/net/external_test.go /src/goroot/src/net/fd_fake.go /src/goroot/src/net/fd_js.go /src/goroot/src/net/fd_plan9.go /src/goroot/src/net/fd_posix.go /src/goroot/src/net/fd_unix.go /src/goroot/src/net/fd_wasip1.go /src/goroot/src/net/fd_windows.go /src/goroot/src/net/file.go /src/goroot/src/net/file_plan9.go /src/goroot/src/net/file_stub.go /src/goroot/src/net/file_test.go /src/goroot/src/net/file_unix.go /src/goroot/src/net/file_unix_test.go /src/goroot/src/net/file_wasip1.go /src/goroot/src/net/file_wasip1_test.go /src/goroot/src/net/file_windows.go /src/goroot/src/net/hook.go /src/goroot/src/net/hook_plan9.go /src/goroot/src/net/hook_unix.go /src/goroot/src/net/hook_windows.go /src/goroot/src/net/hosts.go /src/goroot/src/net/hosts_test.go /src/goroot/src/net/interface.go /src/goroot/src/net/interface_aix.go /src/goroot/src/net/interface_bsd.go /src/goroot/src/net/interface_bsd_test.go /src/goroot/src/net/interface_bsdvar.go /src/goroot/src/net/interface_darwin.go /src/goroot/src/net/interface_freebsd.go /src/goroot/src/net/interface_linux.go /src/goroot/src/net/interface_linux_test.go /src/goroot/src/net/interface_plan9.go /src/goroot/src/net/interface_solaris.go /src/goroot/src/net/interface_stub.go /src/goroot/src/net/interface_test.go /src/goroot/src/net/interface_unix_test.go /src/goroot/src/net/interface_windows.go /src/goroot/src/net/ip.go /src/goroot/src/net/ip_test.go /src/goroot/src/net/iprawsock.go /src/goroot/src/net/iprawsock_plan9.go /src/goroot/src/net/iprawsock_posix.go /src/goroot/src/net/iprawsock_test.go /src/goroot/src/net/ipsock.go /src/goroot/src/net/ipsock_plan9.go /src/goroot/src/net/ipsock_plan9_test.go /src/goroot/src/net/ipsock_posix.go /src/goroot/src/net/ipsock_test.go /src/goroot/src/net/listen_test.go /src/goroot/src/net/lookup.go /src/goroot/src/net/lookup_plan9.go /src/goroot/src/net/lookup_test.go /src/goroot/src/net/lookup_unix.go /src/goroot/src/net/lookup_windows.go /src/goroot/src/net/lookup_windows_test.go /src/goroot/src/net/mac.go /src/goroot/src/net/mac_test.go /src/goroot/src/net/main_cloexec_test.go /src/goroot/src/net/main_conf_test.go /src/goroot/src/net/main_noconf_test.go /src/goroot/src/net/main_plan9_test.go /src/goroot/src/net/main_posix_test.go /src/goroot/src/net/main_test.go /src/goroot/src/net/main_unix_test.go /src/goroot/src/net/main_wasm_test.go /src/goroot/src/net/main_windows_test.go /src/goroot/src/net/mockserver_test.go /src/goroot/src/net/mptcpsock_linux.go /src/goroot/src/net/mptcpsock_linux_test.go /src/goroot/src/net/mptcpsock_stub.go /src/goroot/src/net/net.go /src/goroot/src/net/net_fake.go /src/goroot/src/net/net_fake_test.go /src/goroot/src/net/net_test.go /src/goroot/src/net/net_windows_test.go /src/goroot/src/net/netcgo_off.go /src/goroot/src/net/netcgo_on.go /src/goroot/src/net/netgo_netcgo.go /src/goroot/src/net/netgo_off.go /src/goroot/src/net/netgo_on.go /src/goroot/src/net/nss.go /src/goroot/src/net/nss_test.go /src/goroot/src/net/packetconn_test.go /src/goroot/src/net/parse.go /src/goroot/src/net/parse_test.go /src/goroot/src/net/pipe.go /src/goroot/src/net/pipe_test.go /src/goroot/src/net/platform_test.go /src/goroot/src/net/port.go /src/goroot/src/net/port_test.go /src/goroot/src/net/port_unix.go /src/goroot/src/net/protoconn_test.go /src/goroot/src/net/rawconn.go /src/goroot/src/net/rawconn_stub_test.go /src/goroot/src/net/rawconn_test.go /src/goroot/src/net/rawconn_unix_test.go /src/goroot/src/net/rawconn_windows_test.go /src/goroot/src/net/resolverdialfunc_test.go /src/goroot/src/net/rlimit_js.go /src/goroot/src/net/rlimit_unix.go /src/goroot/src/net/sendfile_linux.go /src/goroot/src/net/sendfile_linux_test.go /src/goroot/src/net/sendfile_stub.go /src/goroot/src/net/sendfile_test.go /src/goroot/src/net/sendfile_unix_alt.go /src/goroot/src/net/sendfile_windows.go /src/goroot/src/net/server_test.go /src/goroot/src/net/sock_bsd.go /src/goroot/src/net/sock_cloexec.go /src/goroot/src/net/sock_linux.go /src/goroot/src/net/sock_linux_test.go /src/goroot/src/net/sock_plan9.go /src/goroot/src/net/sock_posix.go /src/goroot/src/net/sock_stub.go /src/goroot/src/net/sock_windows.go /src/goroot/src/net/sockaddr_posix.go /src/goroot/src/net/sockopt_aix.go /src/goroot/src/net/sockopt_bsd.go /src/goroot/src/net/sockopt_fake.go /src/goroot/src/net/sockopt_linux.go /src/goroot/src/net/sockopt_plan9.go /src/goroot/src/net/sockopt_posix.go /src/goroot/src/net/sockopt_solaris.go /src/goroot/src/net/sockopt_windows.go /src/goroot/src/net/sockoptip_bsdvar.go /src/goroot/src/net/sockoptip_linux.go /src/goroot/src/net/sockoptip_posix.go /src/goroot/src/net/sockoptip_stub.go /src/goroot/src/net/sockoptip_windows.go /src/goroot/src/net/splice_linux.go /src/goroot/src/net/splice_stub.go /src/goroot/src/net/splice_test.go /src/goroot/src/net/sys_cloexec.go /src/goroot/src/net/tcpsock.go /src/goroot/src/net/tcpsock_plan9.go /src/goroot/src/net/tcpsock_posix.go /src/goroot/src/net/tcpsock_test.go /src/goroot/src/net/tcpsock_unix_test.go /src/goroot/src/net/tcpsockopt_darwin.go /src/goroot/src/net/tcpsockopt_dragonfly.go /src/goroot/src/net/tcpsockopt_openbsd.go /src/goroot/src/net/tcpsockopt_plan9.go /src/goroot/src/net/tcpsockopt_posix.go /src/goroot/src/net/tcpsockopt_solaris.go /src/goroot/src/net/tcpsockopt_stub.go /src/goroot/src/net/tcpsockopt_unix.go /src/goroot/src/net/tcpsockopt_windows.go /src/goroot/src/net/timeout_test.go /src/goroot/src/net/udpsock.go /src/goroot/src/net/udpsock_plan9.go /src/goroot/src/net/udpsock_plan9_test.go /src/goroot/src/net/udpsock_posix.go /src/goroot/src/net/udpsock_test.go /src/goroot/src/net/unixsock.go /src/goroot/src/net/unixsock_linux_test.go /src/goroot/src/net/unixsock_plan9.go /src/goroot/src/net/unixsock_posix.go /src/goroot/src/net/unixsock_readmsg_cloexec.go /src/goroot/src/net/unixsock_readmsg_cmsg_cloexec.go /src/goroot/src/net/unixsock_readmsg_other.go /src/goroot/src/net/unixsock_readmsg_test.go /src/goroot/src/net/unixsock_test.go /src/goroot/src/net/unixsock_windows_test.go /src/goroot/src/net/write_unix_test.go /src/goroot/src/net/writev_test.go /src/goroot/src/net/writev_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 214 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Found package in /src/goroot/src/net
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for Addr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for Addr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for Interface is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for Addr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for IP is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for IPAddr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for IP is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for netip.Addr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for SRV is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for SRV is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for MX is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for MX is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for NS is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for NS is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type UnknownNetworkError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type Buffers is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type DNSConfigError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type ParseError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type InvalidAddrError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type OpError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type AddrError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Type DNSError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Unhandled field &ast.FuncType{Func:218533, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0005740c0), Results:(*ast.FieldList)(0xc000574120)} for struct Resolver
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Unhandled field &ast.FuncType{Func:20385, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001f7e90), Results:(*ast.FieldList)(0xc0001f7ec0)} for struct ListenConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function MultipathTCP has unproduced recv Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function SetMultipathTCP has unproduced recv Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function DialTimeout has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Dial has unproduced recv Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function DialContext has unproduced recv Dialer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function MultipathTCP has unproduced recv ListenConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function SetMultipathTCP has unproduced recv ListenConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Listen has unproduced recv ListenConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function ListenPacket has unproduced recv ListenConfig
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function FileConn has unproduced argument os.File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function FileListener has unproduced argument os.File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function FilePacketConn has unproduced argument os.File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupHost has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupIPAddr has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupIP has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupNetIP has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupPort has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupCNAME has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupSRV has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupMX has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupNS has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupTXT has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function LookupAddr has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Unwrap has unproduced recv OpError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv OpError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv OpError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv OpError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv ParseError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv ParseError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv ParseError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv AddrError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv AddrError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv AddrError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv UnknownNetworkError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv UnknownNetworkError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv UnknownNetworkError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv InvalidAddrError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv InvalidAddrError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv InvalidAddrError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Unwrap has unproduced recv DNSConfigError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv DNSConfigError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv DNSConfigError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv DNSConfigError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Error has unproduced recv DNSError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Timeout has unproduced recv DNSError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Temporary has unproduced recv DNSError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function WriteTo has unproduced recv Buffers
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function Read has unproduced recv Buffers
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function TCPAddrFromAddrPort has unproduced argument netip.AddrPort
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function SetKeepAlivePeriod has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function SetDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function UDPAddrFromAddrPort has unproduced argument netip.AddrPort
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function WriteToUDPAddrPort has unproduced argument netip.AddrPort
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function WriteMsgUDPAddrPort has unproduced argument netip.AddrPort
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:30 Function SetDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:276:38: cannot use r0 (variable of type []net.Addr) as []*net.Addr value in argument to append
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:288:38: cannot use r0 (variable of type []net.Addr) as []*net.Addr value in argument to append
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:301:38: cannot use r0 (variable of type []net.Addr) as []*net.Addr value in argument to append
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:684:34: cannot use r0 (variable of type []net.IP) as []*net.IP value in argument to append
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net/copy/addrselect.go fuzz_ng_net/copy/cgo_unix.go fuzz_ng_net/copy/conf.go fuzz_ng_net/copy/dial.go fuzz_ng_net/copy/dnsclient.go fuzz_ng_net/copy/dnsclient_unix.go fuzz_ng_net/copy/dnsconfig.go fuzz_ng_net/copy/dnsconfig_unix.go fuzz_ng_net/copy/error_posix.go fuzz_ng_net/copy/error_unix.go fuzz_ng_net/copy/fd_posix.go fuzz_ng_net/copy/fd_unix.go fuzz_ng_net/copy/file.go fuzz_ng_net/copy/file_unix.go fuzz_ng_net/copy/hook.go fuzz_ng_net/copy/hook_unix.go fuzz_ng_net/copy/hosts.go fuzz_ng_net/copy/interface.go fuzz_ng_net/copy/interface_linux.go fuzz_ng_net/copy/ip.go fuzz_ng_net/copy/iprawsock.go fuzz_ng_net/copy/iprawsock_posix.go fuzz_ng_net/copy/ipsock.go fuzz_ng_net/copy/ipsock_posix.go fuzz_ng_net/copy/lookup.go fuzz_ng_net/copy/lookup_unix.go fuzz_ng_net/copy/mac.go fuzz_ng_net/copy/mptcpsock_linux.go fuzz_ng_net/copy/net.go fuzz_ng_net/copy/netcgo_off.go fuzz_ng_net/copy/netgo_off.go fuzz_ng_net/copy/nss.go fuzz_ng_net/copy/parse.go fuzz_ng_net/copy/pipe.go fuzz_ng_net/copy/port.go fuzz_ng_net/copy/port_unix.go fuzz_ng_net/copy/rawconn.go fuzz_ng_net/copy/rlimit_unix.go fuzz_ng_net/copy/sendfile_linux.go fuzz_ng_net/copy/sock_cloexec.go fuzz_ng_net/copy/sock_linux.go fuzz_ng_net/copy/sock_posix.go fuzz_ng_net/copy/sockaddr_posix.go fuzz_ng_net/copy/sockopt_linux.go fuzz_ng_net/copy/sockopt_posix.go fuzz_ng_net/copy/sockoptip_linux.go fuzz_ng_net/copy/sockoptip_posix.go fuzz_ng_net/copy/splice_linux.go fuzz_ng_net/copy/tcpsock.go fuzz_ng_net/copy/tcpsock_posix.go fuzz_ng_net/copy/tcpsockopt_posix.go fuzz_ng_net/copy/tcpsockopt_unix.go fuzz_ng_net/copy/udpsock.go fuzz_ng_net/copy/udpsock_posix.go fuzz_ng_net/copy/unixsock.go fuzz_ng_net/copy/unixsock_posix.go fuzz_ng_net/copy/unixsock_readmsg_cmsg_cloexec.go fuzz_ng_net/copy/writev_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net/copy/addrselect.go fuzz_ng_net/copy/cgo_unix.go fuzz_ng_net/copy/conf.go fuzz_ng_net/copy/dial.go fuzz_ng_net/copy/dnsclient.go fuzz_ng_net/copy/dnsclient_unix.go fuzz_ng_net/copy/dnsconfig.go fuzz_ng_net/copy/dnsconfig_unix.go fuzz_ng_net/copy/error_posix.go fuzz_ng_net/copy/error_unix.go fuzz_ng_net/copy/fd_posix.go fuzz_ng_net/copy/fd_unix.go fuzz_ng_net/copy/file.go fuzz_ng_net/copy/file_unix.go fuzz_ng_net/copy/hook.go fuzz_ng_net/copy/hook_unix.go fuzz_ng_net/copy/hosts.go fuzz_ng_net/copy/interface.go fuzz_ng_net/copy/interface_linux.go fuzz_ng_net/copy/ip.go fuzz_ng_net/copy/iprawsock.go fuzz_ng_net/copy/iprawsock_posix.go fuzz_ng_net/copy/ipsock.go fuzz_ng_net/copy/ipsock_posix.go fuzz_ng_net/copy/lookup.go fuzz_ng_net/copy/lookup_unix.go fuzz_ng_net/copy/mac.go fuzz_ng_net/copy/mptcpsock_linux.go fuzz_ng_net/copy/net.go fuzz_ng_net/copy/netcgo_off.go fuzz_ng_net/copy/netgo_off.go fuzz_ng_net/copy/nss.go fuzz_ng_net/copy/parse.go fuzz_ng_net/copy/pipe.go fuzz_ng_net/copy/port.go fuzz_ng_net/copy/port_unix.go fuzz_ng_net/copy/rawconn.go fuzz_ng_net/copy/rlimit_unix.go fuzz_ng_net/copy/sendfile_linux.go fuzz_ng_net/copy/sock_cloexec.go fuzz_ng_net/copy/sock_linux.go fuzz_ng_net/copy/sock_posix.go fuzz_ng_net/copy/sockaddr_posix.go fuzz_ng_net/copy/sockopt_linux.go fuzz_ng_net/copy/sockopt_posix.go fuzz_ng_net/copy/sockoptip_linux.go fuzz_ng_net/copy/sockoptip_posix.go fuzz_ng_net/copy/splice_linux.go fuzz_ng_net/copy/tcpsock.go fuzz_ng_net/copy/tcpsock_posix.go fuzz_ng_net/copy/tcpsockopt_posix.go fuzz_ng_net/copy/tcpsockopt_unix.go fuzz_ng_net/copy/udpsock.go fuzz_ng_net/copy/udpsock_posix.go fuzz_ng_net/copy/unixsock.go fuzz_ng_net/copy/unixsock_posix.go fuzz_ng_net/copy/unixsock_readmsg_cmsg_cloexec.go fuzz_ng_net/copy/writev_unix.go /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net/fuzz_ng.go fuzz_ng_net/fuzzng_unsure_test.go fuzz_ng_net/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/addrselect_test.go /src/goroot/src/net/cgo_unix_test.go /src/goroot/src/net/conf_test.go /src/goroot/src/net/conn_test.go /src/goroot/src/net/dial_test.go /src/goroot/src/net/dial_unix_test.go /src/goroot/src/net/dnsclient_test.go /src/goroot/src/net/dnsclient_unix_test.go /src/goroot/src/net/dnsconfig_unix_test.go /src/goroot/src/net/dnsname_test.go /src/goroot/src/net/error_plan9_test.go /src/goroot/src/net/error_posix_test.go /src/goroot/src/net/error_test.go /src/goroot/src/net/error_unix_test.go /src/goroot/src/net/error_windows_test.go /src/goroot/src/net/example_test.go /src/goroot/src/net/external_test.go /src/goroot/src/net/file_test.go /src/goroot/src/net/file_unix_test.go /src/goroot/src/net/file_wasip1_test.go /src/goroot/src/net/hosts_test.go /src/goroot/src/net/interface_bsd_test.go /src/goroot/src/net/interface_linux_test.go /src/goroot/src/net/interface_test.go /src/goroot/src/net/interface_unix_test.go /src/goroot/src/net/ip_test.go /src/goroot/src/net/iprawsock_test.go /src/goroot/src/net/ipsock_plan9_test.go /src/goroot/src/net/ipsock_test.go /src/goroot/src/net/listen_test.go /src/goroot/src/net/lookup_test.go /src/goroot/src/net/lookup_windows_test.go /src/goroot/src/net/mac_test.go /src/goroot/src/net/main_cloexec_test.go /src/goroot/src/net/main_conf_test.go /src/goroot/src/net/main_noconf_test.go /src/goroot/src/net/main_plan9_test.go /src/goroot/src/net/main_posix_test.go /src/goroot/src/net/main_test.go /src/goroot/src/net/main_unix_test.go /src/goroot/src/net/main_wasm_test.go /src/goroot/src/net/main_windows_test.go /src/goroot/src/net/mockserver_test.go /src/goroot/src/net/mptcpsock_linux_test.go /src/goroot/src/net/net_fake_test.go /src/goroot/src/net/net_test.go /src/goroot/src/net/net_windows_test.go /src/goroot/src/net/nss_test.go /src/goroot/src/net/packetconn_test.go /src/goroot/src/net/parse_test.go /src/goroot/src/net/pipe_test.go /src/goroot/src/net/platform_test.go /src/goroot/src/net/port_test.go /src/goroot/src/net/protoconn_test.go /src/goroot/src/net/rawconn_stub_test.go /src/goroot/src/net/rawconn_test.go /src/goroot/src/net/rawconn_unix_test.go /src/goroot/src/net/rawconn_windows_test.go /src/goroot/src/net/resolverdialfunc_test.go /src/goroot/src/net/sendfile_linux_test.go /src/goroot/src/net/sendfile_test.go /src/goroot/src/net/server_test.go /src/goroot/src/net/sock_linux_test.go /src/goroot/src/net/splice_test.go /src/goroot/src/net/tcpsock_test.go /src/goroot/src/net/tcpsock_unix_test.go /src/goroot/src/net/timeout_test.go /src/goroot/src/net/udpsock_plan9_test.go /src/goroot/src/net/udpsock_test.go /src/goroot/src/net/unixsock_linux_test.go /src/goroot/src/net/unixsock_readmsg_test.go /src/goroot/src/net/unixsock_test.go /src/goroot/src/net/unixsock_windows_test.go /src/goroot/src/net/write_unix_test.go /src/goroot/src/net/writev_test.go /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/testdata /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net/' /src/goroot/src/fuzz_ng_net/addrselect.go /src/goroot/src/fuzz_ng_net/addrselect_test.go /src/goroot/src/fuzz_ng_net/cgo_unix.go /src/goroot/src/fuzz_ng_net/cgo_unix_test.go /src/goroot/src/fuzz_ng_net/conf.go /src/goroot/src/fuzz_ng_net/conf_test.go /src/goroot/src/fuzz_ng_net/conn_test.go /src/goroot/src/fuzz_ng_net/dial.go /src/goroot/src/fuzz_ng_net/dial_test.go /src/goroot/src/fuzz_ng_net/dial_unix_test.go /src/goroot/src/fuzz_ng_net/dnsclient.go /src/goroot/src/fuzz_ng_net/dnsclient_test.go /src/goroot/src/fuzz_ng_net/dnsclient_unix.go /src/goroot/src/fuzz_ng_net/dnsclient_unix_test.go /src/goroot/src/fuzz_ng_net/dnsconfig.go /src/goroot/src/fuzz_ng_net/dnsconfig_unix.go /src/goroot/src/fuzz_ng_net/dnsconfig_unix_test.go /src/goroot/src/fuzz_ng_net/dnsname_test.go /src/goroot/src/fuzz_ng_net/error_plan9_test.go /src/goroot/src/fuzz_ng_net/error_posix.go /src/goroot/src/fuzz_ng_net/error_posix_test.go /src/goroot/src/fuzz_ng_net/error_test.go /src/goroot/src/fuzz_ng_net/error_unix.go /src/goroot/src/fuzz_ng_net/error_unix_test.go /src/goroot/src/fuzz_ng_net/error_windows_test.go /src/goroot/src/fuzz_ng_net/example_test.go /src/goroot/src/fuzz_ng_net/external_test.go /src/goroot/src/fuzz_ng_net/fd_posix.go /src/goroot/src/fuzz_ng_net/fd_unix.go /src/goroot/src/fuzz_ng_net/file.go /src/goroot/src/fuzz_ng_net/file_test.go /src/goroot/src/fuzz_ng_net/file_unix.go /src/goroot/src/fuzz_ng_net/file_unix_test.go /src/goroot/src/fuzz_ng_net/file_wasip1_test.go /src/goroot/src/fuzz_ng_net/fuzz_ng.go /src/goroot/src/fuzz_ng_net/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net/hook.go /src/goroot/src/fuzz_ng_net/hook_unix.go /src/goroot/src/fuzz_ng_net/hosts.go /src/goroot/src/fuzz_ng_net/hosts_test.go /src/goroot/src/fuzz_ng_net/interface.go /src/goroot/src/fuzz_ng_net/interface_bsd_test.go /src/goroot/src/fuzz_ng_net/interface_linux.go /src/goroot/src/fuzz_ng_net/interface_linux_test.go /src/goroot/src/fuzz_ng_net/interface_test.go /src/goroot/src/fuzz_ng_net/interface_unix_test.go /src/goroot/src/fuzz_ng_net/ip.go /src/goroot/src/fuzz_ng_net/ip_test.go /src/goroot/src/fuzz_ng_net/iprawsock.go /src/goroot/src/fuzz_ng_net/iprawsock_posix.go /src/goroot/src/fuzz_ng_net/iprawsock_test.go /src/goroot/src/fuzz_ng_net/ipsock.go /src/goroot/src/fuzz_ng_net/ipsock_plan9_test.go /src/goroot/src/fuzz_ng_net/ipsock_posix.go /src/goroot/src/fuzz_ng_net/ipsock_test.go /src/goroot/src/fuzz_ng_net/listen_test.go /src/goroot/src/fuzz_ng_net/lookup.go /src/goroot/src/fuzz_ng_net/lookup_test.go /src/goroot/src/fuzz_ng_net/lookup_unix.go /src/goroot/src/fuzz_ng_net/lookup_windows_test.go /src/goroot/src/fuzz_ng_net/mac.go /src/goroot/src/fuzz_ng_net/mac_test.go /src/goroot/src/fuzz_ng_net/main_cloexec_test.go /src/goroot/src/fuzz_ng_net/main_conf_test.go /src/goroot/src/fuzz_ng_net/main_noconf_test.go /src/goroot/src/fuzz_ng_net/main_plan9_test.go /src/goroot/src/fuzz_ng_net/main_posix_test.go /src/goroot/src/fuzz_ng_net/main_test.go /src/goroot/src/fuzz_ng_net/main_unix_test.go /src/goroot/src/fuzz_ng_net/main_wasm_test.go /src/goroot/src/fuzz_ng_net/main_windows_test.go /src/goroot/src/fuzz_ng_net/mockserver_test.go /src/goroot/src/fuzz_ng_net/mptcpsock_linux.go /src/goroot/src/fuzz_ng_net/mptcpsock_linux_test.go /src/goroot/src/fuzz_ng_net/net.go /src/goroot/src/fuzz_ng_net/net_fake_test.go /src/goroot/src/fuzz_ng_net/net_test.go /src/goroot/src/fuzz_ng_net/net_windows_test.go /src/goroot/src/fuzz_ng_net/netcgo_off.go /src/goroot/src/fuzz_ng_net/netgo_off.go /src/goroot/src/fuzz_ng_net/ngolo_helper.go /src/goroot/src/fuzz_ng_net/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net/nss.go /src/goroot/src/fuzz_ng_net/nss_test.go /src/goroot/src/fuzz_ng_net/packetconn_test.go /src/goroot/src/fuzz_ng_net/parse.go /src/goroot/src/fuzz_ng_net/parse_test.go /src/goroot/src/fuzz_ng_net/pipe.go /src/goroot/src/fuzz_ng_net/pipe_test.go /src/goroot/src/fuzz_ng_net/platform_test.go /src/goroot/src/fuzz_ng_net/port.go /src/goroot/src/fuzz_ng_net/port_test.go /src/goroot/src/fuzz_ng_net/port_unix.go /src/goroot/src/fuzz_ng_net/protoconn_test.go /src/goroot/src/fuzz_ng_net/rawconn.go /src/goroot/src/fuzz_ng_net/rawconn_stub_test.go /src/goroot/src/fuzz_ng_net/rawconn_test.go /src/goroot/src/fuzz_ng_net/rawconn_unix_test.go /src/goroot/src/fuzz_ng_net/rawconn_windows_test.go /src/goroot/src/fuzz_ng_net/resolverdialfunc_test.go /src/goroot/src/fuzz_ng_net/rlimit_unix.go /src/goroot/src/fuzz_ng_net/sendfile_linux.go /src/goroot/src/fuzz_ng_net/sendfile_linux_test.go /src/goroot/src/fuzz_ng_net/sendfile_test.go /src/goroot/src/fuzz_ng_net/server_test.go /src/goroot/src/fuzz_ng_net/sock_cloexec.go /src/goroot/src/fuzz_ng_net/sock_linux.go /src/goroot/src/fuzz_ng_net/sock_linux_test.go /src/goroot/src/fuzz_ng_net/sock_posix.go /src/goroot/src/fuzz_ng_net/sockaddr_posix.go /src/goroot/src/fuzz_ng_net/sockopt_linux.go /src/goroot/src/fuzz_ng_net/sockopt_posix.go /src/goroot/src/fuzz_ng_net/sockoptip_linux.go /src/goroot/src/fuzz_ng_net/sockoptip_posix.go /src/goroot/src/fuzz_ng_net/splice_linux.go /src/goroot/src/fuzz_ng_net/splice_test.go /src/goroot/src/fuzz_ng_net/tcpsock.go /src/goroot/src/fuzz_ng_net/tcpsock_posix.go /src/goroot/src/fuzz_ng_net/tcpsock_test.go /src/goroot/src/fuzz_ng_net/tcpsock_unix_test.go /src/goroot/src/fuzz_ng_net/tcpsockopt_posix.go /src/goroot/src/fuzz_ng_net/tcpsockopt_unix.go /src/goroot/src/fuzz_ng_net/timeout_test.go /src/goroot/src/fuzz_ng_net/udpsock.go /src/goroot/src/fuzz_ng_net/udpsock_plan9_test.go /src/goroot/src/fuzz_ng_net/udpsock_posix.go /src/goroot/src/fuzz_ng_net/udpsock_test.go /src/goroot/src/fuzz_ng_net/unixsock.go /src/goroot/src/fuzz_ng_net/unixsock_linux_test.go /src/goroot/src/fuzz_ng_net/unixsock_posix.go /src/goroot/src/fuzz_ng_net/unixsock_readmsg_cmsg_cloexec.go /src/goroot/src/fuzz_ng_net/unixsock_readmsg_test.go /src/goroot/src/fuzz_ng_net/unixsock_test.go /src/goroot/src/fuzz_ng_net/unixsock_windows_test.go /src/goroot/src/fuzz_ng_net/write_unix_test.go /src/goroot/src/fuzz_ng_net/writev_test.go /src/goroot/src/fuzz_ng_net/writev_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_net (test)
Step #3 - "compile-libfuzzer-coverage-x86_64": 	error_test.go:14:2: use of internal package net/internal/socktest not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net [setup failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/netip/export_test.go /src/goroot/src/net/netip/fuzz_test.go /src/goroot/src/net/netip/inlining_test.go /src/goroot/src/net/netip/leaf_alts.go /src/goroot/src/net/netip/netip.go /src/goroot/src/net/netip/netip_pkg_test.go /src/goroot/src/net/netip/netip_test.go /src/goroot/src/net/netip/slow_test.go /src/goroot/src/net/netip/uint128.go /src/goroot/src/net/netip/uint128_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_netip '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Must'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Must net/netip fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Found package in /src/goroot/src/net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Function AddrFrom4 has unproduced argument byte
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:42 Function AddrFrom16 has unproduced argument byte
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_netip.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_netip.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/netip: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_netip/copy/leaf_alts.go fuzz_ng_net_netip/copy/netip.go fuzz_ng_net_netip/copy/uint128.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_netip/copy/leaf_alts.go fuzz_ng_net_netip/copy/netip.go fuzz_ng_net_netip/copy/uint128.go /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_netip/fuzz_ng.go fuzz_ng_net_netip/fuzzng_unsure_test.go fuzz_ng_net_netip/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/netip/export_test.go /src/goroot/src/net/netip/fuzz_test.go /src/goroot/src/net/netip/inlining_test.go /src/goroot/src/net/netip/netip_pkg_test.go /src/goroot/src/net/netip/netip_test.go /src/goroot/src/net/netip/slow_test.go /src/goroot/src/net/netip/uint128_test.go /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/netip/testdata /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/netip/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_netip/' /src/goroot/src/fuzz_ng_net_netip/export_test.go /src/goroot/src/fuzz_ng_net_netip/fuzz_ng.go /src/goroot/src/fuzz_ng_net_netip/fuzz_test.go /src/goroot/src/fuzz_ng_net_netip/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_netip/inlining_test.go /src/goroot/src/fuzz_ng_net_netip/leaf_alts.go /src/goroot/src/fuzz_ng_net_netip/netip.go /src/goroot/src/fuzz_ng_net_netip/netip_pkg_test.go /src/goroot/src/fuzz_ng_net_netip/netip_test.go /src/goroot/src/fuzz_ng_net_netip/ngolo_helper.go /src/goroot/src/fuzz_ng_net_netip/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_netip/slow_test.go /src/goroot/src/fuzz_ng_net_netip/uint128.go /src/goroot/src/fuzz_ng_net_netip/uint128_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_netip/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_netip/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_netip /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_netip [fuzz_ng_net_netip.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip_pkg_test.go:334:6: appendMarshaler redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./fuzz_test.go:289:6: other declaration of appendMarshaler
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip_test.go:25:6: uint128 redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./uint128.go:13:6: other declaration of uint128
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip_test.go:28:2: mustPrefix redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./netip_pkg_test.go:16:2: other declaration of mustPrefix
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip_test.go:29:2: mustIP redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./netip_pkg_test.go:17:2: other declaration of mustIP
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:76:6: IPv6LinkLocalAllNodes already declared through dot-import of package netip ("net/netip")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/net/netip/netip.go:76:6: other declaration of IPv6LinkLocalAllNodes
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:86:6: IPv6Unspecified already declared through dot-import of package netip ("net/netip")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/net/netip/netip.go:86:6: other declaration of IPv6Unspecified
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:89:6: IPv4Unspecified already declared through dot-import of package netip ("net/netip")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/net/netip/netip.go:89:6: other declaration of IPv4Unspecified
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:92:6: AddrFrom4 already declared through dot-import of package netip ("net/netip")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/net/netip/netip.go:92:6: other declaration of AddrFrom4
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:1029:6: AddrPortFrom already declared through dot-import of package netip ("net/netip")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/net/netip/netip.go:1028:6: other declaration of AddrPortFrom
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:1070:6: ParseAddrPort already declared through dot-import of package netip ("net/netip")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/net/netip/netip.go:1069:6: other declaration of ParseAddrPort
Step #3 - "compile-libfuzzer-coverage-x86_64": ./netip.go:1070:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_netip [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_netip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_netip_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/rpc/client.go /src/goroot/src/net/rpc/client_test.go /src/goroot/src/net/rpc/debug.go /src/goroot/src/net/rpc/server.go /src/goroot/src/net/rpc/server_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_rpc '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/rpc fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Found package in /src/goroot/src/net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Type ServerCodec is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Type ServerError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Type ClientCodec is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function Error has unproduced recv ServerError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function NewClient has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function NewClientWithCodec has unproduced argument ClientCodec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Unhandled argument &ast.ChanType{Begin:30270, Arrow:0, Dir:3, Value:(*ast.StarExpr)(0xc000011cc8)} for ClientNgdotGo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeConn has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeCodec has unproduced argument ServerCodec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeRequest has unproduced argument ServerCodec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function Accept has unproduced argument net.Listener
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeConn has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeCodec has unproduced argument ServerCodec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeRequest has unproduced argument ServerCodec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function Accept has unproduced argument net.Listener
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeHTTP has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:51 Function ServeHTTP has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_rpc.py
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/std/net_rpc.py
Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 /src/ngolo-fuzzing/std/net_rpc.py fuzz_ng_net_rpc/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzz_ng_net_rpc/fuzz_ngp.go fuzz_ng_net_rpc/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/rpc: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_rpc/copy/client.go fuzz_ng_net_rpc/copy/debug.go fuzz_ng_net_rpc/copy/server.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_rpc/copy/client.go fuzz_ng_net_rpc/copy/debug.go fuzz_ng_net_rpc/copy/server.go /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_rpc/fuzz_ng.go fuzz_ng_net_rpc/fuzzng_unsure_test.go fuzz_ng_net_rpc/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/rpc/client_test.go /src/goroot/src/net/rpc/server_test.go /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/rpc/testdata /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/rpc/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_rpc/' /src/goroot/src/fuzz_ng_net_rpc/client.go /src/goroot/src/fuzz_ng_net_rpc/client_test.go /src/goroot/src/fuzz_ng_net_rpc/debug.go /src/goroot/src/fuzz_ng_net_rpc/fuzz_ng.go /src/goroot/src/fuzz_ng_net_rpc/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_rpc/ngolo_helper.go /src/goroot/src/fuzz_ng_net_rpc/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_rpc/server.go /src/goroot/src/fuzz_ng_net_rpc/server_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_rpc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_rpc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_rpc /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_rpc [fuzz_ng_net_rpc.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_rpc [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_rpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_rpc_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/rpc/jsonrpc/all_test.go /src/goroot/src/net/rpc/jsonrpc/client.go /src/goroot/src/net/rpc/jsonrpc/server.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_rpc_jsonrpc '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/rpc/jsonrpc fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:58 Found package in /src/goroot/src/net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:58 Function NewClientCodec has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:58 Function NewClient has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:58 Function NewServerCodec has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:14:58 Function ServeConn has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_rpc_jsonrpc.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_rpc_jsonrpc.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/rpc/jsonrpc: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_rpc_jsonrpc/copy/client.go fuzz_ng_net_rpc_jsonrpc/copy/server.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_rpc_jsonrpc/copy/client.go fuzz_ng_net_rpc_jsonrpc/copy/server.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_rpc_jsonrpc/fuzz_ng.go fuzz_ng_net_rpc_jsonrpc/fuzzng_unsure_test.go fuzz_ng_net_rpc_jsonrpc/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/rpc/jsonrpc/all_test.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/rpc/jsonrpc/testdata /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/rpc/jsonrpc/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_rpc_jsonrpc/' /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/all_test.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/client.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/fuzz_ng.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/ngolo_helper.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/server.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_rpc_jsonrpc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_rpc_jsonrpc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_rpc_jsonrpc /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_rpc_jsonrpc [fuzz_ng_net_rpc_jsonrpc.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_rpc_jsonrpc [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_rpc_jsonrpc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_rpc_jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_rpc_jsonrpc_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/url/example_test.go /src/goroot/src/net/url/url.go /src/goroot/src/net/url/url_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_url '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/url fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Found package in /src/goroot/src/net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Type InvalidHostError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Type EscapeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Function Unwrap has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Function Timeout has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Function Temporary has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Function Error has unproduced recv EscapeError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Function Error has unproduced recv InvalidHostError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Unhandled argument &ast.Ellipsis{Ellipsis:34083, Elt:(*ast.Ident)(0xc0002ccba0)} for URLNgdotJoinPath
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:04 Unhandled argument &ast.Ellipsis{Ellipsis:35794, Elt:(*ast.Ident)(0xc0002cdce0)} for JoinPath
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_url.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_url.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/url: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_url/copy/url.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_url/copy/url.go /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_url/fuzz_ng.go fuzz_ng_net_url/fuzzng_unsure_test.go fuzz_ng_net_url/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/url/example_test.go /src/goroot/src/net/url/url_test.go /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/url/testdata /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/url/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_url/' /src/goroot/src/fuzz_ng_net_url/example_test.go /src/goroot/src/fuzz_ng_net_url/fuzz_ng.go /src/goroot/src/fuzz_ng_net_url/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_url/ngolo_helper.go /src/goroot/src/fuzz_ng_net_url/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_url/url.go /src/goroot/src/fuzz_ng_net_url/url_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_url/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_url/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_url /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_url [fuzz_ng_net_url.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_url [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_url/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_url
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_url_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/alpn_test.go /src/goroot/src/net/http/client.go /src/goroot/src/net/http/client_test.go /src/goroot/src/net/http/clientserver_test.go /src/goroot/src/net/http/clone.go /src/goroot/src/net/http/cookie.go /src/goroot/src/net/http/cookie_test.go /src/goroot/src/net/http/doc.go /src/goroot/src/net/http/example_filesystem_test.go /src/goroot/src/net/http/example_handle_test.go /src/goroot/src/net/http/example_test.go /src/goroot/src/net/http/export_test.go /src/goroot/src/net/http/filetransport.go /src/goroot/src/net/http/filetransport_test.go /src/goroot/src/net/http/fs.go /src/goroot/src/net/http/fs_test.go /src/goroot/src/net/http/h2_bundle.go /src/goroot/src/net/http/h2_error.go /src/goroot/src/net/http/h2_error_test.go /src/goroot/src/net/http/header.go /src/goroot/src/net/http/header_test.go /src/goroot/src/net/http/http.go /src/goroot/src/net/http/http_test.go /src/goroot/src/net/http/jar.go /src/goroot/src/net/http/main_test.go /src/goroot/src/net/http/mapping.go /src/goroot/src/net/http/mapping_test.go /src/goroot/src/net/http/method.go /src/goroot/src/net/http/omithttp2.go /src/goroot/src/net/http/pattern.go /src/goroot/src/net/http/pattern_test.go /src/goroot/src/net/http/proxy_test.go /src/goroot/src/net/http/range_test.go /src/goroot/src/net/http/readrequest_test.go /src/goroot/src/net/http/request.go /src/goroot/src/net/http/request_test.go /src/goroot/src/net/http/requestwrite_test.go /src/goroot/src/net/http/response.go /src/goroot/src/net/http/response_test.go /src/goroot/src/net/http/responsecontroller.go /src/goroot/src/net/http/responsecontroller_test.go /src/goroot/src/net/http/responsewrite_test.go /src/goroot/src/net/http/roundtrip.go /src/goroot/src/net/http/roundtrip_js.go /src/goroot/src/net/http/routing_index.go /src/goroot/src/net/http/routing_index_test.go /src/goroot/src/net/http/routing_tree.go /src/goroot/src/net/http/routing_tree_test.go /src/goroot/src/net/http/serve_test.go /src/goroot/src/net/http/servemux121.go /src/goroot/src/net/http/server.go /src/goroot/src/net/http/server_test.go /src/goroot/src/net/http/sniff.go /src/goroot/src/net/http/sniff_test.go /src/goroot/src/net/http/socks_bundle.go /src/goroot/src/net/http/status.go /src/goroot/src/net/http/transfer.go /src/goroot/src/net/http/transfer_test.go /src/goroot/src/net/http/transport.go /src/goroot/src/net/http/transport_default_other.go /src/goroot/src/net/http/transport_default_wasm.go /src/goroot/src/net/http/transport_internal_test.go /src/goroot/src/net/http/transport_test.go /src/goroot/src/net/http/triv.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 64 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude ListenAndServe'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude ListenAndServe net/http fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Found package in /src/goroot/src/net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Array result for Cookie is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Array result for Cookie is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Type Dir is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Type MaxBytesError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Type HandlerFunc is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Type ResponseWriter is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Type ProtocolError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Get has unproduced recv Client
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Do has unproduced recv Client
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Post has unproduced recv Client
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function PostForm has unproduced argument url.Values
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function PostForm has unproduced recv Client
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Head has unproduced recv Client
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function CloseIdleConnections has unproduced recv Client
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function SetCookie has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function NewFileTransportFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Open has unproduced recv Dir
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeContent has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeContent has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeContent has unproduced argument io.ReadSeeker
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeFile has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeFileFS has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeFileFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function FS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function FileServerFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Error has unproduced recv ProtocolError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Is has unproduced recv ProtocolError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function WithContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Clone has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function NewRequestWithContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function MaxBytesReader has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function MaxBytesReader has unproduced argument io.ReadCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Error has unproduced recv MaxBytesError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function NewResponseController has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function SetReadDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function SetWriteDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeHTTP has unproduced recv HandlerFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Error has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function NotFound has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Redirect has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeHTTP has unproduced argument ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Unhandled argument &ast.FuncType{Func:800175, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00096e9f0), Results:(*ast.FieldList)(nil)} for ServeMuxNgdotHandleFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Unhandled argument &ast.FuncType{Func:800844, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00096ec90), Results:(*ast.FieldList)(nil)} for HandleFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Serve has unproduced argument net.Listener
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeTLS has unproduced argument net.Listener
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Close has unproduced recv Server
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Shutdown has unproduced recv Server
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function RegisterOnShutdown has unproduced recv Server
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function Serve has unproduced recv Server
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ServeTLS has unproduced recv Server
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function SetKeepAlivesEnabled has unproduced recv Server
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function TimeoutHandler has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:12 Function ProxyURL has unproduced argument url.URL
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.7
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http/copy/client.go fuzz_ng_net_http/copy/clone.go fuzz_ng_net_http/copy/cookie.go fuzz_ng_net_http/copy/doc.go fuzz_ng_net_http/copy/filetransport.go fuzz_ng_net_http/copy/fs.go fuzz_ng_net_http/copy/h2_bundle.go fuzz_ng_net_http/copy/h2_error.go fuzz_ng_net_http/copy/header.go fuzz_ng_net_http/copy/http.go fuzz_ng_net_http/copy/jar.go fuzz_ng_net_http/copy/mapping.go fuzz_ng_net_http/copy/method.go fuzz_ng_net_http/copy/pattern.go fuzz_ng_net_http/copy/request.go fuzz_ng_net_http/copy/response.go fuzz_ng_net_http/copy/responsecontroller.go fuzz_ng_net_http/copy/roundtrip.go fuzz_ng_net_http/copy/routing_index.go fuzz_ng_net_http/copy/routing_tree.go fuzz_ng_net_http/copy/servemux121.go fuzz_ng_net_http/copy/server.go fuzz_ng_net_http/copy/sniff.go fuzz_ng_net_http/copy/socks_bundle.go fuzz_ng_net_http/copy/status.go fuzz_ng_net_http/copy/transfer.go fuzz_ng_net_http/copy/transport.go fuzz_ng_net_http/copy/transport_default_other.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_net_http/copy/header.go:242:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http/copy/client.go fuzz_ng_net_http/copy/clone.go fuzz_ng_net_http/copy/cookie.go fuzz_ng_net_http/copy/doc.go fuzz_ng_net_http/copy/filetransport.go fuzz_ng_net_http/copy/fs.go fuzz_ng_net_http/copy/h2_bundle.go fuzz_ng_net_http/copy/h2_error.go fuzz_ng_net_http/copy/header.go fuzz_ng_net_http/copy/http.go fuzz_ng_net_http/copy/jar.go fuzz_ng_net_http/copy/mapping.go fuzz_ng_net_http/copy/method.go fuzz_ng_net_http/copy/pattern.go fuzz_ng_net_http/copy/request.go fuzz_ng_net_http/copy/response.go fuzz_ng_net_http/copy/responsecontroller.go fuzz_ng_net_http/copy/roundtrip.go fuzz_ng_net_http/copy/routing_index.go fuzz_ng_net_http/copy/routing_tree.go fuzz_ng_net_http/copy/servemux121.go fuzz_ng_net_http/copy/server.go fuzz_ng_net_http/copy/sniff.go fuzz_ng_net_http/copy/socks_bundle.go fuzz_ng_net_http/copy/status.go fuzz_ng_net_http/copy/transfer.go fuzz_ng_net_http/copy/transport.go fuzz_ng_net_http/copy/transport_default_other.go /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http/fuzz_ng.go fuzz_ng_net_http/fuzzng_unsure_test.go fuzz_ng_net_http/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/alpn_test.go /src/goroot/src/net/http/client_test.go /src/goroot/src/net/http/clientserver_test.go /src/goroot/src/net/http/cookie_test.go /src/goroot/src/net/http/example_filesystem_test.go /src/goroot/src/net/http/example_handle_test.go /src/goroot/src/net/http/example_test.go /src/goroot/src/net/http/export_test.go /src/goroot/src/net/http/filetransport_test.go /src/goroot/src/net/http/fs_test.go /src/goroot/src/net/http/h2_error_test.go /src/goroot/src/net/http/header_test.go /src/goroot/src/net/http/http_test.go /src/goroot/src/net/http/main_test.go /src/goroot/src/net/http/mapping_test.go /src/goroot/src/net/http/pattern_test.go /src/goroot/src/net/http/proxy_test.go /src/goroot/src/net/http/range_test.go /src/goroot/src/net/http/readrequest_test.go /src/goroot/src/net/http/request_test.go /src/goroot/src/net/http/requestwrite_test.go /src/goroot/src/net/http/response_test.go /src/goroot/src/net/http/responsecontroller_test.go /src/goroot/src/net/http/responsewrite_test.go /src/goroot/src/net/http/routing_index_test.go /src/goroot/src/net/http/routing_tree_test.go /src/goroot/src/net/http/serve_test.go /src/goroot/src/net/http/server_test.go /src/goroot/src/net/http/sniff_test.go /src/goroot/src/net/http/transfer_test.go /src/goroot/src/net/http/transport_internal_test.go /src/goroot/src/net/http/transport_test.go /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/testdata /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http/' /src/goroot/src/fuzz_ng_net_http/alpn_test.go /src/goroot/src/fuzz_ng_net_http/client.go /src/goroot/src/fuzz_ng_net_http/client_test.go /src/goroot/src/fuzz_ng_net_http/clientserver_test.go /src/goroot/src/fuzz_ng_net_http/clone.go /src/goroot/src/fuzz_ng_net_http/cookie.go /src/goroot/src/fuzz_ng_net_http/cookie_test.go /src/goroot/src/fuzz_ng_net_http/doc.go /src/goroot/src/fuzz_ng_net_http/example_filesystem_test.go /src/goroot/src/fuzz_ng_net_http/example_handle_test.go /src/goroot/src/fuzz_ng_net_http/example_test.go /src/goroot/src/fuzz_ng_net_http/export_test.go /src/goroot/src/fuzz_ng_net_http/filetransport.go /src/goroot/src/fuzz_ng_net_http/filetransport_test.go /src/goroot/src/fuzz_ng_net_http/fs.go /src/goroot/src/fuzz_ng_net_http/fs_test.go /src/goroot/src/fuzz_ng_net_http/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http/h2_bundle.go /src/goroot/src/fuzz_ng_net_http/h2_error.go /src/goroot/src/fuzz_ng_net_http/h2_error_test.go /src/goroot/src/fuzz_ng_net_http/header.go /src/goroot/src/fuzz_ng_net_http/header_test.go /src/goroot/src/fuzz_ng_net_http/http.go /src/goroot/src/fuzz_ng_net_http/http_test.go /src/goroot/src/fuzz_ng_net_http/jar.go /src/goroot/src/fuzz_ng_net_http/main_test.go /src/goroot/src/fuzz_ng_net_http/mapping.go /src/goroot/src/fuzz_ng_net_http/mapping_test.go /src/goroot/src/fuzz_ng_net_http/method.go /src/goroot/src/fuzz_ng_net_http/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http/pattern.go /src/goroot/src/fuzz_ng_net_http/pattern_test.go /src/goroot/src/fuzz_ng_net_http/proxy_test.go /src/goroot/src/fuzz_ng_net_http/range_test.go /src/goroot/src/fuzz_ng_net_http/readrequest_test.go /src/goroot/src/fuzz_ng_net_http/request.go /src/goroot/src/fuzz_ng_net_http/request_test.go /src/goroot/src/fuzz_ng_net_http/requestwrite_test.go /src/goroot/src/fuzz_ng_net_http/response.go /src/goroot/src/fuzz_ng_net_http/response_test.go /src/goroot/src/fuzz_ng_net_http/responsecontroller.go /src/goroot/src/fuzz_ng_net_http/responsecontroller_test.go /src/goroot/src/fuzz_ng_net_http/responsewrite_test.go /src/goroot/src/fuzz_ng_net_http/roundtrip.go /src/goroot/src/fuzz_ng_net_http/routing_index.go /src/goroot/src/fuzz_ng_net_http/routing_index_test.go /src/goroot/src/fuzz_ng_net_http/routing_tree.go /src/goroot/src/fuzz_ng_net_http/routing_tree_test.go /src/goroot/src/fuzz_ng_net_http/serve_test.go /src/goroot/src/fuzz_ng_net_http/servemux121.go /src/goroot/src/fuzz_ng_net_http/server.go /src/goroot/src/fuzz_ng_net_http/server_test.go /src/goroot/src/fuzz_ng_net_http/sniff.go /src/goroot/src/fuzz_ng_net_http/sniff_test.go /src/goroot/src/fuzz_ng_net_http/socks_bundle.go /src/goroot/src/fuzz_ng_net_http/status.go /src/goroot/src/fuzz_ng_net_http/transfer.go /src/goroot/src/fuzz_ng_net_http/transfer_test.go /src/goroot/src/fuzz_ng_net_http/transport.go /src/goroot/src/fuzz_ng_net_http/transport_default_other.go /src/goroot/src/fuzz_ng_net_http/transport_internal_test.go /src/goroot/src/fuzz_ng_net_http/transport_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": 	transfer.go:15:2: use of internal package net/http/internal not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/pprof/pprof.go /src/goroot/src/net/http/pprof/pprof_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_pprof '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/pprof fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Found package in /src/goroot/src/net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Cmdline has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Cmdline has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Profile has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Profile has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Trace has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Trace has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Symbol has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Symbol has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Index has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:25 Function Index has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_pprof.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_pprof.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/pprof: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_pprof/copy/pprof.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_pprof/copy/pprof.go /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_pprof/fuzz_ng.go fuzz_ng_net_http_pprof/fuzzng_unsure_test.go fuzz_ng_net_http_pprof/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/pprof/pprof_test.go /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/pprof/testdata /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/pprof/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_pprof/' /src/goroot/src/fuzz_ng_net_http_pprof/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_pprof/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_pprof/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_pprof/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_pprof/pprof.go /src/goroot/src/fuzz_ng_net_http_pprof/pprof_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_pprof/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_pprof/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_pprof /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_http_pprof [fuzz_ng_net_http_pprof.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_http_pprof [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_pprof_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/httputil/dump.go /src/goroot/src/net/http/httputil/dump_test.go /src/goroot/src/net/http/httputil/example_test.go /src/goroot/src/net/http/httputil/httputil.go /src/goroot/src/net/http/httputil/persist.go /src/goroot/src/net/http/httputil/reverseproxy.go /src/goroot/src/net/http/httputil/reverseproxy_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_httputil '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/httputil fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Found package in /src/goroot/src/net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function DumpRequestOut has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function DumpRequest has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function DumpResponse has unproduced argument http.Response
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function Write has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function Write has unproduced argument http.Response
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function Write has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function Read has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function Do has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function SetURL has unproduced recv ProxyRequest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function SetXForwarded has unproduced recv ProxyRequest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function NewSingleHostReverseProxy has unproduced argument url.URL
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function ServeHTTP has unproduced argument http.ResponseWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:31 Function ServeHTTP has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_httputil.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_httputil.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/httputil: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httputil [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httputil.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:6: ReverseProxyResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:180:2: ReverseProxyResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:284:2: ReverseProxyNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:285:2: ReverseProxyResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_httputil/copy/dump.go fuzz_ng_net_http_httputil/copy/httputil.go fuzz_ng_net_http_httputil/copy/persist.go fuzz_ng_net_http_httputil/copy/reverseproxy.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_httputil/copy/dump.go fuzz_ng_net_http_httputil/copy/httputil.go fuzz_ng_net_http_httputil/copy/persist.go fuzz_ng_net_http_httputil/copy/reverseproxy.go /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_httputil/fuzz_ng.go fuzz_ng_net_http_httputil/fuzzng_unsure_test.go fuzz_ng_net_http_httputil/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/httputil/dump_test.go /src/goroot/src/net/http/httputil/example_test.go /src/goroot/src/net/http/httputil/reverseproxy_test.go /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/httputil/testdata /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/httputil/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_httputil/' /src/goroot/src/fuzz_ng_net_http_httputil/dump.go /src/goroot/src/fuzz_ng_net_http_httputil/dump_test.go /src/goroot/src/fuzz_ng_net_http_httputil/example_test.go /src/goroot/src/fuzz_ng_net_http_httputil/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_httputil/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_httputil/httputil.go /src/goroot/src/fuzz_ng_net_http_httputil/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_httputil/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_httputil/persist.go /src/goroot/src/fuzz_ng_net_http_httputil/reverseproxy.go /src/goroot/src/fuzz_ng_net_http_httputil/reverseproxy_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_httputil/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_httputil/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_httputil /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": 	httputil.go:12:2: use of internal package net/http/internal not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_httputil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_httputil_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/fcgi/child.go /src/goroot/src/net/http/fcgi/fcgi.go /src/goroot/src/net/http/fcgi/fcgi_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_fcgi '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/fcgi fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:37 Found package in /src/goroot/src/net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:37 Function Serve has unproduced argument net.Listener
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:37 Function Serve has unproduced argument http.Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:37 Function ProcessEnv has unproduced argument http.Request
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_fcgi.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_fcgi.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/fcgi: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_fcgi [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_fcgi.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:15:2: "net/http/fcgi" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_fcgi/copy/child.go fuzz_ng_net_http_fcgi/copy/fcgi.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_fcgi/copy/child.go fuzz_ng_net_http_fcgi/copy/fcgi.go /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_fcgi/fuzz_ng.go fuzz_ng_net_http_fcgi/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/fcgi/fcgi_test.go /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/fcgi/testdata /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/fcgi/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_fcgi/' /src/goroot/src/fuzz_ng_net_http_fcgi/child.go /src/goroot/src/fuzz_ng_net_http_fcgi/fcgi.go /src/goroot/src/fuzz_ng_net_http_fcgi/fcgi_test.go /src/goroot/src/fuzz_ng_net_http_fcgi/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_fcgi/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_fcgi/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_fcgi/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_fcgi/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_fcgi /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_http_fcgi [fuzz_ng_net_http_fcgi.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_http_fcgi [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_fcgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_fcgi_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/cgi/cgi_main.go /src/goroot/src/net/http/cgi/child.go /src/goroot/src/net/http/cgi/child_test.go /src/goroot/src/net/http/cgi/host.go /src/goroot/src/net/http/cgi/host_test.go /src/goroot/src/net/http/cgi/integration_test.go /src/goroot/src/net/http/cgi/plan9_test.go /src/goroot/src/net/http/cgi/posix_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_cgi '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/cgi fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:40 Found package in /src/goroot/src/net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:40 Function Serve has unproduced argument http.Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:40 Function ServeHTTP has unproduced recv Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_cgi.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_cgi.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/cgi: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_cgi/copy/cgi_main.go fuzz_ng_net_http_cgi/copy/child.go fuzz_ng_net_http_cgi/copy/host.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_cgi/copy/cgi_main.go fuzz_ng_net_http_cgi/copy/child.go fuzz_ng_net_http_cgi/copy/host.go /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_cgi/fuzz_ng.go fuzz_ng_net_http_cgi/fuzzng_unsure_test.go fuzz_ng_net_http_cgi/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/cgi/child_test.go /src/goroot/src/net/http/cgi/host_test.go /src/goroot/src/net/http/cgi/integration_test.go /src/goroot/src/net/http/cgi/plan9_test.go /src/goroot/src/net/http/cgi/posix_test.go /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/cgi/testdata /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/cgi/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_cgi/' /src/goroot/src/fuzz_ng_net_http_cgi/cgi_main.go /src/goroot/src/fuzz_ng_net_http_cgi/child.go /src/goroot/src/fuzz_ng_net_http_cgi/child_test.go /src/goroot/src/fuzz_ng_net_http_cgi/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_cgi/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_cgi/host.go /src/goroot/src/fuzz_ng_net_http_cgi/host_test.go /src/goroot/src/fuzz_ng_net_http_cgi/integration_test.go /src/goroot/src/fuzz_ng_net_http_cgi/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_cgi/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_cgi/plan9_test.go /src/goroot/src/fuzz_ng_net_http_cgi/posix_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_cgi/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_cgi/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_cgi /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_http_cgi [fuzz_ng_net_http_cgi.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_http_cgi [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_cgi/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_cgi_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/httptest/example_test.go /src/goroot/src/net/http/httptest/httptest.go /src/goroot/src/net/http/httptest/httptest_test.go /src/goroot/src/net/http/httptest/recorder.go /src/goroot/src/net/http/httptest/recorder_test.go /src/goroot/src/net/http/httptest/server.go /src/goroot/src/net/http/httptest/server_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_httptest '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/httptest fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:47 Found package in /src/goroot/src/net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:47 Function NewServer has unproduced argument http.Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:47 Function NewUnstartedServer has unproduced argument http.Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:47 Function NewTLSServer has unproduced argument http.Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_httptest.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_httptest.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/httptest: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_httptest/copy/httptest.go fuzz_ng_net_http_httptest/copy/recorder.go fuzz_ng_net_http_httptest/copy/server.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_httptest/copy/httptest.go fuzz_ng_net_http_httptest/copy/recorder.go fuzz_ng_net_http_httptest/copy/server.go /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_httptest/fuzz_ng.go fuzz_ng_net_http_httptest/fuzzng_unsure_test.go fuzz_ng_net_http_httptest/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/httptest/example_test.go /src/goroot/src/net/http/httptest/httptest_test.go /src/goroot/src/net/http/httptest/recorder_test.go /src/goroot/src/net/http/httptest/server_test.go /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/httptest/testdata /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/httptest/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_httptest/' /src/goroot/src/fuzz_ng_net_http_httptest/example_test.go /src/goroot/src/fuzz_ng_net_http_httptest/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_httptest/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_httptest/httptest.go /src/goroot/src/fuzz_ng_net_http_httptest/httptest_test.go /src/goroot/src/fuzz_ng_net_http_httptest/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_httptest/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_http_httptest/recorder.go /src/goroot/src/fuzz_ng_net_http_httptest/recorder_test.go /src/goroot/src/fuzz_ng_net_http_httptest/server.go /src/goroot/src/fuzz_ng_net_http_httptest/server_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_httptest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_httptest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_httptest /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": 	server.go:17:2: use of internal package net/http/internal/testcert not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_httptest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_httptest_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/net/http/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/net/http/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/httptrace/example_test.go /src/goroot/src/net/http/httptrace/trace.go /src/goroot/src/net/http/httptrace/trace_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_httptrace '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/httptrace fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:54 Found package in /src/goroot/src/net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:54 Function ContextClientTrace has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:54 Function WithClientTrace has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_httptrace.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_httptrace.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/httptrace: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httptrace [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_httptrace.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:175:38: ClientTraceResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:176:2: ClientTraceResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:187:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:188:2: ClientTraceNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:189:2: ClientTraceResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_httptrace/copy/trace.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_httptrace/copy/trace.go /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_httptrace/fuzz_ng.go fuzz_ng_net_http_httptrace/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/httptrace/example_test.go /src/goroot/src/net/http/httptrace/trace_test.go /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/httptrace/testdata /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/httptrace/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_httptrace/' /src/goroot/src/fuzz_ng_net_http_httptrace/example_test.go /src/goroot/src/fuzz_ng_net_http_httptrace/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_httptrace/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_httptrace/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_httptrace/trace.go /src/goroot/src/fuzz_ng_net_http_httptrace/trace_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_httptrace/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_httptrace/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_httptrace /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_http_httptrace [fuzz_ng_net_http_httptrace.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_http_httptrace [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_httptrace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_httptrace_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/internal/chunked.go /src/goroot/src/net/http/internal/chunked_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/internal/testcert/testcert.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/internal/testcert
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/internal/ascii/print.go /src/goroot/src/net/http/internal/ascii/print_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/internal/ascii
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/http/cookiejar/dummy_publicsuffix_test.go /src/goroot/src/net/http/cookiejar/example_test.go /src/goroot/src/net/http/cookiejar/jar.go /src/goroot/src/net/http/cookiejar/jar_test.go /src/goroot/src/net/http/cookiejar/punycode.go /src/goroot/src/net/http/cookiejar/punycode_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_http_cookiejar '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/http/cookiejar fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:57 Found package in /src/goroot/src/net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:57 Array result for http.Cookie is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:57 Function New has unproduced argument Options
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:57 Function Cookies has unproduced argument url.URL
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:57 Function SetCookies has unproduced argument url.URL
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:57 Function SetCookies has unproduced argument http.Cookie
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_http_cookiejar.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_http_cookiejar.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/http/cookiejar: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_cookiejar [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_http_cookiejar.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:175:38: JarResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:176:2: JarResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:187:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:188:2: JarNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:189:2: JarResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_http_cookiejar/copy/jar.go fuzz_ng_net_http_cookiejar/copy/punycode.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_cookiejar/copy/jar.go fuzz_ng_net_http_cookiejar/copy/punycode.go /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_http_cookiejar/fuzz_ng.go fuzz_ng_net_http_cookiejar/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/http/cookiejar/dummy_publicsuffix_test.go /src/goroot/src/net/http/cookiejar/example_test.go /src/goroot/src/net/http/cookiejar/jar_test.go /src/goroot/src/net/http/cookiejar/punycode_test.go /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/http/cookiejar/testdata /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/http/cookiejar/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_http_cookiejar/' /src/goroot/src/fuzz_ng_net_http_cookiejar/dummy_publicsuffix_test.go /src/goroot/src/fuzz_ng_net_http_cookiejar/example_test.go /src/goroot/src/fuzz_ng_net_http_cookiejar/fuzz_ng.go /src/goroot/src/fuzz_ng_net_http_cookiejar/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_http_cookiejar/jar.go /src/goroot/src/fuzz_ng_net_http_cookiejar/jar_test.go /src/goroot/src/fuzz_ng_net_http_cookiejar/ngolo_helper.go /src/goroot/src/fuzz_ng_net_http_cookiejar/punycode.go /src/goroot/src/fuzz_ng_net_http_cookiejar/punycode_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_cookiejar/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_http_cookiejar/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_http_cookiejar /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": 	jar.go:13:2: use of internal package net/http/internal/ascii not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_http_cookiejar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_http_cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_http_cookiejar_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/smtp/auth.go /src/goroot/src/net/smtp/example_test.go /src/goroot/src/net/smtp/smtp.go /src/goroot/src/net/smtp/smtp_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_smtp '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/smtp fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:59 Found package in /src/goroot/src/net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:59 Function StartTLS has unproduced argument tls.Config
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_smtp.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_smtp.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/smtp: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_smtp/copy/auth.go fuzz_ng_net_smtp/copy/smtp.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_smtp/copy/auth.go fuzz_ng_net_smtp/copy/smtp.go /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_smtp/fuzz_ng.go fuzz_ng_net_smtp/fuzzng_unsure_test.go fuzz_ng_net_smtp/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/smtp/example_test.go /src/goroot/src/net/smtp/smtp_test.go /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/smtp/testdata /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/smtp/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_smtp/' /src/goroot/src/fuzz_ng_net_smtp/auth.go /src/goroot/src/fuzz_ng_net_smtp/example_test.go /src/goroot/src/fuzz_ng_net_smtp/fuzz_ng.go /src/goroot/src/fuzz_ng_net_smtp/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_smtp/ngolo_helper.go /src/goroot/src/fuzz_ng_net_smtp/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_smtp/smtp.go /src/goroot/src/fuzz_ng_net_smtp/smtp_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_smtp/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_smtp/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_smtp /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_smtp [fuzz_ng_net_smtp.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_smtp [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_smtp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_smtp_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/net/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/net/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/net/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/net/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/internal/socktest/main_test.go /src/goroot/src/net/internal/socktest/main_unix_test.go /src/goroot/src/net/internal/socktest/switch.go /src/goroot/src/net/internal/socktest/switch_posix.go /src/goroot/src/net/internal/socktest/switch_stub.go /src/goroot/src/net/internal/socktest/switch_unix.go /src/goroot/src/net/internal/socktest/switch_windows.go /src/goroot/src/net/internal/socktest/sys_cloexec.go /src/goroot/src/net/internal/socktest/sys_unix.go /src/goroot/src/net/internal/socktest/sys_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/internal/socktest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/textproto/header.go /src/goroot/src/net/textproto/header_test.go /src/goroot/src/net/textproto/pipeline.go /src/goroot/src/net/textproto/reader.go /src/goroot/src/net/textproto/reader_test.go /src/goroot/src/net/textproto/textproto.go /src/goroot/src/net/textproto/writer.go /src/goroot/src/net/textproto/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_textproto '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/textproto fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Found package in /src/goroot/src/net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Type Pipeline is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Type ProtocolError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function Next has unproduced recv Pipeline
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function StartRequest has unproduced recv Pipeline
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function EndRequest has unproduced recv Pipeline
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function StartResponse has unproduced recv Pipeline
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function EndResponse has unproduced recv Pipeline
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function Error has unproduced recv ProtocolError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function NewConn has unproduced argument io.ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Unhandled argument &ast.Ellipsis{Ellipsis:30467, Elt:(*ast.Ident)(0xc0000b70c0)} for ConnNgdotCmd
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Function NewWriter has unproduced argument bufio.Writer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:06 Unhandled argument &ast.Ellipsis{Ellipsis:684, Elt:(*ast.Ident)(0xc000218d00)} for WriterNgdotPrintfLine
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_textproto.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_textproto.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/textproto: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_textproto/copy/header.go fuzz_ng_net_textproto/copy/pipeline.go fuzz_ng_net_textproto/copy/reader.go fuzz_ng_net_textproto/copy/textproto.go fuzz_ng_net_textproto/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_textproto/copy/header.go fuzz_ng_net_textproto/copy/pipeline.go fuzz_ng_net_textproto/copy/reader.go fuzz_ng_net_textproto/copy/textproto.go fuzz_ng_net_textproto/copy/writer.go /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_textproto/fuzz_ng.go fuzz_ng_net_textproto/fuzzng_unsure_test.go fuzz_ng_net_textproto/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/textproto/header_test.go /src/goroot/src/net/textproto/reader_test.go /src/goroot/src/net/textproto/writer_test.go /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/textproto/testdata /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/textproto/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_textproto/' /src/goroot/src/fuzz_ng_net_textproto/fuzz_ng.go /src/goroot/src/fuzz_ng_net_textproto/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_textproto/header.go /src/goroot/src/fuzz_ng_net_textproto/header_test.go /src/goroot/src/fuzz_ng_net_textproto/ngolo_helper.go /src/goroot/src/fuzz_ng_net_textproto/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_textproto/pipeline.go /src/goroot/src/fuzz_ng_net_textproto/reader.go /src/goroot/src/fuzz_ng_net_textproto/reader_test.go /src/goroot/src/fuzz_ng_net_textproto/textproto.go /src/goroot/src/fuzz_ng_net_textproto/writer.go /src/goroot/src/fuzz_ng_net_textproto/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_textproto/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_textproto/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_textproto /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_textproto [fuzz_ng_net_textproto.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./reader.go:35:6: cannot use bytes.NewReader(ngolo_r) (value of type *bytes.Reader) as *bufio.Reader value in assignment
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_textproto [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_textproto/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_textproto_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/net/mail/example_test.go /src/goroot/src/net/mail/message.go /src/goroot/src/net/mail/message_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^net_mail '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing net/mail fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Found package in /src/goroot/src/net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Array result for Address is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Array result for Address is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Array result for Address is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Type Header is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Function Get has unproduced recv Header
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Function Date has unproduced recv Header
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Function AddressList has unproduced recv Header
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Function Parse has unproduced recv AddressParser
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:13 Function ParseList has unproduced recv AddressParser
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/net_mail.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/net_mail.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module net/mail: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_net_mail/copy/message.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_mail/copy/message.go /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_net_mail/fuzz_ng.go fuzz_ng_net_mail/fuzzng_unsure_test.go fuzz_ng_net_mail/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/net/mail/example_test.go /src/goroot/src/net/mail/message_test.go /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/net/mail/testdata /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/net/mail/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_net_mail/' /src/goroot/src/fuzz_ng_net_mail/example_test.go /src/goroot/src/fuzz_ng_net_mail/fuzz_ng.go /src/goroot/src/fuzz_ng_net_mail/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_net_mail/message.go /src/goroot/src/fuzz_ng_net_mail/message_test.go /src/goroot/src/fuzz_ng_net_mail/ngolo_helper.go /src/goroot/src/fuzz_ng_net_mail/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_mail/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_net_mail/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_net_mail /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_net_mail [fuzz_ng_net_mail.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_net_mail [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_net_mail/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_net_mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_net_mail_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/pack/doc.go /src/goroot/src/cmd/pack/pack.go /src/goroot/src/cmd/pack/pack_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_pack '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/pack fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:19 Found package in /src/goroot/src/cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_pack.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_pack.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/pack" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/pack" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/pack" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_pack/copy/doc.go fuzz_ng_cmd_pack/copy/pack.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_pack/copy/doc.go fuzz_ng_cmd_pack/copy/pack.go /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_pack/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/pack/pack_test.go /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/pack/testdata /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/pack/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_pack/' /src/goroot/src/fuzz_ng_cmd_pack/doc.go /src/goroot/src/fuzz_ng_cmd_pack/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_pack/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_pack/pack.go /src/goroot/src/fuzz_ng_cmd_pack/pack_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_pack/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_pack/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_pack /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": 	pack.go:8:2: use of internal package cmd/internal/archive not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_pack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_pack_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/covdata/argsmerge.go /src/goroot/src/cmd/covdata/covdata.go /src/goroot/src/cmd/covdata/doc.go /src/goroot/src/cmd/covdata/dump.go /src/goroot/src/cmd/covdata/export_test.go /src/goroot/src/cmd/covdata/merge.go /src/goroot/src/cmd/covdata/metamerge.go /src/goroot/src/cmd/covdata/subtractintersect.go /src/goroot/src/cmd/covdata/tool_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_covdata '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/covdata fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:21 Found package in /src/goroot/src/cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_covdata.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_covdata.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/covdata" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/covdata" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/covdata" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_covdata/copy/argsmerge.go fuzz_ng_cmd_covdata/copy/covdata.go fuzz_ng_cmd_covdata/copy/doc.go fuzz_ng_cmd_covdata/copy/dump.go fuzz_ng_cmd_covdata/copy/merge.go fuzz_ng_cmd_covdata/copy/metamerge.go fuzz_ng_cmd_covdata/copy/subtractintersect.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_covdata/copy/argsmerge.go fuzz_ng_cmd_covdata/copy/covdata.go fuzz_ng_cmd_covdata/copy/doc.go fuzz_ng_cmd_covdata/copy/dump.go fuzz_ng_cmd_covdata/copy/merge.go fuzz_ng_cmd_covdata/copy/metamerge.go fuzz_ng_cmd_covdata/copy/subtractintersect.go /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_covdata/fuzz_ng.go fuzz_ng_cmd_covdata/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/covdata/export_test.go /src/goroot/src/cmd/covdata/tool_test.go /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/covdata/testdata /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_covdata/' /src/goroot/src/fuzz_ng_cmd_covdata/argsmerge.go /src/goroot/src/fuzz_ng_cmd_covdata/covdata.go /src/goroot/src/fuzz_ng_cmd_covdata/doc.go /src/goroot/src/fuzz_ng_cmd_covdata/dump.go /src/goroot/src/fuzz_ng_cmd_covdata/export_test.go /src/goroot/src/fuzz_ng_cmd_covdata/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_covdata/merge.go /src/goroot/src/fuzz_ng_cmd_covdata/metamerge.go /src/goroot/src/fuzz_ng_cmd_covdata/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_covdata/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_cmd_covdata/subtractintersect.go /src/goroot/src/fuzz_ng_cmd_covdata/tool_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_covdata/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_covdata/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_covdata /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": 	covdata.go:8:2: use of internal package cmd/internal/cov not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_covdata/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_covdata_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/covdata/testdata/dep.go /src/goroot/src/cmd/covdata/testdata/prog1.go /src/goroot/src/cmd/covdata/testdata/prog2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/covdata/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/test2json/main.go /src/goroot/src/cmd/test2json/signal_notunix.go /src/goroot/src/cmd/test2json/signal_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_test2json '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/test2json fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:27 Found package in /src/goroot/src/cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_test2json.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_test2json.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/test2json" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/test2json" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/test2json" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_test2json/copy/main.go fuzz_ng_cmd_test2json/copy/signal_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_test2json/copy/main.go fuzz_ng_cmd_test2json/copy/signal_unix.go /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_test2json/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/cmd/test2json/*_test.go' /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/test2json/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/test2json/testdata /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/test2json/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_test2json/' /src/goroot/src/fuzz_ng_cmd_test2json/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_test2json/main.go /src/goroot/src/fuzz_ng_cmd_test2json/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_test2json/signal_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_test2json/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_test2json/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_test2json /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:99:2: use of internal package cmd/internal/test2json not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_test2json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_test2json_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/pprof/doc.go /src/goroot/src/cmd/pprof/pprof.go /src/goroot/src/cmd/pprof/pprof_test.go /src/goroot/src/cmd/pprof/readlineui.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_pprof '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/pprof fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:29 Found package in /src/goroot/src/cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_pprof.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_pprof.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/google/pprof/profile
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/google/pprof/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20231127191134-f3a68a39ae15
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/google/pprof/driver in github.com/google/pprof v0.0.0-20231127191134-f3a68a39ae15
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/google/pprof/profile in github.com/google/pprof v0.0.0-20231127191134-f3a68a39ae15
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.6.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ianlancetaylor/demangle v0.0.0-20230524184225-eabc099b10ab
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chromedp/chromedp v0.9.2
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chromedp/cdproto v0.0.0-20230802225258-3cf4e6d46a89
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/ws v1.2.1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/pool v0.2.1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/httphead v0.1.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chromedp/sysutil v1.0.0
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/pprof" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/pprof" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/pprof" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_pprof/copy/doc.go fuzz_ng_cmd_pprof/copy/pprof.go fuzz_ng_cmd_pprof/copy/readlineui.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_pprof/copy/doc.go fuzz_ng_cmd_pprof/copy/pprof.go fuzz_ng_cmd_pprof/copy/readlineui.go /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_pprof/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/pprof/pprof_test.go /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/pprof/testdata /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_pprof/' /src/goroot/src/fuzz_ng_cmd_pprof/doc.go /src/goroot/src/fuzz_ng_cmd_pprof/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_pprof/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_pprof/pprof.go /src/goroot/src/fuzz_ng_cmd_pprof/pprof_test.go /src/goroot/src/fuzz_ng_cmd_pprof/readlineui.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_pprof/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_pprof/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_pprof /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.15.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/google/pprof/profile
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/google/pprof/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/google/pprof/driver in github.com/google/pprof v0.0.0-20231127191134-f3a68a39ae15
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/google/pprof/profile in github.com/google/pprof v0.0.0-20231127191134-f3a68a39ae15
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": 	pprof.go:26:2: use of internal package cmd/internal/objfile not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_pprof_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/pprof/testdata/cpu.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/pprof/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/tools/tools.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_tools '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/tools fuzz_ng_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:33 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:33 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_tools.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_tools.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_cmd_tools: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_cmd_tools: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module cmd/tools: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package cmd/tools: build constraints exclude all Go files in /src/goroot/src/cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_cmd_tools/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_cmd_tools/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_cmd_tools/copy/*.go' /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_cmd_tools/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_cmd_tools/*.go' /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_cmd_tools/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/cmd/tools/*_test.go' /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/tools/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/tools/testdata /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/tools/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_tools/' /src/goroot/src/fuzz_ng_cmd_tools/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_tools/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_tools/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_tools /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmd_tools [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_tools/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_tools
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_cmd_tools: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_tools_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/buildid/buildid.go /src/goroot/src/cmd/buildid/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_buildid '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/buildid fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:35 Found package in /src/goroot/src/cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_buildid.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_buildid.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/buildid" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/buildid" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/buildid" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_buildid/copy/buildid.go fuzz_ng_cmd_buildid/copy/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_buildid/copy/buildid.go fuzz_ng_cmd_buildid/copy/doc.go /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_buildid/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/cmd/buildid/*_test.go' /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/buildid/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/buildid/testdata /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/buildid/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_buildid/' /src/goroot/src/fuzz_ng_cmd_buildid/buildid.go /src/goroot/src/fuzz_ng_cmd_buildid/doc.go /src/goroot/src/fuzz_ng_cmd_buildid/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_buildid/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_buildid/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_buildid/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_buildid /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": 	buildid.go:14:2: use of internal package cmd/internal/buildid not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_buildid/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_buildid_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/addr2line/addr2line_test.go /src/goroot/src/cmd/addr2line/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_addr2line '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/addr2line fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:37 Found package in /src/goroot/src/cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_addr2line.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_addr2line.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/addr2line" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/addr2line" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/addr2line" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_addr2line/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_addr2line/copy/main.go /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_addr2line/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/addr2line/addr2line_test.go /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/addr2line/testdata /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/addr2line/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_addr2line/' /src/goroot/src/fuzz_ng_cmd_addr2line/addr2line_test.go /src/goroot/src/fuzz_ng_cmd_addr2line/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_addr2line/main.go /src/goroot/src/fuzz_ng_cmd_addr2line/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_addr2line/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_addr2line/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_addr2line /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:30:2: use of internal package cmd/internal/objfile not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_addr2line/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_addr2line_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/alldocs.go /src/goroot/src/cmd/go/chdir_test.go /src/goroot/src/cmd/go/export_test.go /src/goroot/src/cmd/go/go11.go /src/goroot/src/cmd/go/go_boring_test.go /src/goroot/src/cmd/go/go_test.go /src/goroot/src/cmd/go/go_unix_test.go /src/goroot/src/cmd/go/go_windows_test.go /src/goroot/src/cmd/go/help_test.go /src/goroot/src/cmd/go/init_test.go /src/goroot/src/cmd/go/main.go /src/goroot/src/cmd/go/note_test.go /src/goroot/src/cmd/go/proxy_test.go /src/goroot/src/cmd/go/script_test.go /src/goroot/src/cmd/go/scriptcmds_test.go /src/goroot/src/cmd/go/scriptconds_test.go /src/goroot/src/cmd/go/scriptreadme_test.go /src/goroot/src/cmd/go/stop_other_test.go /src/goroot/src/cmd/go/stop_unix_test.go /src/goroot/src/cmd/go/terminal_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 20 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_go '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/go fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:39 Found package in /src/goroot/src/cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_go.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_go.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/go" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/go" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/go" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_go/copy/alldocs.go fuzz_ng_cmd_go/copy/go11.go fuzz_ng_cmd_go/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_go/copy/alldocs.go fuzz_ng_cmd_go/copy/go11.go fuzz_ng_cmd_go/copy/main.go /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_go/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/go/chdir_test.go /src/goroot/src/cmd/go/export_test.go /src/goroot/src/cmd/go/go_boring_test.go /src/goroot/src/cmd/go/go_test.go /src/goroot/src/cmd/go/go_unix_test.go /src/goroot/src/cmd/go/go_windows_test.go /src/goroot/src/cmd/go/help_test.go /src/goroot/src/cmd/go/init_test.go /src/goroot/src/cmd/go/note_test.go /src/goroot/src/cmd/go/proxy_test.go /src/goroot/src/cmd/go/script_test.go /src/goroot/src/cmd/go/scriptcmds_test.go /src/goroot/src/cmd/go/scriptconds_test.go /src/goroot/src/cmd/go/scriptreadme_test.go /src/goroot/src/cmd/go/stop_other_test.go /src/goroot/src/cmd/go/stop_unix_test.go /src/goroot/src/cmd/go/terminal_test.go /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/go/testdata /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_go/' /src/goroot/src/fuzz_ng_cmd_go/alldocs.go /src/goroot/src/fuzz_ng_cmd_go/chdir_test.go /src/goroot/src/fuzz_ng_cmd_go/export_test.go /src/goroot/src/fuzz_ng_cmd_go/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_go/go11.go /src/goroot/src/fuzz_ng_cmd_go/go_boring_test.go /src/goroot/src/fuzz_ng_cmd_go/go_test.go /src/goroot/src/fuzz_ng_cmd_go/go_unix_test.go /src/goroot/src/fuzz_ng_cmd_go/go_windows_test.go /src/goroot/src/fuzz_ng_cmd_go/help_test.go /src/goroot/src/fuzz_ng_cmd_go/init_test.go /src/goroot/src/fuzz_ng_cmd_go/main.go /src/goroot/src/fuzz_ng_cmd_go/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_go/note_test.go /src/goroot/src/fuzz_ng_cmd_go/proxy_test.go /src/goroot/src/fuzz_ng_cmd_go/script_test.go /src/goroot/src/fuzz_ng_cmd_go/scriptcmds_test.go /src/goroot/src/fuzz_ng_cmd_go/scriptconds_test.go /src/goroot/src/fuzz_ng_cmd_go/scriptreadme_test.go /src/goroot/src/fuzz_ng_cmd_go/stop_other_test.go /src/goroot/src/fuzz_ng_cmd_go/stop_unix_test.go /src/goroot/src/fuzz_ng_cmd_go/terminal_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_go/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_go/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_go /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.8.0
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:23:2: use of internal package cmd/go/internal/base not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_go/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_go
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_go_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/testdata/addmod.go /src/goroot/src/cmd/go/testdata/savedir.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/script/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/script/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/svn/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/svn/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/git/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/git/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/bzr/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/bzr/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/go/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/go/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/go/mod/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/go/mod/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/fossil/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/fossil/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/auth/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/auth/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/vcstest/hg/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/vcstest/hg/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/testdata/mod/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/testdata/mod/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/lockedfile/lockedfile.go /src/goroot/src/cmd/go/internal/lockedfile/lockedfile_filelock.go /src/goroot/src/cmd/go/internal/lockedfile/lockedfile_plan9.go /src/goroot/src/cmd/go/internal/lockedfile/lockedfile_test.go /src/goroot/src/cmd/go/internal/lockedfile/mutex.go /src/goroot/src/cmd/go/internal/lockedfile/transform_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/lockedfile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/internal/lockedfile/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/internal/lockedfile/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/lockedfile/internal/filelock/filelock.go /src/goroot/src/cmd/go/internal/lockedfile/internal/filelock/filelock_fcntl.go /src/goroot/src/cmd/go/internal/lockedfile/internal/filelock/filelock_other.go /src/goroot/src/cmd/go/internal/lockedfile/internal/filelock/filelock_test.go /src/goroot/src/cmd/go/internal/lockedfile/internal/filelock/filelock_unix.go /src/goroot/src/cmd/go/internal/lockedfile/internal/filelock/filelock_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/lockedfile/internal/filelock
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/cfg/bench_test.go /src/goroot/src/cmd/go/internal/cfg/cfg.go /src/goroot/src/cmd/go/internal/cfg/lookpath.go /src/goroot/src/cmd/go/internal/cfg/zdefaultcc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/cfg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/search/search.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/search
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/help/help.go /src/goroot/src/cmd/go/internal/help/helpdoc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/help
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/generate/generate.go /src/goroot/src/cmd/go/internal/generate/generate_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/generate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/mmap/mmap.go /src/goroot/src/cmd/go/internal/mmap/mmap_other.go /src/goroot/src/cmd/go/internal/mmap/mmap_unix.go /src/goroot/src/cmd/go/internal/mmap/mmap_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/mmap
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/base/base.go /src/goroot/src/cmd/go/internal/base/env.go /src/goroot/src/cmd/go/internal/base/flag.go /src/goroot/src/cmd/go/internal/base/goflags.go /src/goroot/src/cmd/go/internal/base/limit.go /src/goroot/src/cmd/go/internal/base/path.go /src/goroot/src/cmd/go/internal/base/signal.go /src/goroot/src/cmd/go/internal/base/signal_notunix.go /src/goroot/src/cmd/go/internal/base/signal_unix.go /src/goroot/src/cmd/go/internal/base/tool.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/base
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/script/cmds.go /src/goroot/src/cmd/go/internal/script/cmds_other.go /src/goroot/src/cmd/go/internal/script/cmds_posix.go /src/goroot/src/cmd/go/internal/script/conds.go /src/goroot/src/cmd/go/internal/script/engine.go /src/goroot/src/cmd/go/internal/script/errors.go /src/goroot/src/cmd/go/internal/script/state.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/script
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/script/scripttest/scripttest.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/script/scripttest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/cache/cache.go /src/goroot/src/cmd/go/internal/cache/cache_test.go /src/goroot/src/cmd/go/internal/cache/default.go /src/goroot/src/cmd/go/internal/cache/hash.go /src/goroot/src/cmd/go/internal/cache/hash_test.go /src/goroot/src/cmd/go/internal/cache/prog.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/cache
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/tool/tool.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/tool
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/workcmd/edit.go /src/goroot/src/cmd/go/internal/workcmd/init.go /src/goroot/src/cmd/go/internal/workcmd/sync.go /src/goroot/src/cmd/go/internal/workcmd/use.go /src/goroot/src/cmd/go/internal/workcmd/vendor.go /src/goroot/src/cmd/go/internal/workcmd/work.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/workcmd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modload/build.go /src/goroot/src/cmd/go/internal/modload/buildlist.go /src/goroot/src/cmd/go/internal/modload/edit.go /src/goroot/src/cmd/go/internal/modload/help.go /src/goroot/src/cmd/go/internal/modload/import.go /src/goroot/src/cmd/go/internal/modload/import_test.go /src/goroot/src/cmd/go/internal/modload/init.go /src/goroot/src/cmd/go/internal/modload/list.go /src/goroot/src/cmd/go/internal/modload/load.go /src/goroot/src/cmd/go/internal/modload/modfile.go /src/goroot/src/cmd/go/internal/modload/mvs.go /src/goroot/src/cmd/go/internal/modload/mvs_test.go /src/goroot/src/cmd/go/internal/modload/query.go /src/goroot/src/cmd/go/internal/modload/query_test.go /src/goroot/src/cmd/go/internal/modload/search.go /src/goroot/src/cmd/go/internal/modload/stat_openfile.go /src/goroot/src/cmd/go/internal/modload/stat_unix.go /src/goroot/src/cmd/go/internal/modload/stat_windows.go /src/goroot/src/cmd/go/internal/modload/vendor.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 19 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modload
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/list/context.go /src/goroot/src/cmd/go/internal/list/list.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/list
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/web/api.go /src/goroot/src/cmd/go/internal/web/bootstrap.go /src/goroot/src/cmd/go/internal/web/file_test.go /src/goroot/src/cmd/go/internal/web/http.go /src/goroot/src/cmd/go/internal/web/url.go /src/goroot/src/cmd/go/internal/web/url_other.go /src/goroot/src/cmd/go/internal/web/url_other_test.go /src/goroot/src/cmd/go/internal/web/url_test.go /src/goroot/src/cmd/go/internal/web/url_windows.go /src/goroot/src/cmd/go/internal/web/url_windows_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/web
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/vet/vet.go /src/goroot/src/cmd/go/internal/vet/vetflag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/load/flag.go /src/goroot/src/cmd/go/internal/load/flag_test.go /src/goroot/src/cmd/go/internal/load/godebug.go /src/goroot/src/cmd/go/internal/load/path.go /src/goroot/src/cmd/go/internal/load/pkg.go /src/goroot/src/cmd/go/internal/load/pkg_test.go /src/goroot/src/cmd/go/internal/load/search.go /src/goroot/src/cmd/go/internal/load/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/load
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/work/action.go /src/goroot/src/cmd/go/internal/work/build.go /src/goroot/src/cmd/go/internal/work/build_test.go /src/goroot/src/cmd/go/internal/work/buildid.go /src/goroot/src/cmd/go/internal/work/cover.go /src/goroot/src/cmd/go/internal/work/exec.go /src/goroot/src/cmd/go/internal/work/exec_test.go /src/goroot/src/cmd/go/internal/work/gc.go /src/goroot/src/cmd/go/internal/work/gccgo.go /src/goroot/src/cmd/go/internal/work/init.go /src/goroot/src/cmd/go/internal/work/security.go /src/goroot/src/cmd/go/internal/work/security_test.go /src/goroot/src/cmd/go/internal/work/shell.go /src/goroot/src/cmd/go/internal/work/shell_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/work
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/fmtcmd/fmt.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/fmtcmd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modindex/build.go /src/goroot/src/cmd/go/internal/modindex/build_read.go /src/goroot/src/cmd/go/internal/modindex/index_test.go /src/goroot/src/cmd/go/internal/modindex/read.go /src/goroot/src/cmd/go/internal/modindex/scan.go /src/goroot/src/cmd/go/internal/modindex/syslist.go /src/goroot/src/cmd/go/internal/modindex/syslist_test.go /src/goroot/src/cmd/go/internal/modindex/write.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modindex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/internal/modindex/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/internal/modindex/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modindex/testdata/ignore_non_source/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modindex/testdata/ignore_non_source
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/toolchain/exec.go /src/goroot/src/cmd/go/internal/toolchain/exec_stub.go /src/goroot/src/cmd/go/internal/toolchain/path_none.go /src/goroot/src/cmd/go/internal/toolchain/path_plan9.go /src/goroot/src/cmd/go/internal/toolchain/path_unix.go /src/goroot/src/cmd/go/internal/toolchain/path_windows.go /src/goroot/src/cmd/go/internal/toolchain/select.go /src/goroot/src/cmd/go/internal/toolchain/switch.go /src/goroot/src/cmd/go/internal/toolchain/toolchain_test.go /src/goroot/src/cmd/go/internal/toolchain/umask_none.go /src/goroot/src/cmd/go/internal/toolchain/umask_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/toolchain
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/cmdflag/flag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/cmdflag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/auth/auth.go /src/goroot/src/cmd/go/internal/auth/netrc.go /src/goroot/src/cmd/go/internal/auth/netrc_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/auth
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modget/get.go /src/goroot/src/cmd/go/internal/modget/query.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modget
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/trace/trace.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/bug/bug.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/bug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/gover/gomod.go /src/goroot/src/cmd/go/internal/gover/gover.go /src/goroot/src/cmd/go/internal/gover/gover_test.go /src/goroot/src/cmd/go/internal/gover/local.go /src/goroot/src/cmd/go/internal/gover/mod.go /src/goroot/src/cmd/go/internal/gover/mod_test.go /src/goroot/src/cmd/go/internal/gover/toolchain.go /src/goroot/src/cmd/go/internal/gover/toolchain_test.go /src/goroot/src/cmd/go/internal/gover/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/gover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/robustio/robustio.go /src/goroot/src/cmd/go/internal/robustio/robustio_darwin.go /src/goroot/src/cmd/go/internal/robustio/robustio_flaky.go /src/goroot/src/cmd/go/internal/robustio/robustio_other.go /src/goroot/src/cmd/go/internal/robustio/robustio_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/robustio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/doc/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/fsys/fsys.go /src/goroot/src/cmd/go/internal/fsys/fsys_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/fsys
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/par/queue.go /src/goroot/src/cmd/go/internal/par/queue_test.go /src/goroot/src/cmd/go/internal/par/work.go /src/goroot/src/cmd/go/internal/par/work_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/par
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/vcs/discovery.go /src/goroot/src/cmd/go/internal/vcs/discovery_test.go /src/goroot/src/cmd/go/internal/vcs/vcs.go /src/goroot/src/cmd/go/internal/vcs/vcs_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/vcs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/vcweb/auth.go /src/goroot/src/cmd/go/internal/vcweb/bzr.go /src/goroot/src/cmd/go/internal/vcweb/dir.go /src/goroot/src/cmd/go/internal/vcweb/fossil.go /src/goroot/src/cmd/go/internal/vcweb/git.go /src/goroot/src/cmd/go/internal/vcweb/hg.go /src/goroot/src/cmd/go/internal/vcweb/insecure.go /src/goroot/src/cmd/go/internal/vcweb/script.go /src/goroot/src/cmd/go/internal/vcweb/svn.go /src/goroot/src/cmd/go/internal/vcweb/vcweb.go /src/goroot/src/cmd/go/internal/vcweb/vcweb_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/vcweb
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/vcweb/vcstest/vcstest.go /src/goroot/src/cmd/go/internal/vcweb/vcstest/vcstest_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/vcweb/vcstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/envcmd/env.go /src/goroot/src/cmd/go/internal/envcmd/env_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/envcmd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/test/cover.go /src/goroot/src/cmd/go/internal/test/flagdefs.go /src/goroot/src/cmd/go/internal/test/flagdefs_test.go /src/goroot/src/cmd/go/internal/test/genflags.go /src/goroot/src/cmd/go/internal/test/test.go /src/goroot/src/cmd/go/internal/test/test_nonunix.go /src/goroot/src/cmd/go/internal/test/test_unix.go /src/goroot/src/cmd/go/internal/test/testflag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/test
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/internal/test/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/internal/test/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/test/internal/genflags/testflag.go /src/goroot/src/cmd/go/internal/test/internal/genflags/vetflag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/test/internal/genflags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modinfo/info.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/mvs/errors.go /src/goroot/src/cmd/go/internal/mvs/graph.go /src/goroot/src/cmd/go/internal/mvs/mvs.go /src/goroot/src/cmd/go/internal/mvs/mvs_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/mvs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/run/run.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/run
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/str/path.go /src/goroot/src/cmd/go/internal/str/str.go /src/goroot/src/cmd/go/internal/str/str_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/str
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/version/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/imports/build.go /src/goroot/src/cmd/go/internal/imports/read.go /src/goroot/src/cmd/go/internal/imports/read_test.go /src/goroot/src/cmd/go/internal/imports/scan.go /src/goroot/src/cmd/go/internal/imports/scan_test.go /src/goroot/src/cmd/go/internal/imports/tags.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/imports
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/internal/imports/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/internal/imports/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/imports/testdata/star/x.go /src/goroot/src/cmd/go/internal/imports/testdata/star/x1.go /src/goroot/src/cmd/go/internal/imports/testdata/star/x_darwin.go /src/goroot/src/cmd/go/internal/imports/testdata/star/x_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/imports/testdata/star
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/imports/testdata/illumos/a_illumos.go /src/goroot/src/cmd/go/internal/imports/testdata/illumos/b_illumos_amd64.go /src/goroot/src/cmd/go/internal/imports/testdata/illumos/c_solaris.go /src/goroot/src/cmd/go/internal/imports/testdata/illumos/d_solaris_amd64.go /src/goroot/src/cmd/go/internal/imports/testdata/illumos/e.go /src/goroot/src/cmd/go/internal/imports/testdata/illumos/f.go /src/goroot/src/cmd/go/internal/imports/testdata/illumos/g.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/imports/testdata/illumos
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/imports/testdata/android/a_android.go /src/goroot/src/cmd/go/internal/imports/testdata/android/b_android_arm64.go /src/goroot/src/cmd/go/internal/imports/testdata/android/c_linux.go /src/goroot/src/cmd/go/internal/imports/testdata/android/d_linux_arm64.go /src/goroot/src/cmd/go/internal/imports/testdata/android/e.go /src/goroot/src/cmd/go/internal/imports/testdata/android/f.go /src/goroot/src/cmd/go/internal/imports/testdata/android/g.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/imports/testdata/android
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/clean/clean.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/clean
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modcmd/download.go /src/goroot/src/cmd/go/internal/modcmd/edit.go /src/goroot/src/cmd/go/internal/modcmd/graph.go /src/goroot/src/cmd/go/internal/modcmd/init.go /src/goroot/src/cmd/go/internal/modcmd/mod.go /src/goroot/src/cmd/go/internal/modcmd/tidy.go /src/goroot/src/cmd/go/internal/modcmd/vendor.go /src/goroot/src/cmd/go/internal/modcmd/verify.go /src/goroot/src/cmd/go/internal/modcmd/why.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modcmd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modfetch/bootstrap.go /src/goroot/src/cmd/go/internal/modfetch/cache.go /src/goroot/src/cmd/go/internal/modfetch/cache_test.go /src/goroot/src/cmd/go/internal/modfetch/coderepo.go /src/goroot/src/cmd/go/internal/modfetch/coderepo_test.go /src/goroot/src/cmd/go/internal/modfetch/fetch.go /src/goroot/src/cmd/go/internal/modfetch/key.go /src/goroot/src/cmd/go/internal/modfetch/proxy.go /src/goroot/src/cmd/go/internal/modfetch/repo.go /src/goroot/src/cmd/go/internal/modfetch/sumdb.go /src/goroot/src/cmd/go/internal/modfetch/toolchain.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modfetch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modfetch/codehost/codehost.go /src/goroot/src/cmd/go/internal/modfetch/codehost/git.go /src/goroot/src/cmd/go/internal/modfetch/codehost/git_test.go /src/goroot/src/cmd/go/internal/modfetch/codehost/shell.go /src/goroot/src/cmd/go/internal/modfetch/codehost/svn.go /src/goroot/src/cmd/go/internal/modfetch/codehost/vcs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modfetch/codehost
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/modfetch/zip_sum_test/zip_sum_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/modfetch/zip_sum_test
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/go/internal/modfetch/zip_sum_test/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/go/internal/modfetch/zip_sum_test/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/go/internal/fix/fix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/go/internal/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/objdump/main.go /src/goroot/src/cmd/objdump/objdump_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_objdump '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/objdump fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:42 Found package in /src/goroot/src/cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_objdump.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_objdump.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/objdump" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/objdump" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/objdump" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_objdump/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_objdump/copy/main.go /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_objdump/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/objdump/objdump_test.go /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/objdump/testdata /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_objdump/' /src/goroot/src/fuzz_ng_cmd_objdump/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_objdump/main.go /src/goroot/src/fuzz_ng_cmd_objdump/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_objdump/objdump_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_objdump/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_objdump/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_objdump /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:43:2: use of internal package cmd/internal/objfile not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_objdump/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_objdump_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/objdump/testdata/fmthello.go /src/goroot/src/cmd/objdump/testdata/fmthellocgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/objdump/testdata/testfilenum/a.go /src/goroot/src/cmd/objdump/testdata/testfilenum/b.go /src/goroot/src/cmd/objdump/testdata/testfilenum/c.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump/testdata/testfilenum
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump/testdata/testfilenum
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/objdump/testdata/testfilenum
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/doc.go /src/goroot/src/cmd/vet/main.go /src/goroot/src/cmd/vet/vet_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_vet '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/vet fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:44 Found package in /src/goroot/src/cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_vet.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_vet.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/timeformat
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/defers
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/directive
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/appends in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/defers in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/directive in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/slog in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/timeformat in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.5.0
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/vet" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/vet" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/vet" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_vet/copy/doc.go fuzz_ng_cmd_vet/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_vet/copy/doc.go fuzz_ng_cmd_vet/copy/main.go /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_vet/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/vet/vet_test.go /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/vet/testdata /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_vet/' /src/goroot/src/fuzz_ng_cmd_vet/doc.go /src/goroot/src/fuzz_ng_cmd_vet/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_vet/main.go /src/goroot/src/fuzz_ng_cmd_vet/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_vet/vet_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_vet/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_vet/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_vet /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.6.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/tools/go/analysis/passes/defers
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/appends in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/defers in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/tools/go/analysis/passes/slog in golang.org/x/tools v0.16.0
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:8:2: use of internal package cmd/internal/objabi not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_vet/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_vet_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vet/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vet/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/assign/assign.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/assign
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/assign
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/assign
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/appends/appends.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/deadcode/deadcode.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/deadcode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/deadcode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/deadcode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/httpresponse/httpresponse.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/httpresponse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/httpresponse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/httpresponse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/shift/shift.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/shift
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/shift
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/shift
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/unmarshal/unmarshal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unmarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unmarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unmarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/method/method.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/method
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/method
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/method
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/lostcancel/lostcancel.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/lostcancel
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/lostcancel
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/lostcancel
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/structtag/structtag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/structtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/structtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/structtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/rangeloop/rangeloop.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/rangeloop
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/rangeloop
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/rangeloop
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/unused/unused.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unused
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unused
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unused
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/composite/composite.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/composite
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/composite
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/composite
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/copylock/copylock.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/copylock
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/copylock
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/copylock
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/slog/slog.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/atomic/atomic.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/print/print.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/print
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/print
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/print
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/testingpkg/tests.go /src/goroot/src/cmd/vet/testdata/testingpkg/tests_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/testingpkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/testingpkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/testingpkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/nilfunc/nilfunc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/nilfunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/nilfunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/nilfunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/directive/directive.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/directive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/directive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/directive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/cgo/cgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/bool/bool.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/bool
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/bool
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/bool
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/buildtag/buildtag.go /src/goroot/src/cmd/vet/testdata/buildtag/buildtag2.go /src/goroot/src/cmd/vet/testdata/buildtag/buildtag3.go /src/goroot/src/cmd/vet/testdata/buildtag/buildtag4.go /src/goroot/src/cmd/vet/testdata/buildtag/buildtag5.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/buildtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/buildtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/buildtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/unsafeptr/unsafeptr.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unsafeptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unsafeptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/unsafeptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/asm/asm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vet/testdata/tagtest/file1.go /src/goroot/src/cmd/vet/testdata/tagtest/file2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/tagtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/tagtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vet/testdata/tagtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/cgo_test.go /src/goroot/src/cmd/link/doc.go /src/goroot/src/cmd/link/dwarf_test.go /src/goroot/src/cmd/link/elf_test.go /src/goroot/src/cmd/link/link_test.go /src/goroot/src/cmd/link/linkbig_test.go /src/goroot/src/cmd/link/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_link '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/link fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:49 Found package in /src/goroot/src/cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_link.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_link.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/link" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/link" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/link" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_link/copy/doc.go fuzz_ng_cmd_link/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_link/copy/doc.go fuzz_ng_cmd_link/copy/main.go /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_link/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/link/cgo_test.go /src/goroot/src/cmd/link/dwarf_test.go /src/goroot/src/cmd/link/elf_test.go /src/goroot/src/cmd/link/link_test.go /src/goroot/src/cmd/link/linkbig_test.go /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/link/testdata /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_link/' /src/goroot/src/fuzz_ng_cmd_link/cgo_test.go /src/goroot/src/fuzz_ng_cmd_link/doc.go /src/goroot/src/fuzz_ng_cmd_link/dwarf_test.go /src/goroot/src/fuzz_ng_cmd_link/elf_test.go /src/goroot/src/fuzz_ng_cmd_link/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_link/link_test.go /src/goroot/src/fuzz_ng_cmd_link/linkbig_test.go /src/goroot/src/fuzz_ng_cmd_link/main.go /src/goroot/src/fuzz_ng_cmd_link/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_link/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_link/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_link /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:8:2: use of internal package cmd/internal/sys not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_link/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_link
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_link_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/testIndexMismatch/a.go /src/goroot/src/cmd/link/testdata/testIndexMismatch/b.go /src/goroot/src/cmd/link/testdata/testIndexMismatch/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testIndexMismatch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testIndexMismatch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testIndexMismatch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/testRO/x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testRO
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testRO
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testRO
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/pe-binutils/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/pe-binutils
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/pe-binutils
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/pe-binutils
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/testHashedSyms/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testHashedSyms
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testHashedSyms
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testHashedSyms
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/testBuildFortvOS/lib.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testBuildFortvOS
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testBuildFortvOS
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/testBuildFortvOS
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/dynimportvar/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/dynimportvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/dynimportvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/dynimportvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/dynimportvar/asm/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/dynimportvar/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/dynimportvar/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/dynimportvar/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/testdata/pe-llvm/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/pe-llvm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/pe-llvm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/testdata/pe-llvm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/mips64/asm.go /src/goroot/src/cmd/link/internal/mips64/l.go /src/goroot/src/cmd/link/internal/mips64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/mips64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/loader/loader.go /src/goroot/src/cmd/link/internal/loader/loader_test.go /src/goroot/src/cmd/link/internal/loader/symbolbuilder.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/loader
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/mips/asm.go /src/goroot/src/cmd/link/internal/mips/l.go /src/goroot/src/cmd/link/internal/mips/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/mips
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/wasm/asm.go /src/goroot/src/cmd/link/internal/wasm/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/wasm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/dwtest/dwtest.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/dwtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/loadxcoff/ldxcoff.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/loadxcoff
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/arm64/asm.go /src/goroot/src/cmd/link/internal/arm64/l.go /src/goroot/src/cmd/link/internal/arm64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/arm64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/loadelf/ldelf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/loadelf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/ar.go /src/goroot/src/cmd/link/internal/ld/asmb.go /src/goroot/src/cmd/link/internal/ld/config.go /src/goroot/src/cmd/link/internal/ld/data.go /src/goroot/src/cmd/link/internal/ld/data_test.go /src/goroot/src/cmd/link/internal/ld/deadcode.go /src/goroot/src/cmd/link/internal/ld/deadcode_test.go /src/goroot/src/cmd/link/internal/ld/decodesym.go /src/goroot/src/cmd/link/internal/ld/dwarf.go /src/goroot/src/cmd/link/internal/ld/dwarf_test.go /src/goroot/src/cmd/link/internal/ld/elf.go /src/goroot/src/cmd/link/internal/ld/elf_test.go /src/goroot/src/cmd/link/internal/ld/errors.go /src/goroot/src/cmd/link/internal/ld/execarchive.go /src/goroot/src/cmd/link/internal/ld/execarchive_noexec.go /src/goroot/src/cmd/link/internal/ld/fallocate_test.go /src/goroot/src/cmd/link/internal/ld/go.go /src/goroot/src/cmd/link/internal/ld/go_test.go /src/goroot/src/cmd/link/internal/ld/heap.go /src/goroot/src/cmd/link/internal/ld/heap_test.go /src/goroot/src/cmd/link/internal/ld/inittask.go /src/goroot/src/cmd/link/internal/ld/issue33808_test.go /src/goroot/src/cmd/link/internal/ld/ld.go /src/goroot/src/cmd/link/internal/ld/ld_test.go /src/goroot/src/cmd/link/internal/ld/lib.go /src/goroot/src/cmd/link/internal/ld/link.go /src/goroot/src/cmd/link/internal/ld/macho.go /src/goroot/src/cmd/link/internal/ld/macho_combine_dwarf.go /src/goroot/src/cmd/link/internal/ld/main.go /src/goroot/src/cmd/link/internal/ld/msync_darwin_libc.go /src/goroot/src/cmd/link/internal/ld/nooptcgolink_test.go /src/goroot/src/cmd/link/internal/ld/outbuf.go /src/goroot/src/cmd/link/internal/ld/outbuf_darwin.go /src/goroot/src/cmd/link/internal/ld/outbuf_freebsd.go /src/goroot/src/cmd/link/internal/ld/outbuf_linux.go /src/goroot/src/cmd/link/internal/ld/outbuf_mmap.go /src/goroot/src/cmd/link/internal/ld/outbuf_nofallocate.go /src/goroot/src/cmd/link/internal/ld/outbuf_nommap.go /src/goroot/src/cmd/link/internal/ld/outbuf_notdarwin.go /src/goroot/src/cmd/link/internal/ld/outbuf_test.go /src/goroot/src/cmd/link/internal/ld/outbuf_windows.go /src/goroot/src/cmd/link/internal/ld/pcln.go /src/goroot/src/cmd/link/internal/ld/pe.go /src/goroot/src/cmd/link/internal/ld/seh.go /src/goroot/src/cmd/link/internal/ld/stackcheck.go /src/goroot/src/cmd/link/internal/ld/stackcheck_test.go /src/goroot/src/cmd/link/internal/ld/sym.go /src/goroot/src/cmd/link/internal/ld/symtab.go /src/goroot/src/cmd/link/internal/ld/target.go /src/goroot/src/cmd/link/internal/ld/typelink.go /src/goroot/src/cmd/link/internal/ld/util.go /src/goroot/src/cmd/link/internal/ld/xcoff.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 52 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/internal/ld/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/internal/ld/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue42484/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue42484
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/internal/ld/testdata/issue26237/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/internal/ld/testdata/issue26237/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue26237/b.dir/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue26237/b.dir
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue26237/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue26237/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/globalmap.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/ifacemethod.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/ifacemethod2.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/ifacemethod3.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/ifacemethod4.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/ifacemethod5.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/ifacemethod6.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/reflectcall.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/structof_funcof.go /src/goroot/src/cmd/link/internal/ld/testdata/deadcode/typedesc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/deadcode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/stackcheck/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/stackcheck
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue10978/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue10978
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/internal/ld/testdata/issue32233/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/internal/ld/testdata/issue32233/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue32233/lib/lib.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue32233/lib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue32233/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue32233/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue38192/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue38192
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/internal/ld/testdata/httptest/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/internal/ld/testdata/httptest/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/httptest/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/httptest/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/link/internal/ld/testdata/issue25459/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/link/internal/ld/testdata/issue25459/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue25459/a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue25459/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue25459/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue25459/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue39256/x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue39256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ld/testdata/issue39757/issue39757main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ld/testdata/issue39757
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/riscv64/asm.go /src/goroot/src/cmd/link/internal/riscv64/l.go /src/goroot/src/cmd/link/internal/riscv64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/riscv64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/loadpe/ldpe.go /src/goroot/src/cmd/link/internal/loadpe/seh.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/loadpe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/arm/asm.go /src/goroot/src/cmd/link/internal/arm/l.go /src/goroot/src/cmd/link/internal/arm/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/arm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/benchmark/bench.go /src/goroot/src/cmd/link/internal/benchmark/bench_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/benchmark
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/loadmacho/ldmacho.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/loadmacho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/amd64/asm.go /src/goroot/src/cmd/link/internal/amd64/l.go /src/goroot/src/cmd/link/internal/amd64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/amd64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/x86/asm.go /src/goroot/src/cmd/link/internal/x86/l.go /src/goroot/src/cmd/link/internal/x86/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/x86
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/sym/compilation_unit.go /src/goroot/src/cmd/link/internal/sym/library.go /src/goroot/src/cmd/link/internal/sym/reloc.go /src/goroot/src/cmd/link/internal/sym/segment.go /src/goroot/src/cmd/link/internal/sym/symbol.go /src/goroot/src/cmd/link/internal/sym/symkind.go /src/goroot/src/cmd/link/internal/sym/symkind_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/sym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/s390x/asm.go /src/goroot/src/cmd/link/internal/s390x/l.go /src/goroot/src/cmd/link/internal/s390x/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/s390x
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/ppc64/asm.go /src/goroot/src/cmd/link/internal/ppc64/l.go /src/goroot/src/cmd/link/internal/ppc64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/ppc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/link/internal/loong64/asm.go /src/goroot/src/cmd/link/internal/loong64/l.go /src/goroot/src/cmd/link/internal/loong64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/link/internal/loong64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/nm/doc.go /src/goroot/src/cmd/nm/nm.go /src/goroot/src/cmd/nm/nm_cgo_test.go /src/goroot/src/cmd/nm/nm_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_nm '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/nm fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:52 Found package in /src/goroot/src/cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_nm.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_nm.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/nm" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/nm" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/nm" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_nm/copy/doc.go fuzz_ng_cmd_nm/copy/nm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_nm/copy/doc.go fuzz_ng_cmd_nm/copy/nm.go /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_nm/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/nm/nm_cgo_test.go /src/goroot/src/cmd/nm/nm_test.go /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/nm/testdata /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/nm/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_nm/' /src/goroot/src/fuzz_ng_cmd_nm/doc.go /src/goroot/src/fuzz_ng_cmd_nm/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_nm/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_nm/nm.go /src/goroot/src/fuzz_ng_cmd_nm/nm_cgo_test.go /src/goroot/src/fuzz_ng_cmd_nm/nm_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_nm/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_nm/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_nm /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": 	nm.go:15:2: use of internal package cmd/internal/objfile not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_nm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_nm_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/trace/annotations.go /src/goroot/src/cmd/trace/annotations_test.go /src/goroot/src/cmd/trace/doc.go /src/goroot/src/cmd/trace/goroutines.go /src/goroot/src/cmd/trace/main.go /src/goroot/src/cmd/trace/pprof.go /src/goroot/src/cmd/trace/trace.go /src/goroot/src/cmd/trace/trace_test.go /src/goroot/src/cmd/trace/trace_unix_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_trace '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/trace fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:54 Found package in /src/goroot/src/cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_trace.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_trace.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/trace" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/trace" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/trace" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_trace/copy/annotations.go fuzz_ng_cmd_trace/copy/doc.go fuzz_ng_cmd_trace/copy/goroutines.go fuzz_ng_cmd_trace/copy/main.go fuzz_ng_cmd_trace/copy/pprof.go fuzz_ng_cmd_trace/copy/trace.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_trace/copy/annotations.go fuzz_ng_cmd_trace/copy/doc.go fuzz_ng_cmd_trace/copy/goroutines.go fuzz_ng_cmd_trace/copy/main.go fuzz_ng_cmd_trace/copy/pprof.go fuzz_ng_cmd_trace/copy/trace.go /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_trace/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/trace/annotations_test.go /src/goroot/src/cmd/trace/trace_test.go /src/goroot/src/cmd/trace/trace_unix_test.go /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/trace/testdata /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/trace/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_trace/' /src/goroot/src/fuzz_ng_cmd_trace/annotations.go /src/goroot/src/fuzz_ng_cmd_trace/annotations_test.go /src/goroot/src/fuzz_ng_cmd_trace/doc.go /src/goroot/src/fuzz_ng_cmd_trace/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_trace/goroutines.go /src/goroot/src/fuzz_ng_cmd_trace/main.go /src/goroot/src/fuzz_ng_cmd_trace/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_trace/pprof.go /src/goroot/src/fuzz_ng_cmd_trace/trace.go /src/goroot/src/fuzz_ng_cmd_trace/trace_test.go /src/goroot/src/fuzz_ng_cmd_trace/trace_unix_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_trace/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_trace/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_trace /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:9:2: use of internal package cmd/internal/browser not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_trace_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/trace/v2/gen.go /src/goroot/src/cmd/trace/v2/goroutinegen.go /src/goroot/src/cmd/trace/v2/goroutines.go /src/goroot/src/cmd/trace/v2/gstate.go /src/goroot/src/cmd/trace/v2/jsontrace.go /src/goroot/src/cmd/trace/v2/jsontrace_test.go /src/goroot/src/cmd/trace/v2/main.go /src/goroot/src/cmd/trace/v2/pprof.go /src/goroot/src/cmd/trace/v2/procgen.go /src/goroot/src/cmd/trace/v2/regions.go /src/goroot/src/cmd/trace/v2/tasks.go /src/goroot/src/cmd/trace/v2/threadgen.go /src/goroot/src/cmd/trace/v2/viewer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_trace_v2 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/trace/v2 fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Found package in /src/goroot/src/cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Function StackSample has unhandled recv &ast.Field{Doc:(*ast.CommentGroup)(nil), Names:[]*ast.Ident{(*ast.Ident)(0xc000160300)}, Type:(*ast.StarExpr)(0xc00012f548), Tag:(*ast.BasicLit)(nil), Comment:(*ast.CommentGroup)(nil)}
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Unhandled argument &ast.MapType{Map:17725, Key:(*ast.SelectorExpr)(0xc000010a68), Value:(*ast.StarExpr)(0xc000010a98)} for GoroutinesHandlerFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Unhandled argument &ast.MapType{Map:20058, Key:(*ast.SelectorExpr)(0xc000010f90), Value:(*ast.StarExpr)(0xc000010fc0)} for GoroutineHandler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Function JSONTraceHandler has unproduced argument parsedTrace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Function UserRegionsHandlerFunc has unproduced argument parsedTrace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Function UserRegionHandlerFunc has unproduced argument parsedTrace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Function UserTasksHandlerFunc has unproduced argument parsedTrace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:16:56 Function UserTaskHandlerFunc has unproduced argument parsedTrace
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_trace_v2.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_trace_v2.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module cmd/trace/v2: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmd_trace_v2 [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmd_trace_v2.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "cmd/trace/v2" imported as trace and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:182:10: undefined: v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_trace_v2/copy/gen.go fuzz_ng_cmd_trace_v2/copy/goroutinegen.go fuzz_ng_cmd_trace_v2/copy/goroutines.go fuzz_ng_cmd_trace_v2/copy/gstate.go fuzz_ng_cmd_trace_v2/copy/jsontrace.go fuzz_ng_cmd_trace_v2/copy/main.go fuzz_ng_cmd_trace_v2/copy/pprof.go fuzz_ng_cmd_trace_v2/copy/procgen.go fuzz_ng_cmd_trace_v2/copy/regions.go fuzz_ng_cmd_trace_v2/copy/tasks.go fuzz_ng_cmd_trace_v2/copy/threadgen.go fuzz_ng_cmd_trace_v2/copy/viewer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_trace_v2/copy/gen.go fuzz_ng_cmd_trace_v2/copy/goroutinegen.go fuzz_ng_cmd_trace_v2/copy/goroutines.go fuzz_ng_cmd_trace_v2/copy/gstate.go fuzz_ng_cmd_trace_v2/copy/jsontrace.go fuzz_ng_cmd_trace_v2/copy/main.go fuzz_ng_cmd_trace_v2/copy/pprof.go fuzz_ng_cmd_trace_v2/copy/procgen.go fuzz_ng_cmd_trace_v2/copy/regions.go fuzz_ng_cmd_trace_v2/copy/tasks.go fuzz_ng_cmd_trace_v2/copy/threadgen.go fuzz_ng_cmd_trace_v2/copy/viewer.go /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_trace_v2/fuzz_ng.go fuzz_ng_cmd_trace_v2/fuzzng_unsure_test.go fuzz_ng_cmd_trace_v2/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/trace/v2/jsontrace_test.go /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/trace/v2/testdata /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_trace_v2/' /src/goroot/src/fuzz_ng_cmd_trace_v2/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_trace_v2/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_cmd_trace_v2/gen.go /src/goroot/src/fuzz_ng_cmd_trace_v2/goroutinegen.go /src/goroot/src/fuzz_ng_cmd_trace_v2/goroutines.go /src/goroot/src/fuzz_ng_cmd_trace_v2/gstate.go /src/goroot/src/fuzz_ng_cmd_trace_v2/jsontrace.go /src/goroot/src/fuzz_ng_cmd_trace_v2/jsontrace_test.go /src/goroot/src/fuzz_ng_cmd_trace_v2/main.go /src/goroot/src/fuzz_ng_cmd_trace_v2/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_trace_v2/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_cmd_trace_v2/pprof.go /src/goroot/src/fuzz_ng_cmd_trace_v2/procgen.go /src/goroot/src/fuzz_ng_cmd_trace_v2/regions.go /src/goroot/src/fuzz_ng_cmd_trace_v2/tasks.go /src/goroot/src/fuzz_ng_cmd_trace_v2/threadgen.go /src/goroot/src/fuzz_ng_cmd_trace_v2/viewer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_trace_v2/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_trace_v2/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_trace_v2 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:20:2: use of internal package cmd/internal/browser not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_trace_v2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_trace_v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_trace_v2_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/trace/v2/testdata/generate.go /src/goroot/src/cmd/trace/v2/testdata/mktests.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/trace/v2/testdata/testprog/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/trace/v2/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/distpack/archive.go /src/goroot/src/cmd/distpack/archive_test.go /src/goroot/src/cmd/distpack/pack.go /src/goroot/src/cmd/distpack/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_distpack '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/distpack fuzz_ng_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Found package in /src/goroot/src/cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Function Info has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Function Add has unproduced argument fs.FileInfo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Unhandled argument &ast.FuncType{Func:9034, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002a1800), Results:(*ast.FieldList)(0xc0002a1830)} for ArchiveNgdotFilter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Unhandled argument &ast.FuncType{Func:9334, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002a19b0), Results:(*ast.FieldList)(0xc0002a19e0)} for ArchiveNgdotSetMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Unhandled argument &ast.Ellipsis{Ellipsis:9792, Elt:(*ast.Ident)(0xc0002bb200)} for ArchiveNgdotRemove
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:03 Function SetTime has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_distpack.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_distpack.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/distpack" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/distpack" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/distpack" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_distpack/copy/archive.go fuzz_ng_cmd_distpack/copy/pack.go fuzz_ng_cmd_distpack/copy/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_distpack/copy/archive.go fuzz_ng_cmd_distpack/copy/pack.go fuzz_ng_cmd_distpack/copy/test.go /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_distpack/fuzz_ng.go fuzz_ng_cmd_distpack/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/distpack/archive_test.go /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/distpack/testdata /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/distpack/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_distpack/' /src/goroot/src/fuzz_ng_cmd_distpack/archive.go /src/goroot/src/fuzz_ng_cmd_distpack/archive_test.go /src/goroot/src/fuzz_ng_cmd_distpack/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_distpack/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_distpack/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_cmd_distpack/pack.go /src/goroot/src/fuzz_ng_cmd_distpack/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_distpack/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_distpack/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_distpack /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": PASS
Step #3 - "compile-libfuzzer-coverage-x86_64": ok  	fuzz_ng_cmd_distpack	0.004s
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_distpack/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_distpack_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/api_test.go /src/goroot/src/cmd/api/boring_test.go /src/goroot/src/cmd/api/main_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_api '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/api fuzz_ng_cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:08 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:08 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_api.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_api.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_cmd_api: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_cmd_api: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module cmd/api: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": warning: no packages being tested depend on matches for pattern cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing [github.com/catenacyber/ngolo-fuzzing.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_cmd_api/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_cmd_api/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_cmd_api/copy/*.go' /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_cmd_api/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_cmd_api/*.go' /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_cmd_api/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/api/api_test.go /src/goroot/src/cmd/api/boring_test.go /src/goroot/src/cmd/api/main_test.go /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/api/testdata /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_api/' /src/goroot/src/fuzz_ng_cmd_api/api_test.go /src/goroot/src/fuzz_ng_cmd_api/boring_test.go /src/goroot/src/fuzz_ng_cmd_api/main_test.go /src/goroot/src/fuzz_ng_cmd_api/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_api/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_api/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_api /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmd_api [fuzz_ng_cmd_api.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmd_api [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_api/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_api
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_cmd_api: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_api_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/api/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/api/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/api/testdata/src/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/api/testdata/src/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/api/testdata/src/pkg/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/api/testdata/src/pkg/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/pkg/p1/p1.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/pkg/p3/p3.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/pkg/p4/p4.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/pkg/p2/p2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/pkg/p2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/api/testdata/src/issue29837/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/api/testdata/src/issue29837/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/api/testdata/src/issue29837/p/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/api/testdata/src/issue29837/p/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/api/testdata/src/issue21181/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/api/testdata/src/issue21181/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/issue21181/indirect/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/indirect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/indirect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/indirect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/issue21181/p/p.go /src/goroot/src/cmd/api/testdata/src/issue21181/p/p_amd64.go /src/goroot/src/cmd/api/testdata/src/issue21181/p/p_generic.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/api/testdata/src/issue21181/dep/p.go /src/goroot/src/cmd/api/testdata/src/issue21181/dep/p_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/dep
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/dep
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/api/testdata/src/issue21181/dep
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/cfg/builder.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/cfg/cfg.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/cfg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/cfg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/typeutil/callee.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/typeutil/imports.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/typeutil/map.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/typeutil/methodsetcache.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/typeutil/ui.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/types/typeutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/types/typeutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/types/objectpath/objectpath.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/types/objectpath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/types/objectpath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/analysis.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/diagnostic.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/validate.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/unitchecker/unitchecker.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/unitchecker
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/unitchecker
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/assign/assign.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/assign/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/assign
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/assign
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/defers/defers.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/defers/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/defers
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/defers
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/appends/appends.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/appends/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/appends
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/asmdecl/arches_go118.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/asmdecl/arches_go119.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/asmdecl/asmdecl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/asmdecl
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/asmdecl
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/errorsas/errorsas.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/errorsas
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/errorsas
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/httpresponse/httpresponse.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/httpresponse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/httpresponse
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/shift/dead.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/shift/shift.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/shift
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/shift
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unusedresult/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unusedresult/unusedresult.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unusedresult
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unusedresult
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unmarshal/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unmarshal/unmarshal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unmarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unmarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/inspect/inspect.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/inspect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/inspect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/stringintconv/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/stringintconv/string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/stringintconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/stringintconv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/lostcancel/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/lostcancel/lostcancel.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/lostcancel
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/lostcancel
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/structtag/structtag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/structtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/structtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/testinggoroutine/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/testinggoroutine/testinggoroutine.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/testinggoroutine/util.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/testinggoroutine
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/testinggoroutine
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/ifaceassert/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/ifaceassert/ifaceassert.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/ifaceassert/parameterized.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/ifaceassert
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/ifaceassert
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/ctrlflow/ctrlflow.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/ctrlflow
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/ctrlflow
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/bools/bools.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/bools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/bools
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/sigchanyzer/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/sigchanyzer/sigchanyzer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/sigchanyzer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/sigchanyzer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/composite/composite.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/composite/whitelist.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/composite
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/composite
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/copylock/copylock.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/copylock
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/copylock
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/slog/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/slog/slog.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/stdmethods/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/stdmethods/stdmethods.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/stdmethods
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/stdmethods
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/tests/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/tests/tests.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/tests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/tests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/printf/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/printf/printf.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/printf/types.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/printf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/printf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/atomic/atomic.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/atomic/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unreachable/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unreachable/unreachable.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unreachable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unreachable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/cgocall/cgocall.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/cgocall/cgocall_go120.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/cgocall/cgocall_go121.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/cgocall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/cgocall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/loopclosure/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/loopclosure/loopclosure.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/loopclosure
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/loopclosure
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/nilfunc/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/nilfunc/nilfunc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/nilfunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/nilfunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/internal/analysisutil/extractdoc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/internal/analysisutil/util.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/internal/analysisutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/framepointer/framepointer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/framepointer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/framepointer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/directive/directive.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/directive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/directive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/timeformat/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/timeformat/timeformat.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/timeformat
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/timeformat
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/buildtag/buildtag.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/buildtag/buildtag_old.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/buildtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/buildtag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unsafeptr/doc.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unsafeptr/unsafeptr.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unsafeptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/passes/unsafeptr
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/internal/analysisflags/flags.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/internal/analysisflags/help.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/analysis/internal/analysisflags/url.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/analysis/internal/analysisflags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/astutil/enclosing.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/astutil/imports.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/astutil/rewrite.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/astutil/util.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/ast/astutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/ast/astutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/inspector/inspector.go /src/goroot/src/cmd/vendor/golang.org/x/tools/go/ast/inspector/typeof.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/ast/inspector
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/go/ast/inspector
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/cmd/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/cmd/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/cmd/bisect/go119.go /src/goroot/src/cmd/vendor/golang.org/x/tools/cmd/bisect/go120.go /src/goroot/src/cmd/vendor/golang.org/x/tools/cmd/bisect/main.go /src/goroot/src/cmd/vendor/golang.org/x/tools/cmd/bisect/rand.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/cmd/bisect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/cmd/bisect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/tools/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/tools/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/common.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/coretype.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/enabled_go117.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/enabled_go118.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/normalize.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/termlist.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/typeparams_go117.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/typeparams_go118.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/typeparams/typeterm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/internal/typeparams
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/facts/facts.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/facts/imports.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/internal/facts
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/versions/gover.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/versions/types.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/versions/types_go121.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/versions/types_go122.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/versions/versions_go121.go /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/versions/versions_go122.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/internal/versions
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/internal/bisect/bisect.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/internal/bisect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/tools/cover/profile.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/tools/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/arch/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/arch/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/arg.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/condition.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/condition_util.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/decode.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/gnu.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/inst.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/plan9x.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm64/arm64asm/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/arm64/arm64asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/arm64/arm64asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/arch/arm/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/arch/arm/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/arch/arm/armasm/decode.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm/armasm/gnu.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm/armasm/inst.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm/armasm/plan9x.go /src/goroot/src/cmd/vendor/golang.org/x/arch/arm/armasm/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/arm/armasm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/arm/armasm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/arch/x86/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/arch/x86/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/arch/x86/x86asm/decode.go /src/goroot/src/cmd/vendor/golang.org/x/arch/x86/x86asm/gnu.go /src/goroot/src/cmd/vendor/golang.org/x/arch/x86/x86asm/inst.go /src/goroot/src/cmd/vendor/golang.org/x/arch/x86/x86asm/intel.go /src/goroot/src/cmd/vendor/golang.org/x/arch/x86/x86asm/plan9x.go /src/goroot/src/cmd/vendor/golang.org/x/arch/x86/x86asm/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/x86/x86asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/x86/x86asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/decode.go /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/doc.go /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/field.go /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/gnu.go /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/inst.go /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/plan9.go /src/goroot/src/cmd/vendor/golang.org/x/arch/ppc64/ppc64asm/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/ppc64/ppc64asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/arch/ppc64/ppc64asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/sys/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/sys/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/aliases.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/dll_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/env_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/eventlog.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/exec_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/memory_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/mksyscall.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/race.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/race0.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/security_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/service.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/setupapi_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/str.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/syscall.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/syscall_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/types_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/types_windows_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/types_windows_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/types_windows_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/types_windows_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/zerrors_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/zknownfolderids_windows.go /src/goroot/src/cmd/vendor/golang.org/x/sys/windows/zsyscall_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 23 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sys/windows
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sys/windows
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/const_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/dir_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/env_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/errors_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/pwd_go15_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/pwd_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/race.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/race0.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/str.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/syscall.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/syscall_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/zsyscall_plan9_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/zsyscall_plan9_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/zsyscall_plan9_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/plan9/zsysnum_plan9.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 15 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sys/plan9
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sys/plan9
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/affinity_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/aliases.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/bluetooth_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/cap_freebsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/constants.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_aix_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_aix_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_darwin.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_dragonfly.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_freebsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_netbsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_openbsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dev_zos.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/dirent.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/endian_big.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/endian_little.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/env_unix.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/epoll_zos.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/fcntl.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/fcntl_darwin.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/fcntl_linux_32bit.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/fdset.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/fstatfs_zos.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/gccgo.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/gccgo_linux_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ifreq_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ioctl_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ioctl_signed.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ioctl_unsigned.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ioctl_zos.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/mmap_nomremap.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/mremap.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/pagesize_unix.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/pledge_openbsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ptrace_darwin.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ptrace_ios.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/race.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/race0.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/readdirent_getdents.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/readdirent_getdirentries.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sockcmsg_dragonfly.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sockcmsg_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sockcmsg_unix.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sockcmsg_unix_other.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_aix.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_aix_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_aix_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_bsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_darwin.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_darwin_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_darwin_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_darwin_libSystem.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_dragonfly.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_dragonfly_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_freebsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_freebsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_freebsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_freebsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_freebsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_freebsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_hurd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_hurd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_illumos.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_alarm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_amd64_gc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_gc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_gc_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_gc_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_gccgo_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_gccgo_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_loong64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_mips64x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_mipsx.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_ppc64x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_linux_sparc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_netbsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_netbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_netbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_netbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_netbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_libc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_openbsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_solaris.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_solaris_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_unix.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_unix_gc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_unix_gc_ppc64x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/syscall_zos_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sysvshm_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sysvshm_unix.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/sysvshm_unix_other.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/timestruct.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/unveil_openbsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/xattr_bsd.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_aix_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_aix_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_darwin_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_darwin_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_dragonfly_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_freebsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_freebsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_freebsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_freebsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_freebsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_loong64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_mips.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_mips64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_mipsle.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_ppc64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_linux_sparc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_netbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_netbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_netbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_netbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_openbsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_solaris_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zerrors_zos_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zptrace_armnn_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zptrace_linux_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zptrace_mipsnn_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zptrace_mipsnnle_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zptrace_x86_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_aix_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_aix_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_aix_ppc64_gc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_aix_ppc64_gccgo.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_darwin_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_darwin_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_dragonfly_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_freebsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_freebsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_freebsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_freebsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_freebsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_illumos_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_loong64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_mips.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_mips64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_mipsle.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_ppc64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_linux_sparc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_netbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_netbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_netbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_netbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_openbsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_solaris_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsyscall_zos_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysctl_openbsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_darwin_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_darwin_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_dragonfly_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_freebsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_freebsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_freebsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_freebsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_freebsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_loong64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_mips.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_mips64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_mipsle.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_ppc64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_linux_sparc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_netbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_netbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_netbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_netbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_openbsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/zsysnum_zos_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_aix_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_aix_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_darwin_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_darwin_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_dragonfly_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_freebsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_freebsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_freebsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_freebsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_freebsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_loong64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_mips.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_mips64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_mipsle.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_ppc.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_ppc64le.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_s390x.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_linux_sparc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_netbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_netbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_netbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_netbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_386.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_arm.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_arm64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_mips64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_ppc64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_openbsd_riscv64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_solaris_amd64.go /src/goroot/src/cmd/vendor/golang.org/x/sys/unix/ztypes_zos_s390x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 278 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sys/unix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sys/unix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/term/term.go /src/goroot/src/cmd/vendor/golang.org/x/term/term_plan9.go /src/goroot/src/cmd/vendor/golang.org/x/term/term_unix.go /src/goroot/src/cmd/vendor/golang.org/x/term/term_unix_bsd.go /src/goroot/src/cmd/vendor/golang.org/x/term/term_unix_other.go /src/goroot/src/cmd/vendor/golang.org/x/term/term_unsupported.go /src/goroot/src/cmd/vendor/golang.org/x/term/term_windows.go /src/goroot/src/cmd/vendor/golang.org/x/term/terminal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/term
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/term
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/sync/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/sync/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/sync/semaphore/semaphore.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sync/semaphore
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/sync/semaphore
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/mod/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/mod/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/modfile/print.go /src/goroot/src/cmd/vendor/golang.org/x/mod/modfile/read.go /src/goroot/src/cmd/vendor/golang.org/x/mod/modfile/rule.go /src/goroot/src/cmd/vendor/golang.org/x/mod/modfile/work.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/modfile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/modfile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/cache.go /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/client.go /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/server.go /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/tlog/note.go /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/tlog/tile.go /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/tlog/tlog.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb/tlog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb/tlog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/dirhash/hash.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb/dirhash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb/dirhash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/sumdb/note/note.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb/note
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/sumdb/note
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/semver/semver.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/semver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/semver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/zip/zip.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/golang.org/x/mod/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/golang.org/x/mod/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/internal/lazyregexp/lazyre.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/internal/lazyregexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/golang.org/x/mod/module/module.go /src/goroot/src/cmd/vendor/golang.org/x/mod/module/pseudo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/module
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/golang.org/x/mod/module
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/ianlancetaylor/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/ianlancetaylor/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/ianlancetaylor/demangle/ast.go /src/goroot/src/cmd/vendor/github.com/ianlancetaylor/demangle/demangle.go /src/goroot/src/cmd/vendor/github.com/ianlancetaylor/demangle/rust.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/ianlancetaylor/demangle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/ianlancetaylor/demangle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/google/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/google/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/google/pprof/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/google/pprof/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/encode.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/filter.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/index.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/legacy_java_profile.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/legacy_profile.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/merge.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/profile.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/proto.go /src/goroot/src/cmd/vendor/github.com/google/pprof/profile/prune.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/profile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/profile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/google/pprof/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/google/pprof/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/symbolz/symbolz.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/symbolz
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/transport/transport.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/transport
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/package.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/report.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/shortnames.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/source.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/source_html.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/stacks.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/report/synth.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/report
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/measurement/measurement.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/measurement
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/symbolizer/symbolizer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/symbolizer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/graph/dotgraph.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/graph/graph.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/graph
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/plugin/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/cli.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/commands.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/config.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/driver.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/driver_focus.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/fetch.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/flags.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/flamegraph.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/interactive.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/options.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/settings.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/stacks.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/svg.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/tagroot.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/tempfile.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/webhtml.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/webui.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/html/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/google/pprof/internal/driver/html/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/elfexec/elfexec.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/elfexec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/binutils/addr2liner.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/binutils/addr2liner_llvm.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/binutils/addr2liner_nm.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/binutils/binutils.go /src/goroot/src/cmd/vendor/github.com/google/pprof/internal/binutils/disasm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/internal/binutils
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/driver/driver.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/vendor/github.com/google/pprof/third_party/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/vendor/github.com/google/pprof/third_party/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/third_party/d3flamegraph/d3_flame_graph.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/third_party/d3flamegraph
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/third_party/d3flamegraph
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/vendor/github.com/google/pprof/third_party/svgpan/svgpan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/third_party/svgpan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/vendor/github.com/google/pprof/third_party/svgpan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/doc/dirs.go /src/goroot/src/cmd/doc/doc_test.go /src/goroot/src/cmd/doc/main.go /src/goroot/src/cmd/doc/pkg.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_doc '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/doc fuzz_ng_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Found package in /src/goroot/src/cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Type Dirs is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Type Package is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Type PackageError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Function Reset has unproduced recv Dirs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Function Next has unproduced recv Dirs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Function ToText has unproduced recv Package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Function Error has unproduced recv PackageError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Function Fatalf has unproduced recv Package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:12 Function Printf has unproduced recv Package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_doc.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_doc.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/doc" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/doc" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/doc" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_doc/copy/dirs.go fuzz_ng_cmd_doc/copy/main.go fuzz_ng_cmd_doc/copy/pkg.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_doc/copy/dirs.go fuzz_ng_cmd_doc/copy/main.go fuzz_ng_cmd_doc/copy/pkg.go /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_doc/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/doc/doc_test.go /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/doc/testdata /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_doc/' /src/goroot/src/fuzz_ng_cmd_doc/dirs.go /src/goroot/src/fuzz_ng_cmd_doc/doc_test.go /src/goroot/src/fuzz_ng_cmd_doc/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_doc/main.go /src/goroot/src/fuzz_ng_cmd_doc/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_doc/pkg.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_doc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_doc/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_doc /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmd_doc [fuzz_ng_cmd_doc.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmd_doc [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_doc/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_doc_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/doc/testdata/pkg.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/doc/testdata/merge/aa.go /src/goroot/src/cmd/doc/testdata/merge/bb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/merge
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/merge
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/merge
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/doc/testdata/nested/ignore.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/doc/testdata/nested/empty/empty.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested/empty
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested/empty
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested/empty
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/doc/testdata/nested/nested/real.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested/nested
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested/nested
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/doc/testdata/nested/nested
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/codesign/codesign.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/codesign
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/test2json/test2json.go /src/goroot/src/cmd/internal/test2json/test2json_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/internal/test2json/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/internal/test2json/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/buildid/buildid.go /src/goroot/src/cmd/internal/buildid/buildid_test.go /src/goroot/src/cmd/internal/buildid/note.go /src/goroot/src/cmd/internal/buildid/rewrite.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/internal/buildid/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/internal/buildid/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/cov/mreader.go /src/goroot/src/cmd/internal/cov/read_test.go /src/goroot/src/cmd/internal/cov/readcovdata.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/cov
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/cov/testdata/small.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/cov/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/cov/covcmd/cmddefs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/cov/covcmd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/osinfo/doc.go /src/goroot/src/cmd/internal/osinfo/os_js.go /src/goroot/src/cmd/internal/osinfo/os_plan9.go /src/goroot/src/cmd/internal/osinfo/os_unix.go /src/goroot/src/cmd/internal/osinfo/os_wasip1.go /src/goroot/src/cmd/internal/osinfo/os_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/osinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/sys/arch.go /src/goroot/src/cmd/internal/sys/args.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/sys
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/objfile/disasm.go /src/goroot/src/cmd/internal/objfile/elf.go /src/goroot/src/cmd/internal/objfile/goobj.go /src/goroot/src/cmd/internal/objfile/macho.go /src/goroot/src/cmd/internal/objfile/objfile.go /src/goroot/src/cmd/internal/objfile/pe.go /src/goroot/src/cmd/internal/objfile/plan9obj.go /src/goroot/src/cmd/internal/objfile/xcoff.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/objfile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/bio/buf.go /src/goroot/src/cmd/internal/bio/buf_mmap.go /src/goroot/src/cmd/internal/bio/buf_nommap.go /src/goroot/src/cmd/internal/bio/must.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/bio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/moddeps/moddeps_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/moddeps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/archive/archive.go /src/goroot/src/cmd/internal/archive/archive_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/archive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/archive/testdata/go1.go /src/goroot/src/cmd/internal/archive/testdata/go2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/archive/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/archive/testdata/mycgo/go.go /src/goroot/src/cmd/internal/archive/testdata/mycgo/go1.go /src/goroot/src/cmd/internal/archive/testdata/mycgo/go2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/archive/testdata/mycgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/gcprog/gcprog.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/gcprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/objabi/autotype.go /src/goroot/src/cmd/internal/objabi/flag.go /src/goroot/src/cmd/internal/objabi/flag_test.go /src/goroot/src/cmd/internal/objabi/funcid.go /src/goroot/src/cmd/internal/objabi/head.go /src/goroot/src/cmd/internal/objabi/line.go /src/goroot/src/cmd/internal/objabi/line_test.go /src/goroot/src/cmd/internal/objabi/path.go /src/goroot/src/cmd/internal/objabi/path_test.go /src/goroot/src/cmd/internal/objabi/pkgspecial.go /src/goroot/src/cmd/internal/objabi/reloctype.go /src/goroot/src/cmd/internal/objabi/reloctype_string.go /src/goroot/src/cmd/internal/objabi/stack.go /src/goroot/src/cmd/internal/objabi/symkind.go /src/goroot/src/cmd/internal/objabi/symkind_string.go /src/goroot/src/cmd/internal/objabi/typekind.go /src/goroot/src/cmd/internal/objabi/util.go /src/goroot/src/cmd/internal/objabi/zbootstrap.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 18 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/objabi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/browser/browser.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/browser
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/pkgpattern/pat_test.go /src/goroot/src/cmd/internal/pkgpattern/pkgpattern.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/pkgpattern
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/goobj/builtin.go /src/goroot/src/cmd/internal/goobj/builtinlist.go /src/goroot/src/cmd/internal/goobj/funcinfo.go /src/goroot/src/cmd/internal/goobj/mkbuiltin.go /src/goroot/src/cmd/internal/goobj/objfile.go /src/goroot/src/cmd/internal/goobj/objfile_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/goobj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/quoted/quoted.go /src/goroot/src/cmd/internal/quoted/quoted_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/quoted
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/notsha256/sha256.go /src/goroot/src/cmd/internal/notsha256/sha256_test.go /src/goroot/src/cmd/internal/notsha256/sha256block.go /src/goroot/src/cmd/internal/notsha256/sha256block_amd64.go /src/goroot/src/cmd/internal/notsha256/sha256block_decl.go /src/goroot/src/cmd/internal/notsha256/sha256block_generic.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/notsha256
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/pkgpath/pkgpath.go /src/goroot/src/cmd/internal/pkgpath/pkgpath_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/pkgpath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/bootstrap_test/experiment_toolid_test.go /src/goroot/src/cmd/internal/bootstrap_test/overlaydir_test.go /src/goroot/src/cmd/internal/bootstrap_test/reboot_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/bootstrap_test
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/abi_string.go /src/goroot/src/cmd/internal/obj/addrtype_string.go /src/goroot/src/cmd/internal/obj/data.go /src/goroot/src/cmd/internal/obj/dwarf.go /src/goroot/src/cmd/internal/obj/go.go /src/goroot/src/cmd/internal/obj/inl.go /src/goroot/src/cmd/internal/obj/ld.go /src/goroot/src/cmd/internal/obj/line.go /src/goroot/src/cmd/internal/obj/line_test.go /src/goroot/src/cmd/internal/obj/link.go /src/goroot/src/cmd/internal/obj/objfile.go /src/goroot/src/cmd/internal/obj/objfile_test.go /src/goroot/src/cmd/internal/obj/pass.go /src/goroot/src/cmd/internal/obj/pcln.go /src/goroot/src/cmd/internal/obj/plist.go /src/goroot/src/cmd/internal/obj/sizeof_test.go /src/goroot/src/cmd/internal/obj/stringer.go /src/goroot/src/cmd/internal/obj/sym.go /src/goroot/src/cmd/internal/obj/textflag.go /src/goroot/src/cmd/internal/obj/util.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 20 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/mips/a.out.go /src/goroot/src/cmd/internal/obj/mips/anames.go /src/goroot/src/cmd/internal/obj/mips/anames0.go /src/goroot/src/cmd/internal/obj/mips/asm0.go /src/goroot/src/cmd/internal/obj/mips/list0.go /src/goroot/src/cmd/internal/obj/mips/obj0.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/mips
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/wasm/a.out.go /src/goroot/src/cmd/internal/obj/wasm/anames.go /src/goroot/src/cmd/internal/obj/wasm/wasmobj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/wasm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/arm64/a.out.go /src/goroot/src/cmd/internal/obj/arm64/anames.go /src/goroot/src/cmd/internal/obj/arm64/anames7.go /src/goroot/src/cmd/internal/obj/arm64/asm7.go /src/goroot/src/cmd/internal/obj/arm64/asm_arm64_test.go /src/goroot/src/cmd/internal/obj/arm64/doc.go /src/goroot/src/cmd/internal/obj/arm64/list7.go /src/goroot/src/cmd/internal/obj/arm64/obj7.go /src/goroot/src/cmd/internal/obj/arm64/specialoperand_string.go /src/goroot/src/cmd/internal/obj/arm64/sysRegEnc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/arm64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/arm/a.out.go /src/goroot/src/cmd/internal/obj/arm/anames.go /src/goroot/src/cmd/internal/obj/arm/anames5.go /src/goroot/src/cmd/internal/obj/arm/asm5.go /src/goroot/src/cmd/internal/obj/arm/list5.go /src/goroot/src/cmd/internal/obj/arm/obj5.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/arm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/x86/a.out.go /src/goroot/src/cmd/internal/obj/x86/aenum.go /src/goroot/src/cmd/internal/obj/x86/anames.go /src/goroot/src/cmd/internal/obj/x86/asm6.go /src/goroot/src/cmd/internal/obj/x86/asm_test.go /src/goroot/src/cmd/internal/obj/x86/avx_optabs.go /src/goroot/src/cmd/internal/obj/x86/evex.go /src/goroot/src/cmd/internal/obj/x86/list6.go /src/goroot/src/cmd/internal/obj/x86/obj6.go /src/goroot/src/cmd/internal/obj/x86/obj6_test.go /src/goroot/src/cmd/internal/obj/x86/pcrelative_test.go /src/goroot/src/cmd/internal/obj/x86/seh.go /src/goroot/src/cmd/internal/obj/x86/ytab.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/x86
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/s390x/a.out.go /src/goroot/src/cmd/internal/obj/s390x/anames.go /src/goroot/src/cmd/internal/obj/s390x/anamesz.go /src/goroot/src/cmd/internal/obj/s390x/asmz.go /src/goroot/src/cmd/internal/obj/s390x/condition_code.go /src/goroot/src/cmd/internal/obj/s390x/listz.go /src/goroot/src/cmd/internal/obj/s390x/objz.go /src/goroot/src/cmd/internal/obj/s390x/rotate.go /src/goroot/src/cmd/internal/obj/s390x/rotate_test.go /src/goroot/src/cmd/internal/obj/s390x/vector.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/s390x
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/ppc64/a.out.go /src/goroot/src/cmd/internal/obj/ppc64/anames.go /src/goroot/src/cmd/internal/obj/ppc64/anames9.go /src/goroot/src/cmd/internal/obj/ppc64/asm9.go /src/goroot/src/cmd/internal/obj/ppc64/asm9_gtables.go /src/goroot/src/cmd/internal/obj/ppc64/asm_test.go /src/goroot/src/cmd/internal/obj/ppc64/doc.go /src/goroot/src/cmd/internal/obj/ppc64/list9.go /src/goroot/src/cmd/internal/obj/ppc64/obj9.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/ppc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/riscv/anames.go /src/goroot/src/cmd/internal/obj/riscv/asm_test.go /src/goroot/src/cmd/internal/obj/riscv/cpu.go /src/goroot/src/cmd/internal/obj/riscv/inst.go /src/goroot/src/cmd/internal/obj/riscv/list.go /src/goroot/src/cmd/internal/obj/riscv/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/riscv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/internal/obj/riscv/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/internal/obj/riscv/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/riscv/testdata/testbranch/branch_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/riscv/testdata/testbranch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/obj/loong64/a.out.go /src/goroot/src/cmd/internal/obj/loong64/anames.go /src/goroot/src/cmd/internal/obj/loong64/asm.go /src/goroot/src/cmd/internal/obj/loong64/cnames.go /src/goroot/src/cmd/internal/obj/loong64/list.go /src/goroot/src/cmd/internal/obj/loong64/obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/obj/loong64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/src/pos.go /src/goroot/src/cmd/internal/src/pos_test.go /src/goroot/src/cmd/internal/src/xpos.go /src/goroot/src/cmd/internal/src/xpos_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/src
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/dwarf/dwarf.go /src/goroot/src/cmd/internal/dwarf/dwarf_defs.go /src/goroot/src/cmd/internal/dwarf/dwarf_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/edit/edit.go /src/goroot/src/cmd/internal/edit/edit_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/edit
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/testdir/testdir_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/testdir
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/internal/metadata/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/internal/metadata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/doc.go /src/goroot/src/cmd/compile/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_compile '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/compile fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:15 Found package in /src/goroot/src/cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_compile.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_compile.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/compile" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/compile" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/compile" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_compile/copy/doc.go fuzz_ng_cmd_compile/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_compile/copy/doc.go fuzz_ng_cmd_compile/copy/main.go /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_compile/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/cmd/compile/*_test.go' /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/compile/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/compile/testdata /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/compile/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_compile/' /src/goroot/src/fuzz_ng_cmd_compile/doc.go /src/goroot/src/fuzz_ng_cmd_compile/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_compile/main.go /src/goroot/src/fuzz_ng_cmd_compile/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_compile/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_compile/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_compile /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:8:2: use of internal package cmd/compile/internal/amd64 not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_compile/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_compile_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/compile/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/compile/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/mips64/galign.go /src/goroot/src/cmd/compile/internal/mips64/ggen.go /src/goroot/src/cmd/compile/internal/mips64/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/mips64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/liveness/arg.go /src/goroot/src/cmd/compile/internal/liveness/bvset.go /src/goroot/src/cmd/compile/internal/liveness/plive.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/liveness
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/syntax/branches.go /src/goroot/src/cmd/compile/internal/syntax/dumper.go /src/goroot/src/cmd/compile/internal/syntax/dumper_test.go /src/goroot/src/cmd/compile/internal/syntax/error_test.go /src/goroot/src/cmd/compile/internal/syntax/nodes.go /src/goroot/src/cmd/compile/internal/syntax/nodes_test.go /src/goroot/src/cmd/compile/internal/syntax/operator_string.go /src/goroot/src/cmd/compile/internal/syntax/parser.go /src/goroot/src/cmd/compile/internal/syntax/parser_test.go /src/goroot/src/cmd/compile/internal/syntax/pos.go /src/goroot/src/cmd/compile/internal/syntax/positions.go /src/goroot/src/cmd/compile/internal/syntax/printer.go /src/goroot/src/cmd/compile/internal/syntax/printer_test.go /src/goroot/src/cmd/compile/internal/syntax/scanner.go /src/goroot/src/cmd/compile/internal/syntax/scanner_test.go /src/goroot/src/cmd/compile/internal/syntax/source.go /src/goroot/src/cmd/compile/internal/syntax/syntax.go /src/goroot/src/cmd/compile/internal/syntax/testing.go /src/goroot/src/cmd/compile/internal/syntax/testing_test.go /src/goroot/src/cmd/compile/internal/syntax/token_string.go /src/goroot/src/cmd/compile/internal/syntax/tokens.go /src/goroot/src/cmd/compile/internal/syntax/type.go /src/goroot/src/cmd/compile/internal/syntax/walk.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 23 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/syntax/testdata/chans.go /src/goroot/src/cmd/compile/internal/syntax/testdata/fallthrough.go /src/goroot/src/cmd/compile/internal/syntax/testdata/interface.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue20789.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue23385.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue23434.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue31092.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue43527.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue43674.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue46558.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue47704.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue48382.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue49205.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue49482.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue52391.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue56022.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue60599.go /src/goroot/src/cmd/compile/internal/syntax/testdata/issue63835.go /src/goroot/src/cmd/compile/internal/syntax/testdata/linalg.go /src/goroot/src/cmd/compile/internal/syntax/testdata/map.go /src/goroot/src/cmd/compile/internal/syntax/testdata/map2.go /src/goroot/src/cmd/compile/internal/syntax/testdata/sample.go /src/goroot/src/cmd/compile/internal/syntax/testdata/slices.go /src/goroot/src/cmd/compile/internal/syntax/testdata/smoketest.go /src/goroot/src/cmd/compile/internal/syntax/testdata/tparams.go /src/goroot/src/cmd/compile/internal/syntax/testdata/typeset.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 26 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/syntax/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/gc/compile.go /src/goroot/src/cmd/compile/internal/gc/export.go /src/goroot/src/cmd/compile/internal/gc/main.go /src/goroot/src/cmd/compile/internal/gc/obj.go /src/goroot/src/cmd/compile/internal/gc/util.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/gc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/noder/codes.go /src/goroot/src/cmd/compile/internal/noder/export.go /src/goroot/src/cmd/compile/internal/noder/helpers.go /src/goroot/src/cmd/compile/internal/noder/import.go /src/goroot/src/cmd/compile/internal/noder/irgen.go /src/goroot/src/cmd/compile/internal/noder/lex.go /src/goroot/src/cmd/compile/internal/noder/lex_test.go /src/goroot/src/cmd/compile/internal/noder/linker.go /src/goroot/src/cmd/compile/internal/noder/noder.go /src/goroot/src/cmd/compile/internal/noder/posmap.go /src/goroot/src/cmd/compile/internal/noder/quirks.go /src/goroot/src/cmd/compile/internal/noder/reader.go /src/goroot/src/cmd/compile/internal/noder/stencil.go /src/goroot/src/cmd/compile/internal/noder/stmt.go /src/goroot/src/cmd/compile/internal/noder/types.go /src/goroot/src/cmd/compile/internal/noder/unified.go /src/goroot/src/cmd/compile/internal/noder/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/noder
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/mips/galign.go /src/goroot/src/cmd/compile/internal/mips/ggen.go /src/goroot/src/cmd/compile/internal/mips/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/mips
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/base/base.go /src/goroot/src/cmd/compile/internal/base/bootstrap_false.go /src/goroot/src/cmd/compile/internal/base/bootstrap_true.go /src/goroot/src/cmd/compile/internal/base/debug.go /src/goroot/src/cmd/compile/internal/base/flag.go /src/goroot/src/cmd/compile/internal/base/hashdebug.go /src/goroot/src/cmd/compile/internal/base/hashdebug_test.go /src/goroot/src/cmd/compile/internal/base/link.go /src/goroot/src/cmd/compile/internal/base/mapfile_mmap.go /src/goroot/src/cmd/compile/internal/base/mapfile_read.go /src/goroot/src/cmd/compile/internal/base/print.go /src/goroot/src/cmd/compile/internal/base/timings.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/base
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/typecheck/bexport.go /src/goroot/src/cmd/compile/internal/typecheck/builtin.go /src/goroot/src/cmd/compile/internal/typecheck/builtin_test.go /src/goroot/src/cmd/compile/internal/typecheck/const.go /src/goroot/src/cmd/compile/internal/typecheck/dcl.go /src/goroot/src/cmd/compile/internal/typecheck/export.go /src/goroot/src/cmd/compile/internal/typecheck/expr.go /src/goroot/src/cmd/compile/internal/typecheck/func.go /src/goroot/src/cmd/compile/internal/typecheck/iexport.go /src/goroot/src/cmd/compile/internal/typecheck/iimport.go /src/goroot/src/cmd/compile/internal/typecheck/mkbuiltin.go /src/goroot/src/cmd/compile/internal/typecheck/stmt.go /src/goroot/src/cmd/compile/internal/typecheck/subr.go /src/goroot/src/cmd/compile/internal/typecheck/syms.go /src/goroot/src/cmd/compile/internal/typecheck/target.go /src/goroot/src/cmd/compile/internal/typecheck/type.go /src/goroot/src/cmd/compile/internal/typecheck/typecheck.go /src/goroot/src/cmd/compile/internal/typecheck/universe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 18 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/typecheck
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/typecheck/_builtin/coverage.go /src/goroot/src/cmd/compile/internal/typecheck/_builtin/runtime.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/typecheck/_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/ir/abi.go /src/goroot/src/cmd/compile/internal/ir/bitset.go /src/goroot/src/cmd/compile/internal/ir/cfg.go /src/goroot/src/cmd/compile/internal/ir/check_reassign_no.go /src/goroot/src/cmd/compile/internal/ir/check_reassign_yes.go /src/goroot/src/cmd/compile/internal/ir/class_string.go /src/goroot/src/cmd/compile/internal/ir/const.go /src/goroot/src/cmd/compile/internal/ir/copy.go /src/goroot/src/cmd/compile/internal/ir/dump.go /src/goroot/src/cmd/compile/internal/ir/expr.go /src/goroot/src/cmd/compile/internal/ir/fmt.go /src/goroot/src/cmd/compile/internal/ir/func.go /src/goroot/src/cmd/compile/internal/ir/func_test.go /src/goroot/src/cmd/compile/internal/ir/ir.go /src/goroot/src/cmd/compile/internal/ir/mini.go /src/goroot/src/cmd/compile/internal/ir/mknode.go /src/goroot/src/cmd/compile/internal/ir/name.go /src/goroot/src/cmd/compile/internal/ir/node.go /src/goroot/src/cmd/compile/internal/ir/node_gen.go /src/goroot/src/cmd/compile/internal/ir/op_string.go /src/goro++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ot/src/cmd/compile/internal/ir/package.go /src/goroot/src/cmd/compile/internal/ir/reassign_consistency_check.go /src/goroot/src/cmd/compile/internal/ir/reassignment.go /src/goroot/src/cmd/compile/internal/ir/scc.go /src/goroot/src/cmd/compile/internal/ir/sizeof_test.go /src/goroot/src/cmd/compile/internal/ir/stmt.go /src/goroot/src/cmd/compile/internal/ir/symtab.go /src/goroot/src/cmd/compile/internal/ir/type.go /src/goroot/src/cmd/compile/internal/ir/val.go /src/goroot/src/cmd/compile/internal/ir/visit.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 30 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/ir
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/abt/avlint32.go /src/goroot/src/cmd/compile/internal/abt/avlint32_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/abt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/typebits/typebits.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/typebits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/dwarfgen/dwarf.go /src/goroot/src/cmd/compile/internal/dwarfgen/dwinl.go /src/goroot/src/cmd/compile/internal/dwarfgen/marker.go /src/goroot/src/cmd/compile/internal/dwarfgen/scope.go /src/goroot/src/cmd/compile/internal/dwarfgen/scope_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/dwarfgen
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/wasm/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/wasm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/ssagen/abi.go /src/goroot/src/cmd/compile/internal/ssagen/arch.go /src/goroot/src/cmd/compile/internal/ssagen/nowb.go /src/goroot/src/cmd/compile/internal/ssagen/pgen.go /src/goroot/src/cmd/compile/internal/ssagen/phi.go /src/goroot/src/cmd/compile/internal/ssagen/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/ssagen
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/types/alg.go /src/goroot/src/cmd/compile/internal/types/algkind_string.go /src/goroot/src/cmd/compile/internal/types/fmt.go /src/goroot/src/cmd/compile/internal/types/goversion.go /src/goroot/src/cmd/compile/internal/types/identity.go /src/goroot/src/cmd/compile/internal/types/kind_string.go /src/goroot/src/cmd/compile/internal/types/pkg.go /src/goroot/src/cmd/compile/internal/types/size.go /src/goroot/src/cmd/compile/internal/types/sizeof_test.go /src/goroot/src/cmd/compile/internal/types/sort.go /src/goroot/src/cmd/compile/internal/types/sym.go /src/goroot/src/cmd/compile/internal/types/sym_test.go /src/goroot/src/cmd/compile/internal/types/type.go /src/goroot/src/cmd/compile/internal/types/type_test.go /src/goroot/src/cmd/compile/internal/types/universe.go /src/goroot/src/cmd/compile/internal/types/utils.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 16 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/types
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/staticdata/data.go /src/goroot/src/cmd/compile/internal/staticdata/embed.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/staticdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/importer/exportdata.go /src/goroot/src/cmd/compile/internal/importer/gcimporter.go /src/goroot/src/cmd/compile/internal/importer/gcimporter_test.go /src/goroot/src/cmd/compile/internal/importer/iimport.go /src/goroot/src/cmd/compile/internal/importer/support.go /src/goroot/src/cmd/compile/internal/importer/ureader.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/importer/testdata/a.go /src/goroot/src/cmd/compile/internal/importer/testdata/b.go /src/goroot/src/cmd/compile/internal/importer/testdata/exports.go /src/goroot/src/cmd/compile/internal/importer/testdata/generics.go /src/goroot/src/cmd/compile/internal/importer/testdata/issue15920.go /src/goroot/src/cmd/compile/internal/importer/testdata/issue20046.go /src/goroot/src/cmd/compile/internal/importer/testdata/issue25301.go /src/goroot/src/cmd/compile/internal/importer/testdata/issue25596.go /src/goroot/src/cmd/compile/internal/importer/testdata/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/importer/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/importer/testdata/versions/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/importer/testdata/versions
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/coverage/cover.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/reflectdata/alg.go /src/goroot/src/cmd/compile/internal/reflectdata/alg_test.go /src/goroot/src/cmd/compile/internal/reflectdata/helpers.go /src/goroot/src/cmd/compile/internal/reflectdata/reflect.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/reflectdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/arm64/galign.go /src/goroot/src/cmd/compile/internal/arm64/ggen.go /src/goroot/src/cmd/compile/internal/arm64/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/arm64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/ssa/addressingmodes.go /src/goroot/src/cmd/compile/internal/ssa/allocators.go /src/goroot/src/cmd/compile/internal/ssa/bench_test.go /src/goroot/src/cmd/compile/internal/ssa/biasedsparsemap.go /src/goroot/src/cmd/compile/internal/ssa/block.go /src/goroot/src/cmd/compile/internal/ssa/branchelim.go /src/goroot/src/cmd/compile/internal/ssa/branchelim_test.go /src/goroot/src/cmd/compile/internal/ssa/cache.go /src/goroot/src/cmd/compile/internal/ssa/check.go /src/goroot/src/cmd/compile/internal/ssa/checkbce.go /src/goroot/src/cmd/compile/internal/ssa/compile.go /src/goroot/src/cmd/compile/internal/ssa/config.go /src/goroot/src/cmd/compile/internal/ssa/copyelim.go /src/goroot/src/cmd/compile/internal/ssa/copyelim_test.go /src/goroot/src/cmd/compile/internal/ssa/critical.go /src/goroot/src/cmd/compile/internal/ssa/cse.go /src/goroot/src/cmd/compile/internal/ssa/cse_test.go /src/goroot/src/cmd/compile/internal/ssa/deadcode.go /src/goroot/src/cmd/compile/internal/ssa/deadcode_test.go /src/goroot/src/cmd/compile/internal/ssa/deadstore.go /src/goroot/src/cmd/compile/internal/ssa/deadstore_test.go /src/goroot/src/cmd/compile/internal/ssa/debug.go /src/goroot/src/cmd/compile/internal/ssa/debug_lines_test.go /src/goroot/src/cmd/compile/internal/ssa/debug_test.go /src/goroot/src/cmd/compile/internal/ssa/decompose.go /src/goroot/src/cmd/compile/internal/ssa/dom.go /src/goroot/src/cmd/compile/internal/ssa/dom_test.go /src/goroot/src/cmd/compile/internal/ssa/expand_calls.go /src/goroot/src/cmd/compile/internal/ssa/export_test.go /src/goroot/src/cmd/compile/internal/ssa/flagalloc.go /src/goroot/src/cmd/compile/internal/ssa/flags_test.go /src/goroot/src/cmd/compile/internal/ssa/fmahash_test.go /src/goroot/src/cmd/compile/internal/ssa/func.go /src/goroot/src/cmd/compile/internal/ssa/func_test.go /src/goroot/src/cmd/compile/internal/ssa/fuse.go /src/goroot/src/cmd/compile/internal/ssa/fuse_branchredirect.go /src/goroot/src/cmd/compile/internal/ssa/fuse_comparisons.go /src/goroot/src/cmd/compile/internal/ssa/fuse_test.go /src/goroot/src/cmd/compile/internal/ssa/generate.go /src/goroot/src/cmd/compile/internal/ssa/html.go /src/goroot/src/cmd/compile/internal/ssa/id.go /src/goroot/src/cmd/compile/internal/ssa/layout.go /src/goroot/src/cmd/compile/internal/ssa/lca.go /src/goroot/src/cmd/compile/internal/ssa/lca_test.go /src/goroot/src/cmd/compile/internal/ssa/likelyadjust.go /src/goroot/src/cmd/compile/internal/ssa/location.go /src/goroot/src/cmd/compile/internal/ssa/loopbce.go /src/goroot/src/cmd/compile/internal/ssa/loopreschedchecks.go /src/goroot/src/cmd/compile/internal/ssa/looprotate.go /src/goroot/src/cmd/compile/internal/ssa/lower.go /src/goroot/src/cmd/compile/internal/ssa/magic.go /src/goroot/src/cmd/compile/internal/ssa/magic_test.go /src/goroot/src/cmd/compile/internal/ssa/memcombine.go /src/goroot/src/cmd/compile/internal/ssa/nilcheck.go /src/goroot/src/cmd/compile/internal/ssa/nilcheck_test.go /src/goroot/src/cmd/compile/internal/ssa/numberlines.go /src/goroot/src/cmd/compile/internal/ssa/op.go /src/goroot/src/cmd/compile/internal/ssa/opGen.go /src/goroot/src/cmd/compile/internal/ssa/opt.go /src/goroot/src/cmd/compile/internal/ssa/passbm_test.go /src/goroot/src/cmd/compile/internal/ssa/phielim.go /src/goroot/src/cmd/compile/internal/ssa/phiopt.go /src/goroot/src/cmd/compile/internal/ssa/poset.go /src/goroot/src/cmd/compile/internal/ssa/poset_test.go /src/goroot/src/cmd/compile/internal/ssa/print.go /src/goroot/src/cmd/compile/internal/ssa/prove.go /src/goroot/src/cmd/compile/internal/ssa/regalloc.go /src/goroot/src/cmd/compile/internal/ssa/regalloc_test.go /src/goroot/src/cmd/compile/internal/ssa/rewrite.go /src/goroot/src/cmd/compile/internal/ssa/rewrite386.go /src/goroot/src/cmd/compile/internal/ssa/rewrite386splitload.go /src/goroot/src/cmd/compile/internal/ssa/rewriteAMD64.go /src/goroot/src/cmd/compile/internal/ssa/rewriteAMD64latelower.go /src/goroot/src/cmd/compile/internal/ssa/rewriteAMD64splitload.go /src/goroot/src/cmd/compile/internal/ssa/rewriteARM.go /src/goroot/src/cmd/compile/internal/ssa/rewriteARM64.go /src/goroot/src/cmd/compile/internal/ssa/rewriteARM64latelower.go /src/goroot/src/cmd/compile/internal/ssa/rewriteCond_test.go /src/goroot/src/cmd/compile/internal/ssa/rewriteLOONG64.go /src/goroot/src/cmd/compile/internal/ssa/rewriteMIPS.go /src/goroot/src/cmd/compile/internal/ssa/rewriteMIPS64.go /src/goroot/src/cmd/compile/internal/ssa/rewritePPC64.go /src/goroot/src/cmd/compile/internal/ssa/rewritePPC64latelower.go /src/goroot/src/cmd/compile/internal/ssa/rewriteRISCV64.go /src/goroot/src/cmd/compile/internal/ssa/rewriteRISCV64latelower.go /src/goroot/src/cmd/compile/internal/ssa/rewriteS390X.go /src/goroot/src/cmd/compile/internal/ssa/rewriteWasm.go /src/goroot/src/cmd/compile/internal/ssa/rewrite_test.go /src/goroot/src/cmd/compile/internal/ssa/rewritedec.go /src/goroot/src/cmd/compile/internal/ssa/rewritedec64.go /src/goroot/src/cmd/compile/internal/ssa/rewritegeneric.go /src/goroot/src/cmd/compile/internal/ssa/sccp.go /src/goroot/src/cmd/compile/internal/ssa/sccp_test.go /src/goroot/src/cmd/compile/internal/ssa/schedule.go /src/goroot/src/cmd/compile/internal/ssa/schedule_test.go /src/goroot/src/cmd/compile/internal/ssa/shift_test.go /src/goroot/src/cmd/compile/internal/ssa/shortcircuit.go /src/goroot/src/cmd/compile/internal/ssa/shortcircuit_test.go /src/goroot/src/cmd/compile/internal/ssa/sizeof_test.go /src/goroot/src/cmd/compile/internal/ssa/softfloat.go /src/goroot/src/cmd/compile/internal/ssa/sparsemap.go /src/goroot/src/cmd/compile/internal/ssa/sparsemappos.go /src/goroot/src/cmd/compile/internal/ssa/sparseset.go /src/goroot/src/cmd/compile/internal/ssa/sparsetree.go /src/goroot/src/cmd/compile/internal/ssa/stackalloc.go /src/goroot/src/cmd/compile/internal/ssa/stmtlines_test.go /src/goroot/src/cmd/compile/internal/ssa/tighten.go /src/goroot/src/cmd/compile/internal/ssa/trim.go /src/goroot/src/cmd/compile/internal/ssa/tuple.go /src/goroot/src/cmd/compile/internal/ssa/value.go /src/goroot/src/cmd/compile/internal/ssa/writebarrier.go /src/goroot/src/cmd/compile/internal/ssa/writebarrier_test.go /src/goroot/src/cmd/compile/internal/ssa/xposmap.go /src/goroot/src/cmd/compile/internal/ssa/zcse.go /src/goroot/src/cmd/compile/internal/ssa/zeroextension_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 115 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/ssa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/ssa/_gen/386Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/AMD64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/ARM64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/ARMOps.go /src/goroot/src/cmd/compile/internal/ssa/_gen/LOONG64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/MIPS64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/MIPSOps.go /src/goroot/src/cmd/compile/internal/ssa/_gen/PPC64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/RISCV64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/S390XOps.go /src/goroot/src/cmd/compile/internal/ssa/_gen/WasmOps.go /src/goroot/src/cmd/compile/internal/ssa/_gen/allocators.go /src/goroot/src/cmd/compile/internal/ssa/_gen/dec64Ops.go /src/goroot/src/cmd/compile/internal/ssa/_gen/decOps.go /src/goroot/src/cmd/compile/internal/ssa/_gen/genericOps.go /src/goroot/src/cmd/compile/internal/ssa/_gen/main.go /src/goroot/src/cmd/compile/internal/ssa/_gen/rulegen.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/ssa/_gen
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/ssa/testdata/b53456.go /src/goroot/src/cmd/compile/internal/ssa/testdata/convertline.go /src/goroot/src/cmd/compile/internal/ssa/testdata/fma.go /src/goroot/src/cmd/compile/internal/ssa/testdata/hist.go /src/goroot/src/cmd/compile/internal/ssa/testdata/i22558.go /src/goroot/src/cmd/compile/internal/ssa/testdata/i22600.go /src/goroot/src/cmd/compile/internal/ssa/testdata/infloop.go /src/goroot/src/cmd/compile/internal/ssa/testdata/inline-dump.go /src/goroot/src/cmd/compile/internal/ssa/testdata/pushback.go /src/goroot/src/cmd/compile/internal/ssa/testdata/sayhi.go /src/goroot/src/cmd/compile/internal/ssa/testdata/scopes.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/ssa/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/riscv64/galign.go /src/goroot/src/cmd/compile/internal/riscv64/ggen.go /src/goroot/src/cmd/compile/internal/riscv64/gsubr.go /src/goroot/src/cmd/compile/internal/riscv64/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/riscv64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/escape/assign.go /src/goroot/src/cmd/compile/internal/escape/call.go /src/goroot/src/cmd/compile/internal/escape/escape.go /src/goroot/src/cmd/compile/internal/escape/expr.go /src/goroot/src/cmd/compile/internal/escape/graph.go /src/goroot/src/cmd/compile/internal/escape/leaks.go /src/goroot/src/cmd/compile/internal/escape/solve.go /src/goroot/src/cmd/compile/internal/escape/stmt.go /src/goroot/src/cmd/compile/internal/escape/utils.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/escape
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/pgo/irgraph.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/pgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/compile/internal/pgo/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/compile/internal/pgo/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/pgo/internal/graph/graph.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/pgo/internal/graph
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/types2/alias.go /src/goroot/src/cmd/compile/internal/types2/api.go /src/goroot/src/cmd/compile/internal/types2/api_predicates.go /src/goroot/src/cmd/compile/internal/types2/api_test.go /src/goroot/src/cmd/compile/internal/types2/array.go /src/goroot/src/cmd/compile/internal/types2/assignments.go /src/goroot/src/cmd/compile/internal/types2/basic.go /src/goroot/src/cmd/compile/internal/types2/builtins.go /src/goroot/src/cmd/compile/internal/types2/builtins_test.go /src/goroot/src/cmd/compile/internal/types2/call.go /src/goroot/src/cmd/compile/internal/types2/chan.go /src/goroot/src/cmd/compile/internal/types2/check.go /src/goroot/src/cmd/compile/internal/types2/check_test.go /src/goroot/src/cmd/compile/internal/types2/compilersupport.go /src/goroot/src/cmd/compile/internal/types2/const.go /src/goroot/src/cmd/compile/internal/types2/context.go /src/goroot/src/cmd/compile/internal/types2/context_test.go /src/goroot/src/cmd/compile/internal/types2/conversions.go /src/goroot/src/cmd/compile/internal/types2/decl.go /src/goroot/src/cmd/compile/internal/types2/errorcalls_test.go /src/goroot/src/cmd/compile/internal/types2/errors.go /src/goroot/src/cmd/compile/internal/types2/errors_test.go /src/goroot/src/cmd/compile/internal/types2/example_test.go /src/goroot/src/cmd/compile/internal/types2/expr.go /src/goroot/src/cmd/compile/internal/types2/gccgosizes.go /src/goroot/src/cmd/compile/internal/types2/gcsizes.go /src/goroot/src/cmd/compile/internal/types2/hilbert_test.go /src/goroot/src/cmd/compile/internal/types2/importer_test.go /src/goroot/src/cmd/compile/internal/types2/index.go /src/goroot/src/cmd/compile/internal/types2/infer.go /src/goroot/src/cmd/compile/internal/types2/initorder.go /src/goroot/src/cmd/compile/internal/types2/instantiate.go /src/goroot/src/cmd/compile/internal/types2/instantiate_test.go /src/goroot/src/cmd/compile/internal/types2/interface.go /src/goroot/src/cmd/compile/internal/types2/issues_test.go /src/goroot/src/cmd/compile/internal/types2/labels.go /src/goroot/src/cmd/compile/internal/types2/lookup.go /src/goroot/src/cmd/compile/internal/types2/lookup_test.go /src/goroot/src/cmd/compile/internal/types2/main_test.go /src/goroot/src/cmd/compile/internal/types2/map.go /src/goroot/src/cmd/compile/internal/types2/mono.go /src/goroot/src/cmd/compile/internal/types2/mono_test.go /src/goroot/src/cmd/compile/internal/types2/named.go /src/goroot/src/cmd/compile/internal/types2/named_test.go /src/goroot/src/cmd/compile/internal/types2/object.go /src/goroot/src/cmd/compile/internal/types2/object_test.go /src/goroot/src/cmd/compile/internal/types2/objset.go /src/goroot/src/cmd/compile/internal/types2/operand.go /src/goroot/src/cmd/compile/internal/types2/package.go /src/goroot/src/cmd/compile/internal/types2/pointer.go /src/goroot/src/cmd/compile/internal/types2/predicates.go /src/goroot/src/cmd/compile/internal/types2/resolver.go /src/goroot/src/cmd/compile/internal/types2/resolver_test.go /src/goroot/src/cmd/compile/internal/types2/return.go /src/goroot/src/cmd/compi++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": le/internal/types2/scope.go /src/goroot/src/cmd/compile/internal/types2/selection.go /src/goroot/src/cmd/compile/internal/types2/self_test.go /src/goroot/src/cmd/compile/internal/types2/signature.go /src/goroot/src/cmd/compile/internal/types2/sizeof_test.go /src/goroot/src/cmd/compile/internal/types2/sizes.go /src/goroot/src/cmd/compile/internal/types2/sizes_test.go /src/goroot/src/cmd/compile/internal/types2/slice.go /src/goroot/src/cmd/compile/internal/types2/stdlib_test.go /src/goroot/src/cmd/compile/internal/types2/stmt.go /src/goroot/src/cmd/compile/internal/types2/struct.go /src/goroot/src/cmd/compile/internal/types2/subst.go /src/goroot/src/cmd/compile/internal/types2/termlist.go /src/goroot/src/cmd/compile/internal/types2/termlist_test.go /src/goroot/src/cmd/compile/internal/types2/tuple.go /src/goroot/src/cmd/compile/internal/types2/type.go /src/goroot/src/cmd/compile/internal/types2/typelists.go /src/goroot/src/cmd/compile/internal/types2/typeparam.go /src/goroot/src/cmd/compile/internal/types2/typeset.go /src/goroot/src/cmd/compile/internal/types2/typeset_test.go /src/goroot/src/cmd/compile/internal/types2/typestring.go /src/goroot/src/cmd/compile/internal/types2/typestring_test.go /src/goroot/src/cmd/compile/internal/types2/typeterm.go /src/goroot/src/cmd/compile/internal/types2/typeterm_test.go /src/goroot/src/cmd/compile/internal/types2/typexpr.go /src/goroot/src/cmd/compile/internal/types2/under.go /src/goroot/src/cmd/compile/internal/types2/unify.go /src/goroot/src/cmd/compile/internal/types2/union.go /src/goroot/src/cmd/compile/internal/types2/universe.go /src/goroot/src/cmd/compile/internal/types2/util.go /src/goroot/src/cmd/compile/internal/types2/util_test.go /src/goroot/src/cmd/compile/internal/types2/validtype.go /src/goroot/src/cmd/compile/internal/types2/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 87 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/types2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/types2/testdata/manual.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/types2/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/types2/testdata/local/issue47996.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/types2/testdata/local
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/arm/galign.go /src/goroot/src/cmd/compile/internal/arm/ggen.go /src/goroot/src/cmd/compile/internal/arm/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/arm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/amd64/galign.go /src/goroot/src/cmd/compile/internal/amd64/ggen.go /src/goroot/src/cmd/compile/internal/amd64/ssa.go /src/goroot/src/cmd/compile/internal/amd64/versions_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/amd64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/rttype/rttype.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/rttype
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/bitvec/bv.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/bitvec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/x86/galign.go /src/goroot/src/cmd/compile/internal/x86/ggen.go /src/goroot/src/cmd/compile/internal/x86/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/x86
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/walk/assign.go /src/goroot/src/cmd/compile/internal/walk/builtin.go /src/goroot/src/cmd/compile/internal/walk/closure.go /src/goroot/src/cmd/compile/internal/walk/compare.go /src/goroot/src/cmd/compile/internal/walk/complit.go /src/goroot/src/cmd/compile/internal/walk/convert.go /src/goroot/src/cmd/compile/internal/walk/expr.go /src/goroot/src/cmd/compile/internal/walk/order.go /src/goroot/src/cmd/compile/internal/walk/range.go /src/goroot/src/cmd/compile/internal/walk/select.go /src/goroot/src/cmd/compile/internal/walk/stmt.go /src/goroot/src/cmd/compile/internal/walk/switch.go /src/goroot/src/cmd/compile/internal/walk/temp.go /src/goroot/src/cmd/compile/internal/walk/walk.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/walk
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/logopt/log_opts.go /src/goroot/src/cmd/compile/internal/logopt/logopt_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/logopt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/s390x/galign.go /src/goroot/src/cmd/compile/internal/s390x/ggen.go /src/goroot/src/cmd/compile/internal/s390x/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/s390x
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/rangefunc/rangefunc_test.go /src/goroot/src/cmd/compile/internal/rangefunc/rewrite.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/rangefunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/compare/compare.go /src/goroot/src/cmd/compile/internal/compare/compare_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/compare
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/abiutils_test.go /src/goroot/src/cmd/compile/internal/test/abiutilsaux_test.go /src/goroot/src/cmd/compile/internal/test/align_test.go /src/goroot/src/cmd/compile/internal/test/bench_test.go /src/goroot/src/cmd/compile/internal/test/clobberdead_test.go /src/goroot/src/cmd/compile/internal/test/constFold_test.go /src/goroot/src/cmd/compile/internal/test/dep_test.go /src/goroot/src/cmd/compile/internal/test/divconst_test.go /src/goroot/src/cmd/compile/internal/test/fixedbugs_test.go /src/goroot/src/cmd/compile/internal/test/float_test.go /src/goroot/src/cmd/compile/internal/test/global_test.go /src/goroot/src/cmd/compile/internal/test/iface_test.go /src/goroot/src/cmd/compile/internal/test/inl_test.go /src/goroot/src/cmd/compile/internal/test/inst_test.go /src/goroot/src/cmd/compile/internal/test/intrinsics_test.go /src/goroot/src/cmd/compile/internal/test/issue50182_test.go /src/goroot/src/cmd/compile/internal/test/issue53888_test.go /src/goroot/src/cmd/compile/i++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": nternal/test/issue57434_test.go /src/goroot/src/cmd/compile/internal/test/lang_test.go /src/goroot/src/cmd/compile/internal/test/logic_test.go /src/goroot/src/cmd/compile/internal/test/math_test.go /src/goroot/src/cmd/compile/internal/test/memcombine_test.go /src/goroot/src/cmd/compile/internal/test/mulconst_test.go /src/goroot/src/cmd/compile/internal/test/pgo_devirtualize_test.go /src/goroot/src/cmd/compile/internal/test/pgo_inl_test.go /src/goroot/src/cmd/compile/internal/test/race.go /src/goroot/src/cmd/compile/internal/test/reproduciblebuilds_test.go /src/goroot/src/cmd/compile/internal/test/shift_test.go /src/goroot/src/cmd/compile/internal/test/ssa_test.go /src/goroot/src/cmd/compile/internal/test/switch_test.go /src/goroot/src/cmd/compile/internal/test/test.go /src/goroot/src/cmd/compile/internal/test/truncconst_test.go /src/goroot/src/cmd/compile/internal/test/zerorange_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 33 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/addressed_test.go /src/goroot/src/cmd/compile/internal/test/testdata/append_test.go /src/goroot/src/cmd/compile/internal/test/testdata/arithBoundary_test.go /src/goroot/src/cmd/compile/internal/test/testdata/arithConst_test.go /src/goroot/src/cmd/compile/internal/test/testdata/arith_test.go /src/goroot/src/cmd/compile/internal/test/testdata/array_test.go /src/goroot/src/cmd/compile/internal/test/testdata/assert_test.go /src/goroot/src/cmd/compile/internal/test/testdata/break_test.go /src/goroot/src/cmd/compile/internal/test/testdata/chan_test.go /src/goroot/src/cmd/compile/internal/test/testdata/closure_test.go /src/goroot/src/cmd/compile/internal/test/testdata/cmpConst_test.go /src/goroot/src/cmd/compile/internal/test/testdata/cmp_test.go /src/goroot/src/cmd/compile/internal/test/testdata/compound_test.go /src/goroot/src/cmd/compile/internal/test/testdata/copy_test.go /src/goroot/src/cmd/compile/internal/test/testdata/ctl_test.go /src/goroot/src/cmd/co++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": mpile/internal/test/testdata/deferNoReturn_test.go /src/goroot/src/cmd/compile/internal/test/testdata/divbyzero_test.go /src/goroot/src/cmd/compile/internal/test/testdata/dupLoad_test.go /src/goroot/src/cmd/compile/internal/test/testdata/flowgraph_generator1.go /src/goroot/src/cmd/compile/internal/test/testdata/fp_test.go /src/goroot/src/cmd/compile/internal/test/testdata/loadstore_test.go /src/goroot/src/cmd/compile/internal/test/testdata/map_test.go /src/goroot/src/cmd/compile/internal/test/testdata/namedReturn_test.go /src/goroot/src/cmd/compile/internal/test/testdata/phi_test.go /src/goroot/src/cmd/compile/internal/test/testdata/ptrsort.go /src/goroot/src/cmd/compile/internal/test/testdata/regalloc_test.go /src/goroot/src/cmd/compile/internal/test/testdata/short_test.go /src/goroot/src/cmd/compile/internal/test/testdata/slice_test.go /src/goroot/src/cmd/compile/internal/test/testdata/sqrtConst_test.go /src/goroot/src/cmd/compile/internal/test/testdata/string_test.go /src/goroot/src/cmd/compile/internal/test/testdata/unsafe_test.go /src/goroot/src/cmd/compile/internal/test/testdata/zero_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 32 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/reproducible/issue20272.go /src/goroot/src/cmd/compile/internal/test/testdata/reproducible/issue27013.go /src/goroot/src/cmd/compile/internal/test/testdata/reproducible/issue30202.go /src/goroot/src/cmd/compile/internal/test/testdata/reproducible/issue38068.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata/reproducible
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/gen/arithBoundaryGen.go /src/goroot/src/cmd/compile/internal/test/testdata/gen/arithConstGen.go /src/goroot/src/cmd/compile/internal/test/testdata/gen/cmpConstGen.go /src/goroot/src/cmd/compile/internal/test/testdata/gen/constFoldGen.go /src/goroot/src/cmd/compile/internal/test/testdata/gen/copyGen.go /src/goroot/src/cmd/compile/internal/test/testdata/gen/zeroGen.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata/gen
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/compile/internal/test/testdata/pgo/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/compile/internal/test/testdata/pgo/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/pgo/inline/inline_hot.go /src/goroot/src/cmd/compile/internal/test/testdata/pgo/inline/inline_hot_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata/pgo/inline
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/pgo/devirtualize/devirt.go /src/goroot/src/cmd/compile/internal/test/testdata/pgo/devirtualize/devirt_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata/pgo/devirtualize
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/pgo/devirtualize/mult.pkg/mult.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata/pgo/devirtualize/mult.pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/test/testdata/mysort/mysort.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/test/testdata/mysort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/inline/inl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/inline
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/inline/interleaved/interleaved.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/inline/interleaved
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/inline/inlheur/actualexprpropbits_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/analyze.go /src/goroot/src/cmd/compile/internal/inline/inlheur/analyze_func_callsites.go /src/goroot/src/cmd/compile/internal/inline/inlheur/analyze_func_flags.go /src/goroot/src/cmd/compile/internal/inline/inlheur/analyze_func_params.go /src/goroot/src/cmd/compile/internal/inline/inlheur/analyze_func_returns.go /src/goroot/src/cmd/compile/internal/inline/inlheur/callsite.go /src/goroot/src/cmd/compile/internal/inline/inlheur/cspropbits_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/debugflags_test.go /src/goroot/src/cmd/compile/internal/inline/inlheur/dumpscores_test.go /src/goroot/src/cmd/compile/internal/inline/inlheur/eclassify.go /src/goroot/src/cmd/compile/internal/inline/inlheur/funcprop_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/funcpropbits_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/funcprops_test.go /src/goroot/src/cmd/compile/internal/inline/inlheur/function_properties.go /src/goroot/src/cmd/compile/internal/inline/inlheur/names.go /src/goroot/src/cmd/compile/internal/inline/inlheur/parampropbits_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/pstate_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/resultpropbits_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/score_callresult_uses.go /src/goroot/src/cmd/compile/internal/inline/inlheur/scoreadjusttyp_string.go /src/goroot/src/cmd/compile/internal/inline/inlheur/scoring.go /src/goroot/src/cmd/compile/internal/inline/inlheur/serialize.go /src/goroot/src/cmd/compile/internal/inline/inlheur/texpr_classify_test.go /src/goroot/src/cmd/compile/internal/inline/inlheur/trace_off.go /src/goroot/src/cmd/compile/internal/inline/inlheur/trace_on.go /src/goroot/src/cmd/compile/internal/inline/inlheur/tserial_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 27 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/inline/inlheur
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/dumpscores.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/inline/inlheur/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/props/acrosscall.go /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/props/calls.go /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/props/funcflags.go /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/props/params.go /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/props/returns.go /src/goroot/src/cmd/compile/internal/inline/inlheur/testdata/props/returns2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/inline/inlheur/testdata/props
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/ppc64/galign.go /src/goroot/src/cmd/compile/internal/ppc64/ggen.go /src/goroot/src/cmd/compile/internal/ppc64/opt.go /src/goroot/src/cmd/compile/internal/ppc64/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/ppc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/objw/objw.go /src/goroot/src/cmd/compile/internal/objw/prog.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/objw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/devirtualize/devirtualize.go /src/goroot/src/cmd/compile/internal/devirtualize/pgo.go /src/goroot/src/cmd/compile/internal/devirtualize/pgo_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/devirtualize
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/staticinit/sched.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/staticinit
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/pkginit/init.go /src/goroot/src/cmd/compile/internal/pkginit/initAsanGlobals.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/pkginit
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loong64/galign.go /src/goroot/src/cmd/compile/internal/loong64/ggen.go /src/goroot/src/cmd/compile/internal/loong64/ssa.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loong64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/abi/abiutils.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/abi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loopvar/loopvar.go /src/goroot/src/cmd/compile/internal/loopvar/loopvar_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loopvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loopvar/testdata/for_complicated_esc_address.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/for_esc_address.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/for_esc_closure.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/for_esc_method.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/for_esc_minimal_closure.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/for_nested.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/opt-121.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/opt-122.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/opt.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/range_esc_address.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/range_esc_closure.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/range_esc_method.go /src/goroot/src/cmd/compile/internal/loopvar/testdata/range_esc_minimal_closure.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loopvar/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loopvar/testdata/inlines/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loopvar/testdata/inlines
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loopvar/testdata/inlines/c/c.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loopvar/testdata/inlines/c
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loopvar/testdata/inlines/a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loopvar/testdata/inlines/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/compile/internal/loopvar/testdata/inlines/b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/compile/internal/loopvar/testdata/inlines/b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/ast.go /src/goroot/src/cmd/cgo/ast_go1.go /src/goroot/src/cmd/cgo/ast_go118.go /src/goroot/src/cmd/cgo/doc.go /src/goroot/src/cmd/cgo/gcc.go /src/goroot/src/cmd/cgo/godefs.go /src/goroot/src/cmd/cgo/main.go /src/goroot/src/cmd/cgo/out.go /src/goroot/src/cmd/cgo/util.go /src/goroot/src/cmd/cgo/zdefaultcc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_cgo '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/cgo fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Found package in /src/goroot/src/cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Unhandled field &ast.MapType{Map:158925, Key:(*ast.Ident)(0xc0001d7da0), Value:(*ast.StarExpr)(0xc0001d8330)} for struct Package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function ParseGo has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function ProcessCgoDirectives has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function Translate has unproduced recv Package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function String has unproduced recv TypeRepr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function Empty has unproduced recv TypeRepr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function Set has unproduced recv TypeRepr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function Pos has unproduced recv Ref
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function IsVar has unproduced recv Name
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function IsConst has unproduced recv Name
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:17 Function Record has unproduced recv Package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_cgo.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_cgo.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/cgo" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/cgo" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/cgo" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_cgo/copy/ast.go fuzz_ng_cmd_cgo/copy/ast_go118.go fuzz_ng_cmd_cgo/copy/doc.go fuzz_ng_cmd_cgo/copy/gcc.go fuzz_ng_cmd_cgo/copy/godefs.go fuzz_ng_cmd_cgo/copy/main.go fuzz_ng_cmd_cgo/copy/out.go fuzz_ng_cmd_cgo/copy/util.go fuzz_ng_cmd_cgo/copy/zdefaultcc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_cgo/copy/ast.go fuzz_ng_cmd_cgo/copy/ast_go118.go fuzz_ng_cmd_cgo/copy/doc.go fuzz_ng_cmd_cgo/copy/gcc.go fuzz_ng_cmd_cgo/copy/godefs.go fuzz_ng_cmd_cgo/copy/main.go fuzz_ng_cmd_cgo/copy/out.go fuzz_ng_cmd_cgo/copy/util.go fuzz_ng_cmd_cgo/copy/zdefaultcc.go /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_cgo/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/cmd/cgo/*_test.go' /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/cgo/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/cgo/testdata /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/cgo/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_cgo/' /src/goroot/src/fuzz_ng_cmd_cgo/ast.go /src/goroot/src/fuzz_ng_cmd_cgo/ast_go118.go /src/goroot/src/fuzz_ng_cmd_cgo/doc.go /src/goroot/src/fuzz_ng_cmd_cgo/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_cgo/gcc.go /src/goroot/src/fuzz_ng_cmd_cgo/godefs.go /src/goroot/src/fuzz_ng_cmd_cgo/main.go /src/goroot/src/fuzz_ng_cmd_cgo/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_cgo/out.go /src/goroot/src/fuzz_ng_cmd_cgo/util.go /src/goroot/src/fuzz_ng_cmd_cgo/zdefaultcc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_cgo/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_cgo/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_cgo /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:28:2: use of internal package cmd/internal/edit not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_cgo_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/swig/swig_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/swig
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/swig/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/swig/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/swig/testdata/callback/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/swig/testdata/callback
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/swig/testdata/stdio/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/swig/testdata/stdio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/plugin_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testplugin/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testplugin/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/common/common.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/common
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/plugin2/plugin2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/plugin2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue24351/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue24351/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue24351
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/plugin1/plugin1.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/plugin1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/iface_i/i.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/iface_i
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/forkexec/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/forkexec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/unnamed1/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/unnamed1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method2/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method2/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/method2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method2/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/method2/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/method
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/unnamed2/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/unnamed2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue19418/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue19418/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue19418
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue53989/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue53989/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue53989
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue53989/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue53989/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/iface/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/iface
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue25756/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue25756
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue25756/plugin/life.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue25756/plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/mangle/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/mangle
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method3/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method3/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/method3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/method3/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/method3/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testplugin/testdata/sub/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testplugin/testdata/sub/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/sub/plugin1/plugin1.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/sub/plugin1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/iface_b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/iface_b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue19534/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue19534/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue19534
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/host/host.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/host
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue44956/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue44956/plugin1.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue44956/plugin2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue44956
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue44956/base/base.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue44956/base
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue52937/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue52937
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue18584/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue18584/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue18584
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/iface_a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/iface_a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue22295.pkg/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue22295.pkg/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue22295.pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue62430/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue62430/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue62430
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue19529/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue19529
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/checkdwarf/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/checkdwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue18676/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue18676/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue18676
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue18676/dynamodbstreamsevt/definition.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue18676/dynamodbstreamsevt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue22175/main.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue22175/plugin1.go /src/goroot/src/cmd/cgo/internal/testplugin/testdata/issue22175/plugin2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/testdata/issue22175
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testplugin/altpath/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testplugin/altpath/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testplugin/altpath/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testplugin/altpath/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/altpath/testdata/common/common.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/altpath/testdata/common
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testplugin/altpath/testdata/plugin-mismatch/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testplugin/altpath/testdata/plugin-mismatch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/shared_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testshared/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testshared/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testshared/testdata/issue47837/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testshared/testdata/issue47837/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue47837/a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue47837/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue47837/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue47837/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/implicitcmd/implicitcmd.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/implicitcmd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/iface_i/i.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/iface_i
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/depBase/dep.go /src/goroot/src/cmd/cgo/internal/testshared/testdata/depBase/gccgo.go /src/goroot/src/cmd/cgo/internal/testshared/testdata/depBase/stubs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/depBase
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/implicit/implicit.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/implicit
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/exe3/exe3.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/exe3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/global/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/global
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/dep3/dep3.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/dep3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/globallib/global.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/globallib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testshared/testdata/gcdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testshared/testdata/gcdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/gcdata/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/gcdata/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/gcdata/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/gcdata/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/iface/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/iface
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue25065/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue25065
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/execgo/exe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/execgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/dep2/dep2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/dep2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testshared/testdata/issue44031/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testshared/testdata/issue44031/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue44031/a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue44031/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue44031/b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue44031/b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue44031/main/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue44031/main
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/exe2/exe2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/exe2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/exe/exe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/exe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/iface_b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/iface_b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testshared/testdata/issue39777/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testshared/testdata/issue39777/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue39777/a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue39777/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue39777/b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue39777/b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue62277/issue62277_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue62277
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue62277/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue62277/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/iface_a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/iface_a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue58966/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue58966
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/trivial/trivial.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/trivial
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/depBaseInternal/dep.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/depBaseInternal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/explicit/explicit.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/explicit
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue30768/x_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue30768
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/issue30768/issue30768lib/lib.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/issue30768/issue30768lib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testshared/testdata/division/division.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testshared/testdata/division
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/teststdio/stdio_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/teststdio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/teststdio/testdata/chain.go /src/goroot/src/cmd/cgo/internal/teststdio/testdata/fib.go /src/goroot/src/cmd/cgo/internal/teststdio/testdata/hello.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/teststdio/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/teststdio/testdata/stdio/file.go /src/goroot/src/cmd/cgo/internal/teststdio/testdata/stdio/stdio.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/teststdio/testdata/stdio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/cgotest/overlaydir.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/cgotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testsanitizers/asan_test.go /src/goroot/src/cmd/cgo/internal/testsanitizers/cc_test.go /src/goroot/src/cmd/cgo/internal/testsanitizers/cshared_test.go /src/goroot/src/cmd/cgo/internal/testsanitizers/empty_test.go /src/goroot/src/cmd/cgo/internal/testsanitizers/libfuzzer_test.go /src/goroot/src/cmd/cgo/internal/testsanitizers/msan_test.go /src/goroot/src/cmd/cgo/internal/testsanitizers/tsan_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testsanitizers
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/arena_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan1_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan2_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan3_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan4_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan5_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_global1_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_global2_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_global3_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_global4_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_global5.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_unsafe_fail1.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_unsafe_fail2.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_unsafe_fail3.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_useAfterReturn.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/libfuzzer1.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/libfuzzer2.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan2.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan2_cmsan.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan3.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan4.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan5.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan6.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan7.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan8.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan_fail.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/msan_shared.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan10.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan11.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan12.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan13.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan14.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan2.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan3.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan4.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan5.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan6.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan7.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan8.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan9.go /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/tsan_shared.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 43 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testsanitizers/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_linkerx/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testsanitizers/testdata/asan_linkerx
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testsanitizers/testdata/asan_linkerx/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testsanitizers/testdata/asan_linkerx/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testerrors/argposition_test.go /src/goroot/src/cmd/cgo/internal/testerrors/badsym_test.go /src/goroot/src/cmd/cgo/internal/testerrors/errors_test.go /src/goroot/src/cmd/cgo/internal/testerrors/ptr_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testerrors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testerrors/testdata/err1.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/err2.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/err4.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/err5.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue11097a.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue11097b.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue14669.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue18452.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue18889.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue28069.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue28721.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue33061.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue42580.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/issue50710.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/long_double_size.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/malloc.go /src/goroot/src/cmd/cgo/internal/testerrors/testdata/notmatchedcfunction.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testerrors/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testnocgo/nocgo.go /src/goroot/src/cmd/cgo/internal/testnocgo/nocgo_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testnocgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testgodefs/testgodefs_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testgodefs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/anonunion.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/bitfields.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/fieldtypedef.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/issue37479.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/issue37621.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/issue38649.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/issue39534.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/issue48396.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/issue8478.go /src/goroot/src/cmd/cgo/internal/testgodefs/testdata/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testgodefs/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testlife/life_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testlife
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testlife/testdata/life.go /src/goroot/src/cmd/cgo/internal/testlife/testdata/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testlife/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/carchive_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testcarchive/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testcarchive/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo3/libgo3.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo8/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo/libgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo2/libgo2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo9/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo9
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo7/sink.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo7
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo4/libgo4.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcarchive/testdata/libgo6/sigprof.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcarchive/testdata/libgo6
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testfortran/fortran_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testfortran
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testfortran/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testfortran/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testfortran/testdata/testprog/fortran.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testfortran/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testfortran/testdata/helloworld/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testfortran/testdata/helloworld/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testso/so_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testso
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testso/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testso/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testso/testdata/sovar/cgoso.go /src/goroot/src/cmd/cgo/internal/testso/testdata/sovar/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testso/testdata/sovar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testso/testdata/so/cgoso.go /src/goroot/src/cmd/cgo/internal/testso/testdata/so/cgoso_unix.go /src/goroot/src/cmd/cgo/internal/testso/testdata/so/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testso/testdata/so
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/backdoor.go /src/goroot/src/cmd/cgo/internal/test/buildid_linux.go /src/goroot/src/cmd/cgo/internal/test/callback.go /src/goroot/src/cmd/cgo/internal/test/callback_windows.go /src/goroot/src/cmd/cgo/internal/test/callstub_linux_ppc64le.go /src/goroot/src/cmd/cgo/internal/test/cgo_linux_test.go /src/goroot/src/cmd/cgo/internal/test/cgo_stubs_android_test.go /src/goroot/src/cmd/cgo/internal/test/cgo_test.go /src/goroot/src/cmd/cgo/internal/test/cgo_thread_lock.go /src/goroot/src/cmd/cgo/internal/test/cgo_unix_test.go /src/goroot/src/cmd/cgo/internal/test/cgo_windows_test.go /src/goroot/src/cmd/cgo/internal/test/gcc68255.go /src/goroot/src/cmd/cgo/internal/test/issue1435.go /src/goroot/src/cmd/cgo/internal/test/issue18146.go /src/goroot/src/cmd/cgo/internal/test/issue20266.go /src/goroot/src/cmd/cgo/internal/test/issue21897.go /src/goroot/src/cmd/cgo/internal/test/issue21897b.go /src/goroot/src/cmd/cgo/internal/test/issue23555.go /src/goroot/src/cmd/cgo/internal/test/i++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ssue24161_darwin_test.go /src/goroot/src/cmd/cgo/internal/test/issue26430.go /src/goroot/src/cmd/cgo/internal/test/issue26743.go /src/goroot/src/cmd/cgo/internal/test/issue27340.go /src/goroot/src/cmd/cgo/internal/test/issue29563.go /src/goroot/src/cmd/cgo/internal/test/issue30527.go /src/goroot/src/cmd/cgo/internal/test/issue4029.go /src/goroot/src/cmd/cgo/internal/test/issue4029w.go /src/goroot/src/cmd/cgo/internal/test/issue41761.go /src/goroot/src/cmd/cgo/internal/test/issue42018.go /src/goroot/src/cmd/cgo/internal/test/issue42018_windows.go /src/goroot/src/cmd/cgo/internal/test/issue42495.go /src/goroot/src/cmd/cgo/internal/test/issue43639.go /src/goroot/src/cmd/cgo/internal/test/issue52611.go /src/goroot/src/cmd/cgo/internal/test/issue6997_linux.go /src/goroot/src/cmd/cgo/internal/test/issue7234_test.go /src/goroot/src/cmd/cgo/internal/test/issue8148.go /src/goroot/src/cmd/cgo/internal/test/issue8517.go /src/goroot/src/cmd/cgo/internal/test/issue8517_windows.go /src/goroot/src/cmd/cgo/internal/test/issue8694.go /src/goroot/src/cmd/cgo/internal/test/issue8756.go /src/goroot/src/cmd/cgo/internal/test/issue8828.go /src/goroot/src/cmd/cgo/internal/test/issue9026.go /src/goroot/src/cmd/cgo/internal/test/issue9400_linux.go /src/goroot/src/cmd/cgo/internal/test/issue9510.go /src/goroot/src/cmd/cgo/internal/test/linux_ppc64le_test.go /src/goroot/src/cmd/cgo/internal/test/setgid2_linux.go /src/goroot/src/cmd/cgo/internal/test/setgid_linux.go /src/goroot/src/cmd/cgo/internal/test/sigaltstack.go /src/goroot/src/cmd/cgo/internal/test/sigprocmask.go /src/goroot/src/cmd/cgo/internal/test/test.go /src/goroot/src/cmd/cgo/internal/test/test26213.go /src/goroot/src/cmd/cgo/internal/test/test_unix.go /src/goroot/src/cmd/cgo/internal/test/test_windows.go /src/goroot/src/cmd/cgo/internal/test/testx.go /src/goroot/src/cmd/cgo/internal/test/typeparam.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 54 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue24161res/restype.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue24161res
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue9510b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue9510b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue24161arg/def.go /src/goroot/src/cmd/cgo/internal/test/issue24161arg/use.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue24161arg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue41761a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue41761a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue52611a/a.go /src/goroot/src/cmd/cgo/internal/test/issue52611a/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue52611a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue24161e0/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue24161e0
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/test/issue20266/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/test/issue20266/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue30527/a.go /src/goroot/src/cmd/cgo/internal/test/issue30527/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue30527
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue8756/issue8756.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue8756
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue9510a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue9510a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue27054/test27054.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue27054
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue43639/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue43639
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue24161e1/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue24161e1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue26430/a.go /src/goroot/src/cmd/cgo/internal/test/issue26430/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue26430
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue8828/trivial.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue8828
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue9026/issue9026.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue9026
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue24161e2/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue24161e2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue23555a/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue23555a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/gcc68255/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/gcc68255
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue26743/a.go /src/goroot/src/cmd/cgo/internal/test/issue26743/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue26743
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue27340/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue27340
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue29563/weak.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue29563
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue52611b/a.go /src/goroot/src/cmd/cgo/internal/test/issue52611b/b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue52611b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue26213/test26213.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue26213
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue23555b/a.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue23555b
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/test/issue9400/gccgo.go /src/goroot/src/cmd/cgo/internal/test/issue9400/stubs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/test/issue9400
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testtls/tls.go /src/goroot/src/cmd/cgo/internal/testtls/tls_none.go /src/goroot/src/cmd/cgo/internal/testtls/tls_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testtls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/cshared_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testcshared/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testcshared/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/p/p.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/p
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cgo/internal/testcshared/testdata/go2c2go/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cgo/internal/testcshared/testdata/go2c2go/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/go2c2go/m2/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/go2c2go/m2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/go2c2go/go/shlib.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/go2c2go/go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/go2c2go/m1/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/go2c2go/m1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/libgo/libgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/libgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/libgo2/dup2.go /src/goroot/src/cmd/cgo/internal/testcshared/testdata/libgo2/dup3.go /src/goroot/src/cmd/cgo/internal/testcshared/testdata/libgo2/libgo2.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/libgo2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/issue36233/issue36233.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/issue36233
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/libgo5/libgo5.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/libgo5
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cgo/internal/testcshared/testdata/libgo4/libgo4.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cgo/internal/testcshared/testdata/libgo4
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/gofmt/doc.go /src/goroot/src/cmd/gofmt/gofmt.go /src/goroot/src/cmd/gofmt/gofmt_test.go /src/goroot/src/cmd/gofmt/gofmt_unix_test.go /src/goroot/src/cmd/gofmt/internal.go /src/goroot/src/cmd/gofmt/long_test.go /src/goroot/src/cmd/gofmt/rewrite.go /src/goroot/src/cmd/gofmt/simplify.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_gofmt '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/gofmt fuzz_ng_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:20 Found package in /src/goroot/src/cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_gofmt.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_gofmt.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/gofmt" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/gofmt" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/gofmt" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_gofmt/copy/doc.go fuzz_ng_cmd_gofmt/copy/gofmt.go fuzz_ng_cmd_gofmt/copy/internal.go fuzz_ng_cmd_gofmt/copy/rewrite.go fuzz_ng_cmd_gofmt/copy/simplify.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_gofmt/copy/doc.go fuzz_ng_cmd_gofmt/copy/gofmt.go fuzz_ng_cmd_gofmt/copy/internal.go fuzz_ng_cmd_gofmt/copy/rewrite.go fuzz_ng_cmd_gofmt/copy/simplify.go /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_gofmt/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/gofmt/gofmt_test.go /src/goroot/src/cmd/gofmt/gofmt_unix_test.go /src/goroot/src/cmd/gofmt/long_test.go /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/gofmt/testdata /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_gofmt/' /src/goroot/src/fuzz_ng_cmd_gofmt/doc.go /src/goroot/src/fuzz_ng_cmd_gofmt/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_gofmt/gofmt.go /src/goroot/src/fuzz_ng_cmd_gofmt/gofmt_test.go /src/goroot/src/fuzz_ng_cmd_gofmt/gofmt_unix_test.go /src/goroot/src/fuzz_ng_cmd_gofmt/internal.go /src/goroot/src/fuzz_ng_cmd_gofmt/long_test.go /src/goroot/src/fuzz_ng_cmd_gofmt/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_gofmt/rewrite.go /src/goroot/src/fuzz_ng_cmd_gofmt/simplify.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_gofmt/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_gofmt/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_gofmt /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package golang.org/x/sync/semaphore
Step #3 - "compile-libfuzzer-coverage-x86_64": go: found golang.org/x/sync/semaphore in golang.org/x/sync v0.5.0
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmd_gofmt [fuzz_ng_cmd_gofmt.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmd_gofmt [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_gofmt/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_gofmt_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/gofmt/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/gofmt/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cover/cfg_test.go /src/goroot/src/cmd/cover/cover.go /src/goroot/src/cmd/cover/cover_test.go /src/goroot/src/cmd/cover/doc.go /src/goroot/src/cmd/cover/export_test.go /src/goroot/src/cmd/cover/func.go /src/goroot/src/cmd/cover/html.go /src/goroot/src/cmd/cover/pkgname_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_cover '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/cover fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:22 Found package in /src/goroot/src/cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:22 Type File is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:22 Type FuncVisitor is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:22 Function Visit has unproduced recv File
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:22 Function Visit has unproduced recv FuncVisitor
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_cover.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_cover.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/cover" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/cover" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/cover" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_cover/copy/cover.go fuzz_ng_cmd_cover/copy/doc.go fuzz_ng_cmd_cover/copy/func.go fuzz_ng_cmd_cover/copy/html.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_cover/copy/cover.go fuzz_ng_cmd_cover/copy/doc.go fuzz_ng_cmd_cover/copy/func.go fuzz_ng_cmd_cover/copy/html.go /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_cover/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/cover/cfg_test.go /src/goroot/src/cmd/cover/cover_test.go /src/goroot/src/cmd/cover/export_test.go /src/goroot/src/cmd/cover/pkgname_test.go /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/cover/testdata /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_cover/' /src/goroot/src/fuzz_ng_cmd_cover/cfg_test.go /src/goroot/src/fuzz_ng_cmd_cover/cover.go /src/goroot/src/fuzz_ng_cmd_cover/cover_test.go /src/goroot/src/fuzz_ng_cmd_cover/doc.go /src/goroot/src/fuzz_ng_cmd_cover/export_test.go /src/goroot/src/fuzz_ng_cmd_cover/func.go /src/goroot/src/fuzz_ng_cmd_cover/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_cover/html.go /src/goroot/src/fuzz_ng_cmd_cover/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_cover/pkgname_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_cover/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_cover/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_cover /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": 	html.go:9:2: use of internal package cmd/internal/browser not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_cover/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_cover_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cover/testdata/directives.go /src/goroot/src/cmd/cover/testdata/main.go /src/goroot/src/cmd/cover/testdata/p.go /src/goroot/src/cmd/cover/testdata/test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cover/testdata/html/html.go /src/goroot/src/cmd/cover/testdata/html/html_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/html
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/cover/testdata/pkgcfg/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/cover/testdata/pkgcfg/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cover/testdata/pkgcfg/a/a.go /src/goroot/src/cmd/cover/testdata/pkgcfg/a/a2.go /src/goroot/src/cmd/cover/testdata/pkgcfg/a/a_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/a
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cover/testdata/pkgcfg/yesFuncsNoTests/yfnt.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/yesFuncsNoTests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/yesFuncsNoTests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/yesFuncsNoTests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/cover/testdata/pkgcfg/noFuncsNoTests/nfnt.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/noFuncsNoTests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/noFuncsNoTests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/cover/testdata/pkgcfg/noFuncsNoTests
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/dist/build.go /src/goroot/src/cmd/dist/build_test.go /src/goroot/src/cmd/dist/buildgo.go /src/goroot/src/cmd/dist/buildruntime.go /src/goroot/src/cmd/dist/buildtag.go /src/goroot/src/cmd/dist/buildtag_test.go /src/goroot/src/cmd/dist/buildtool.go /src/goroot/src/cmd/dist/doc.go /src/goroot/src/cmd/dist/exec.go /src/goroot/src/cmd/dist/imports.go /src/goroot/src/cmd/dist/main.go /src/goroot/src/cmd/dist/notgo120.go /src/goroot/src/cmd/dist/quoted.go /src/goroot/src/cmd/dist/supported_test.go /src/goroot/src/cmd/dist/sys_default.go /src/goroot/src/cmd/dist/sys_windows.go /src/goroot/src/cmd/dist/test.go /src/goroot/src/cmd/dist/testjson.go /src/goroot/src/cmd/dist/testjson_test.go /src/goroot/src/cmd/dist/util.go /src/goroot/src/cmd/dist/util_gc.go /src/goroot/src/cmd/dist/util_gccgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 22 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_dist '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/dist fuzz_ng_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:24 Found package in /src/goroot/src/cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_dist.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_dist.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/dist" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/dist" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/dist" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_dist/copy/build.go fuzz_ng_cmd_dist/copy/buildgo.go fuzz_ng_cmd_dist/copy/buildruntime.go fuzz_ng_cmd_dist/copy/buildtag.go fuzz_ng_cmd_dist/copy/buildtool.go fuzz_ng_cmd_dist/copy/doc.go fuzz_ng_cmd_dist/copy/exec.go fuzz_ng_cmd_dist/copy/imports.go fuzz_ng_cmd_dist/copy/main.go fuzz_ng_cmd_dist/copy/quoted.go fuzz_ng_cmd_dist/copy/sys_default.go fuzz_ng_cmd_dist/copy/test.go fuzz_ng_cmd_dist/copy/testjson.go fuzz_ng_cmd_dist/copy/util.go fuzz_ng_cmd_dist/copy/util_gc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_dist/copy/build.go fuzz_ng_cmd_dist/copy/buildgo.go fuzz_ng_cmd_dist/copy/buildruntime.go fuzz_ng_cmd_dist/copy/buildtag.go fuzz_ng_cmd_dist/copy/buildtool.go fuzz_ng_cmd_dist/copy/doc.go fuzz_ng_cmd_dist/copy/exec.go fuzz_ng_cmd_dist/copy/imports.go fuzz_ng_cmd_dist/copy/main.go fuzz_ng_cmd_dist/copy/quoted.go fuzz_ng_cmd_dist/copy/sys_default.go fuzz_ng_cmd_dist/copy/test.go fuzz_ng_cmd_dist/copy/testjson.go fuzz_ng_cmd_dist/copy/util.go fuzz_ng_cmd_dist/copy/util_gc.go /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_dist/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/dist/build_test.go /src/goroot/src/cmd/dist/buildtag_test.go /src/goroot/src/cmd/dist/supported_test.go /src/goroot/src/cmd/dist/testjson_test.go /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/dist/testdata /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/dist/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_dist/' /src/goroot/src/fuzz_ng_cmd_dist/build.go /src/goroot/src/fuzz_ng_cmd_dist/build_test.go /src/goroot/src/fuzz_ng_cmd_dist/buildgo.go /src/goroot/src/fuzz_ng_cmd_dist/buildruntime.go /src/goroot/src/fuzz_ng_cmd_dist/buildtag.go /src/goroot/src/fuzz_ng_cmd_dist/buildtag_test.go /src/goroot/src/fuzz_ng_cmd_dist/buildtool.go /src/goroot/src/fuzz_ng_cmd_dist/doc.go /src/goroot/src/fuzz_ng_cmd_dist/exec.go /src/goroot/src/fuzz_ng_cmd_dist/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_dist/imports.go /src/goroot/src/fuzz_ng_cmd_dist/main.go /src/goroot/src/fuzz_ng_cmd_dist/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_dist/quoted.go /src/goroot/src/fuzz_ng_cmd_dist/supported_test.go /src/goroot/src/fuzz_ng_cmd_dist/sys_default.go /src/goroot/src/fuzz_ng_cmd_dist/test.go /src/goroot/src/fuzz_ng_cmd_dist/testjson.go /src/goroot/src/fuzz_ng_cmd_dist/testjson_test.go /src/goroot/src/fuzz_ng_cmd_dist/util.go /src/goroot/src/fuzz_ng_cmd_dist/util_gc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_dist/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_dist/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_dist /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmd_dist [fuzz_ng_cmd_dist.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmd_dist [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_dist/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_dist_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/asm/doc.go /src/goroot/src/cmd/asm/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_asm '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/asm fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:26 Found package in /src/goroot/src/cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_asm.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_asm.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/asm" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/asm" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/asm" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_asm/copy/doc.go fuzz_ng_cmd_asm/copy/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_asm/copy/doc.go fuzz_ng_cmd_asm/copy/main.go /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_asm/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/cmd/asm/*_test.go' /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/asm/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/asm/testdata /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/asm/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_asm/' /src/goroot/src/fuzz_ng_cmd_asm/doc.go /src/goroot/src/fuzz_ng_cmd_asm/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_asm/main.go /src/goroot/src/fuzz_ng_cmd_asm/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_asm/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_asm/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_asm /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": 	main.go:15:2: use of internal package cmd/asm/internal/arch not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_asm/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_asm_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/asm/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/asm/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/asm/internal/lex/input.go /src/goroot/src/cmd/asm/internal/lex/lex.go /src/goroot/src/cmd/asm/internal/lex/lex_test.go /src/goroot/src/cmd/asm/internal/lex/slice.go /src/goroot/src/cmd/asm/internal/lex/stack.go /src/goroot/src/cmd/asm/internal/lex/tokenizer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm/internal/lex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/asm/internal/arch/arch.go /src/goroot/src/cmd/asm/internal/arch/arm.go /src/goroot/src/cmd/asm/internal/arch/arm64.go /src/goroot/src/cmd/asm/internal/arch/loong64.go /src/goroot/src/cmd/asm/internal/arch/mips.go /src/goroot/src/cmd/asm/internal/arch/ppc64.go /src/goroot/src/cmd/asm/internal/arch/riscv64.go /src/goroot/src/cmd/asm/internal/arch/s390x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm/internal/arch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/asm/internal/flags/flags.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm/internal/flags
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/asm/internal/asm/asm.go /src/goroot/src/cmd/asm/internal/asm/endtoend_test.go /src/goroot/src/cmd/asm/internal/asm/expr_test.go /src/goroot/src/cmd/asm/internal/asm/line_test.go /src/goroot/src/cmd/asm/internal/asm/operand_test.go /src/goroot/src/cmd/asm/internal/asm/parse.go /src/goroot/src/cmd/asm/internal/asm/pseudo_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/asm/internal/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/asm/internal/asm/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/asm/internal/asm/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/cmd/asm/internal/asm/testdata/avx512enc/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/cmd/asm/internal/asm/testdata/avx512enc/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmd/fix/buildtag.go /src/goroot/src/cmd/fix/buildtag_test.go /src/goroot/src/cmd/fix/cftype.go /src/goroot/src/cmd/fix/cftype_test.go /src/goroot/src/cmd/fix/context.go /src/goroot/src/cmd/fix/context_test.go /src/goroot/src/cmd/fix/doc.go /src/goroot/src/cmd/fix/egltype.go /src/goroot/src/cmd/fix/egltype_test.go /src/goroot/src/cmd/fix/fix.go /src/goroot/src/cmd/fix/gotypes.go /src/goroot/src/cmd/fix/gotypes_test.go /src/goroot/src/cmd/fix/import_test.go /src/goroot/src/cmd/fix/jnitype.go /src/goroot/src/cmd/fix/jnitype_test.go /src/goroot/src/cmd/fix/main.go /src/goroot/src/cmd/fix/main_test.go /src/goroot/src/cmd/fix/netipv6zone.go /src/goroot/src/cmd/fix/netipv6zone_test.go /src/goroot/src/cmd/fix/printerconfig.go /src/goroot/src/cmd/fix/printerconfig_test.go /src/goroot/src/cmd/fix/typecheck.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 22 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmd_fix '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmd/fix fuzz_ng_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:28 Found package in /src/goroot/src/cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmd_fix.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmd_fix.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/fix" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: .@*: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/fuzz_ng_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/fix" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": go: malformed module path ".": is a local import path
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng.go:10:2: import "cmd/fix" is a program, not an importable package
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmd_fix/copy/buildtag.go fuzz_ng_cmd_fix/copy/cftype.go fuzz_ng_cmd_fix/copy/context.go fuzz_ng_cmd_fix/copy/doc.go fuzz_ng_cmd_fix/copy/egltype.go fuzz_ng_cmd_fix/copy/fix.go fuzz_ng_cmd_fix/copy/gotypes.go fuzz_ng_cmd_fix/copy/jnitype.go fuzz_ng_cmd_fix/copy/main.go fuzz_ng_cmd_fix/copy/netipv6zone.go fuzz_ng_cmd_fix/copy/printerconfig.go fuzz_ng_cmd_fix/copy/typecheck.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_fix/copy/buildtag.go fuzz_ng_cmd_fix/copy/cftype.go fuzz_ng_cmd_fix/copy/context.go fuzz_ng_cmd_fix/copy/doc.go fuzz_ng_cmd_fix/copy/egltype.go fuzz_ng_cmd_fix/copy/fix.go fuzz_ng_cmd_fix/copy/gotypes.go fuzz_ng_cmd_fix/copy/jnitype.go fuzz_ng_cmd_fix/copy/main.go fuzz_ng_cmd_fix/copy/netipv6zone.go fuzz_ng_cmd_fix/copy/printerconfig.go fuzz_ng_cmd_fix/copy/typecheck.go /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmd_fix/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmd/fix/buildtag_test.go /src/goroot/src/cmd/fix/cftype_test.go /src/goroot/src/cmd/fix/context_test.go /src/goroot/src/cmd/fix/egltype_test.go /src/goroot/src/cmd/fix/gotypes_test.go /src/goroot/src/cmd/fix/import_test.go /src/goroot/src/cmd/fix/jnitype_test.go /src/goroot/src/cmd/fix/main_test.go /src/goroot/src/cmd/fix/netipv6zone_test.go /src/goroot/src/cmd/fix/printerconfig_test.go /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmd/fix/testdata /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmd/fix/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmd_fix/' /src/goroot/src/fuzz_ng_cmd_fix/buildtag.go /src/goroot/src/fuzz_ng_cmd_fix/buildtag_test.go /src/goroot/src/fuzz_ng_cmd_fix/cftype.go /src/goroot/src/fuzz_ng_cmd_fix/cftype_test.go /src/goroot/src/fuzz_ng_cmd_fix/context.go /src/goroot/src/fuzz_ng_cmd_fix/context_test.go /src/goroot/src/fuzz_ng_cmd_fix/doc.go /src/goroot/src/fuzz_ng_cmd_fix/egltype.go /src/goroot/src/fuzz_ng_cmd_fix/egltype_test.go /src/goroot/src/fuzz_ng_cmd_fix/fix.go /src/goroot/src/fuzz_ng_cmd_fix/fuzz_ng.go /src/goroot/src/fuzz_ng_cmd_fix/gotypes.go /src/goroot/src/fuzz_ng_cmd_fix/gotypes_test.go /src/goroot/src/fuzz_ng_cmd_fix/import_test.go /src/goroot/src/fuzz_ng_cmd_fix/jnitype.go /src/goroot/src/fuzz_ng_cmd_fix/jnitype_test.go /src/goroot/src/fuzz_ng_cmd_fix/main.go /src/goroot/src/fuzz_ng_cmd_fix/main_test.go /src/goroot/src/fuzz_ng_cmd_fix/netipv6zone.go /src/goroot/src/fuzz_ng_cmd_fix/netipv6zone_test.go /src/goroot/src/fuzz_ng_cmd_fix/ngolo_helper.go /src/goroot/src/fuzz_ng_cmd_fix/printerconfig.go /src/goroot/src/fuzz_ng_cmd_fix/printerconfig_test.go /src/goroot/src/fuzz_ng_cmd_fix/typecheck.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_fix/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmd_fix/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmd_fix /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmd_fix [fuzz_ng_cmd_fix.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmd_fix [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmd_fix/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmd_fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmd_fix_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/flag/example_func_test.go /src/goroot/src/flag/example_test.go /src/goroot/src/flag/example_textvar_test.go /src/goroot/src/flag/example_value_test.go /src/goroot/src/flag/export_test.go /src/goroot/src/flag/flag.go /src/goroot/src/flag/flag_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^flag '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing flag fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Found package in /src/goroot/src/flag
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Type Value is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:11937, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c1410), Results:(*ast.FieldList)(nil)} for FlagSetNgdotVisitAll
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:12163, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c1500), Results:(*ast.FieldList)(nil)} for VisitAll
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:12357, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c15f0), Results:(*ast.FieldList)(nil)} for FlagSetNgdotVisit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:12583, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c16e0), Results:(*ast.FieldList)(nil)} for Visit
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function BoolVar has unproduced argument bool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function BoolVar has unproduced argument bool
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function IntVar has unproduced argument int
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function IntVar has unproduced argument int
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Int64Var has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Int64Var has unproduced argument int64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function UintVar has unproduced argument uint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function UintVar has unproduced argument uint
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Uint64Var has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Uint64Var has unproduced argument uint64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function StringVar has unproduced argument string
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function StringVar has unproduced argument string
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Float64Var has unproduced argument float64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Float64Var has unproduced argument float64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function DurationVar has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function DurationVar has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function DurationVar has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function DurationVar has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Duration has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Duration has unproduced argument time.Duration
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function TextVar has unproduced argument encoding.TextUnmarshaler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function TextVar has unproduced argument encoding.TextMarshaler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function TextVar has unproduced argument encoding.TextUnmarshaler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function TextVar has unproduced argument encoding.TextMarshaler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:32753, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001ed680), Results:(*ast.FieldList)(0xc0001ed6b0)} for FlagSetNgdotFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:33067, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001ed7a0), Results:(*ast.FieldList)(0xc0001ed7d0)} for Func
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:33427, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001ed8f0), Results:(*ast.FieldList)(0xc0001ed920)} for FlagSetNgdotBoolFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Unhandled argument &ast.FuncType{Func:33778, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001eda10), Results:(*ast.FieldList)(0xc0001eda40)} for BoolFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Var has unproduced argument Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:31 Function Var has unproduced argument Value
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/flag.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/flag.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo flag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module flag: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_flag [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_flag.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:352:9: undefined: NgoloFuzzOne_String
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:554:9: undefined: NgoloFuzzOne_String
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_flag/copy/flag.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_flag/copy/flag.go /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_flag/fuzz_ng.go fuzz_ng_flag/fuzzng_unsure_test.go fuzz_ng_flag/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/flag/example_func_test.go /src/goroot/src/flag/example_test.go /src/goroot/src/flag/example_textvar_test.go /src/goroot/src/flag/example_value_test.go /src/goroot/src/flag/export_test.go /src/goroot/src/flag/flag_test.go /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/flag/testdata /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/flag/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_flag/' /src/goroot/src/fuzz_ng_flag/example_func_test.go /src/goroot/src/fuzz_ng_flag/example_test.go /src/goroot/src/fuzz_ng_flag/example_textvar_test.go /src/goroot/src/fuzz_ng_flag/example_value_test.go /src/goroot/src/fuzz_ng_flag/export_test.go /src/goroot/src/fuzz_ng_flag/flag.go /src/goroot/src/fuzz_ng_flag/flag_test.go /src/goroot/src/fuzz_ng_flag/fuzz_ng.go /src/goroot/src/fuzz_ng_flag/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_flag/ngolo_helper.go /src/goroot/src/fuzz_ng_flag/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_flag/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_flag/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_flag /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_flag [fuzz_ng_flag.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:379:2: ContinueOnError already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:379:2: other declaration of ContinueOnError
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:380:2: ExitOnError already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:380:2: other declaration of ExitOnError
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:381:2: PanicOnError already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:381:2: other declaration of PanicOnError
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:570:6: UnquoteUsage already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:568:6: other declaration of UnquoteUsage
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:681:6: PrintDefaults already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:679:6: other declaration of PrintDefaults
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:732:6: Arg already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:730:6: other declaration of Arg
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:746:6: Args already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:744:6: other declaration of Args
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:835:6: UintVar already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:832:6: other declaration of UintVar
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:902:6: String already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:898:6: other declaration of String
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:1005:6: BoolFunc already declared through dot-import of package flag ("flag")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/flag/flag.go:1000:6: other declaration of BoolFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./flag.go:570:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_flag [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_flag/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_flag_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo flag
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/text/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/text/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/text/transform/transform.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/transform
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/transform
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/text/secure/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/text/secure/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/text/secure/bidirule/bidirule.go /src/goroot/src/vendor/golang.org/x/text/secure/bidirule/bidirule10.0.0.go /src/goroot/src/vendor/golang.org/x/text/secure/bidirule/bidirule9.0.0.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/secure/bidirule
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/secure/bidirule
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/text/unicode/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/text/unicode/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/bidi.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/bracket.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/core.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/prop.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/tables10.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/tables11.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/tables12.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/tables13.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/tables15.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/tables9.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/bidi/trieval.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/unicode/bidi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/unicode/bidi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/text/unicode/norm/composition.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/forminfo.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/input.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/iter.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/normalize.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/readwriter.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/tables10.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/tables11.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/tables12.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/tables13.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/tables15.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/tables9.0.0.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/transform.go /src/goroot/src/vendor/golang.org/x/text/unicode/norm/trie.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/unicode/norm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/text/unicode/norm
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/crypto/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/crypto/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/chacha20/chacha_arm64.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20/chacha_generic.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20/chacha_noasm.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20/chacha_ppc64le.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20/chacha_s390x.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20/xor.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/chacha20
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/chacha20
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/chacha20poly1305/chacha20poly1305.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20poly1305/chacha20poly1305_amd64.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20poly1305/chacha20poly1305_generic.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20poly1305/chacha20poly1305_noasm.go /src/goroot/src/vendor/golang.org/x/crypto/chacha20poly1305/xchacha20poly1305.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/chacha20poly1305
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/chacha20poly1305
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/cryptobyte/asn1.go /src/goroot/src/vendor/golang.org/x/crypto/cryptobyte/builder.go /src/goroot/src/vendor/golang.org/x/crypto/cryptobyte/string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/cryptobyte
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/cryptobyte
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/cryptobyte/asn1/asn1.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/cryptobyte/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/cryptobyte/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/hkdf/hkdf.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/hkdf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/hkdf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/crypto/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/crypto/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/internal/alias/alias.go /src/goroot/src/vendor/golang.org/x/crypto/internal/alias/alias_purego.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/internal/alias
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/bits_compat.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/bits_go1.13.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/mac_noasm.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/poly1305.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/sum_amd64.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/sum_generic.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/sum_ppc64le.go /src/goroot/src/vendor/golang.org/x/crypto/internal/poly1305/sum_s390x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/crypto/internal/poly1305
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/sys/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/sys/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/sys/cpu/byteorder.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_aix.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_arm.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_gc_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_gc_s390x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_gc_x86.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_gccgo_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_gccgo_s390x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_gccgo_x86.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux_arm.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux_mips64x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux_noinit.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux_ppc64x.go /src++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": /goroot/src/vendor/golang.org/x/sys/cpu/cpu_linux_s390x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_loong64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_mips64x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_mipsx.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_netbsd_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_openbsd_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_other_arm.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_other_arm64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_other_mips64x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_other_ppc64x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_other_riscv64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_ppc64x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_riscv64.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_s390x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_wasm.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_x86.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_zos.go /src/goroot/src/vendor/golang.org/x/sys/cpu/cpu_zos_s390x.go /src/goroot/src/vendor/golang.org/x/sys/cpu/endian_big.go /src/goroot/src/vendor/golang.org/x/sys/cpu/endian_little.go /src/goroot/src/vendor/golang.org/x/sys/cpu/hwcap_linux.go /src/goroot/src/vendor/golang.org/x/sys/cpu/parse.go /src/goroot/src/vendor/golang.org/x/sys/cpu/proc_cpuinfo_linux.go /src/goroot/src/vendor/golang.org/x/sys/cpu/runtime_auxv.go /src/goroot/src/vendor/golang.org/x/sys/cpu/runtime_auxv_go121.go /src/goroot/src/vendor/golang.org/x/sys/cpu/syscall_aix_gccgo.go /src/goroot/src/vendor/golang.org/x/sys/cpu/syscall_aix_ppc64_gc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 44 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/sys/cpu
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/sys/cpu
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/net/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/net/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/net/dns/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/net/dns/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/dns/dnsmessage/message.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/dns/dnsmessage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/dns/dnsmessage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/net/http/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/net/http/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/http/httpproxy/proxy.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/http/httpproxy
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/http/httpproxy
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/http/httpguts/guts.go /src/goroot/src/vendor/golang.org/x/net/http/httpguts/httplex.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/http/httpguts
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/http/httpguts
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/idna/go118.go /src/goroot/src/vendor/golang.org/x/net/idna/idna10.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/idna9.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/pre_go118.go /src/goroot/src/vendor/golang.org/x/net/idna/punycode.go /src/goroot/src/vendor/golang.org/x/net/idna/tables10.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/tables11.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/tables12.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/tables13.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/tables15.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/tables9.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/trie.go /src/goroot/src/vendor/golang.org/x/net/idna/trie12.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/trie13.0.0.go /src/goroot/src/vendor/golang.org/x/net/idna/trieval.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 15 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/idna
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/idna
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/nettest/conntest.go /src/goroot/src/vendor/golang.org/x/net/nettest/nettest.go /src/goroot/src/vendor/golang.org/x/net/nettest/nettest_stub.go /src/goroot/src/vendor/golang.org/x/net/nettest/nettest_unix.go /src/goroot/src/vendor/golang.org/x/net/nettest/nettest_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/nettest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/nettest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/lif/address.go /src/goroot/src/vendor/golang.org/x/net/lif/binary.go /src/goroot/src/vendor/golang.org/x/net/lif/lif.go /src/goroot/src/vendor/golang.org/x/net/lif/link.go /src/goroot/src/vendor/golang.org/x/net/lif/sys.go /src/goroot/src/vendor/golang.org/x/net/lif/syscall.go /src/goroot/src/vendor/golang.org/x/net/lif/zsys_solaris_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/lif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/lif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/route/address.go /src/goroot/src/vendor/golang.org/x/net/route/binary.go /src/goroot/src/vendor/golang.org/x/net/route/interface.go /src/goroot/src/vendor/golang.org/x/net/route/interface_announce.go /src/goroot/src/vendor/golang.org/x/net/route/interface_classic.go /src/goroot/src/vendor/golang.org/x/net/route/interface_freebsd.go /src/goroot/src/vendor/golang.org/x/net/route/interface_multicast.go /src/goroot/src/vendor/golang.org/x/net/route/interface_openbsd.go /src/goroot/src/vendor/golang.org/x/net/route/message.go /src/goroot/src/vendor/golang.org/x/net/route/route.go /src/goroot/src/vendor/golang.org/x/net/route/route_classic.go /src/goroot/src/vendor/golang.org/x/net/route/route_openbsd.go /src/goroot/src/vendor/golang.org/x/net/route/sys.go /src/goroot/src/vendor/golang.org/x/net/route/sys_darwin.go /src/goroot/src/vendor/golang.org/x/net/route/sys_dragonfly.go /src/goroot/src/vendor/golang.org/x/net/route/sys_freebsd.go /src/goroot/src/vendor/golang.org/x/net/route/sys_netbsd.go /src/goroot/src/vendor/golang.org/x/net/route/sys_openbsd.go /src/goroot/src/vendor/golang.org/x/net/route/syscall.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_darwin.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_dragonfly.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_freebsd_386.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_freebsd_amd64.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_freebsd_arm.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_freebsd_arm64.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_freebsd_riscv64.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_netbsd.go /src/goroot/src/vendor/golang.org/x/net/route/zsys_openbsd.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 28 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/route
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/route
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/vendor/golang.org/x/net/http2/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/vendor/golang.org/x/net/http2/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/vendor/golang.org/x/net/http2/hpack/encode.go /src/goroot/src/vendor/golang.org/x/net/http2/hpack/hpack.go /src/goroot/src/vendor/golang.org/x/net/http2/hpack/huffman.go /src/goroot/src/vendor/golang.org/x/net/http2/hpack/static_table.go /src/goroot/src/vendor/golang.org/x/net/http2/hpack/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/http2/hpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo vendor/golang.org/x/net/http2/hpack
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/os/dir.go /src/goroot/src/os/dir_darwin.go /src/goroot/src/os/dir_plan9.go /src/goroot/src/os/dir_unix.go /src/goroot/src/os/dir_windows.go /src/goroot/src/os/dirent_aix.go /src/goroot/src/os/dirent_dragonfly.go /src/goroot/src/os/dirent_freebsd.go /src/goroot/src/os/dirent_js.go /src/goroot/src/os/dirent_linux.go /src/goroot/src/os/dirent_netbsd.go /src/goroot/src/os/dirent_openbsd.go /src/goroot/src/os/dirent_solaris.go /src/goroot/src/os/dirent_wasip1.go /src/goroot/src/os/endian_big.go /src/goroot/src/os/endian_little.go /src/goroot/src/os/env.go /src/goroot/src/os/env_test.go /src/goroot/src/os/env_unix_test.go /src/goroot/src/os/error.go /src/goroot/src/os/error_errno.go /src/goroot/src/os/error_plan9.go /src/goroot/src/os/error_posix.go /src/goroot/src/os/error_test.go /src/goroot/src/os/error_unix_test.go /src/goroot/src/os/error_windows_test.go /src/goroot/src/os/example_test.go /src/goroot/src/os/exec.go /src/goroot/src/os/exec_plan9.go /src/goroot/src/os/exec_posix.go /src/goroot/src/os/exec_unix.go /src/goroot/src/os/exec_unix_test.go /src/goroot/src/os/exec_windows.go /src/goroot/src/os/exec_windows_test.go /src/goroot/src/os/executable.go /src/goroot/src/os/executable_darwin.go /src/goroot/src/os/executable_dragonfly.go /src/goroot/src/os/executable_freebsd.go /src/goroot/src/os/executable_path.go /src/goroot/src/os/executable_plan9.go /src/goroot/src/os/executable_procfs.go /src/goroot/src/os/executable_solaris.go /src/goroot/src/os/executable_sysctl.go /src/goroot/src/os/executable_test.go /src/goroot/src/os/executable_wasm.go /src/goroot/src/os/executable_windows.go /src/goroot/src/os/export_linux_test.go /src/goroot/src/os/export_test.go /src/goroot/src/os/export_unix_test.go /src/goroot/src/os/export_windows_test.go /src/goroot/src/os/fifo_test.go /src/goroot/src/os/file.go /src/goroot/src/os/file_mutex_plan9.go /src/goroot/src/os/file_open_unix.go /src/goroot/src/os/file_open_wasip1.go /src/goroot/src/os/file_plan9.go /src/goroot/src/os/file_posix.go /src/goroot/src/os/file_unix.go /src/goroot/src/os/file_wasip1.go /src/goroot/src/os/file_windows.go /src/goroot/src/os/getwd.go /src/goroot/src/os/os_test.go /src/goroot/src/os/os_unix_test.go /src/goroot/src/os/os_windows_test.go /src/goroot/src/os/path.go /src/goroot/src/os/path_plan9.go /src/goroot/src/os/path_test.go /src/goroot/src/os/path_unix.go /src/goroot/src/os/path_windows.go /src/goroot/src/os/path_windows_test.go /src/goroot/src/os/pipe2_unix.go /src/goroot/src/os/pipe_test.go /src/goroot/src/os/pipe_unix.go /src/goroot/src/os/pipe_wasm.go /src/goroot/src/os/proc.go /src/goroot/src/os/rawconn.go /src/goroot/src/os/rawconn_test.go /src/goroot/src/os/read_test.go /src/goroot/src/os/readfrom_linux_test.go /src/goroot/src/os/removeall_at.go /src/goroot/src/os/removeall_noat.go /src/goroot/src/os/removeall_test.go /src/goroot/src/os/stat.go /src/goroot/src/os/stat_aix.go /src/goroot/src/os/stat_darwin.go /src/goroot/src/os/stat_dragonfly.go /src/goroot/src/os/stat_freebsd.go /src/goroot/src/os/stat_js.go /src/goroot/src/os/stat_linux.go /src/goroot/src/os/stat_netbsd.go /src/goroot/src/os/stat_openbsd.go /src/goroot/src/os/stat_plan9.go /src/goroot/src/os/stat_solaris.go /src/goroot/src/os/stat_test.go /src/goroot/src/os/stat_unix.go /src/goroot/src/os/stat_wasip1.go /src/goroot/src/os/stat_windows.go /src/goroot/src/os/sticky_bsd.go /src/goroot/src/os/sticky_notbsd.go /src/goroot/src/os/sys.go /src/goroot/src/os/sys_aix.go /src/goroot/src/os/sys_bsd.go /src/goroot/src/os/sys_js.go /src/goroot/src/os/sys_linux.go /src/goroot/src/os/sys_plan9.go /src/goroot/src/os/sys_solaris.go /src/goroot/src/os/sys_unix.go /src/goroot/src/os/sys_wasip1.go /src/goroot/src/os/sys_windows.go /src/goroot/src/os/tempfile.go /src/goroot/src/os/tempfile_test.go /src/goroot/src/os/timeout_test.go /src/goroot/src/os/types.go /src/goroot/src/os/types_plan9.go /src/goroot/src/os/types_unix.go /src/goroot/src/os/types_windows.go /src/goroot/src/os/wait6_dragonfly.go /src/goroot/src/os/wait6_freebsd64.go /src/goroot/src/os/wait6_freebsd_386.go /src/goroot/src/os/wait6_freebsd_arm.go /src/goroot/src/os/wait6_netbsd.go /src/goroot/src/os/wait_unimp.go /src/goroot/src/os/wait_wait6.go /src/goroot/src/os/wait_waitid.go /src/goroot/src/os/writeto_linux_test.go /src/goroot/src/os/zero_copy_linux.go /src/goroot/src/os/zero_copy_stub.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 127 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package os
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^os '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing os fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Found package in /src/goroot/src/os
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for FileInfo is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for DirEntry is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for DirEntry is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Array result for int is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Type FileMode is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Type SyscallError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Type Signal is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Type LinkError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Unhandled argument &ast.FuncType{Func:35467, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001b9e30), Results:(*ast.FieldList)(0xc0001b9e60)} for Expand
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Error has unproduced recv SyscallError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Unwrap has unproduced recv SyscallError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Timeout has unproduced recv SyscallError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function NewSyscallError has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function IsExist has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function IsNotExist has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function IsPermission has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function IsTimeout has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function StartProcess has unproduced argument ProcAttr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Signal has unproduced argument Signal
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Error has unproduced recv LinkError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Unwrap has unproduced recv LinkError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Mkdir has unproduced argument FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function OpenFile has unproduced argument FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Chmod has unproduced argument FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Chmod has unproduced argument FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function SetDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function SetReadDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function SetWriteDeadline has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function WriteFile has unproduced argument FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Chtimes has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function Chtimes has unproduced argument time.Time
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function NewFile has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:38 Function MkdirAll has unproduced argument FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/os.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/os.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": protoc-gen-go: invalid FileDescriptorProto "ngolofuzz.proto": proto: message "ngolofuzz.NgoloFuzzOne" using proto3 semantics has conflict: "FileNgdotReadDir" with "FileNgdotReaddir"
Step #3 - "compile-libfuzzer-coverage-x86_64": --go_out: protoc-gen-go: Plugin failed with status code 1.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": In file included from cpp/ngolofuzz.pb.cc:4:
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11627:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11591:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11629:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool _internal_has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11593:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool _internal_has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11632:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   void clear_filengdotreaddir() ;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11596:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   void clear_filengdotreaddir() ;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11633:44: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReadDirArgs& filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11597:44: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReaddirArgs& filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11634:57: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   PROTOBUF_NODISCARD ::ngolofuzz::FileNgdotReadDirArgs* release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11598:57: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   PROTOBUF_NODISCARD ::ngolofuzz::FileNgdotReaddirArgs* release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11635:38: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReadDirArgs* mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11599:38: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReaddirArgs* mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11638:44: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReadDirArgs& _internal_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11602:44: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReaddirArgs& _internal_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11639:38: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReadDirArgs* _internal_mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11603:38: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReaddirArgs* _internal_mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11643:38: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReadDirArgs* unsafe_arena_release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11607:38: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReaddirArgs* unsafe_arena_release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:13001:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   void set_has_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:12999:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   void set_has_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:13090:42: error: duplicate member 'filengdotreaddir_'
Step #3 - "compile-libfuzzer-coverage-x86_64":       ::ngolofuzz::FileNgdotReadDirArgs* filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                          ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:13088:42: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":       ::ngolofuzz::FileNgdotReaddirArgs* filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                          ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11484:44: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":   int GetCachedSize() const final { return _impl_._cached_size_.Get(); }
Step #3 - "compile-libfuzzer-coverage-x86_64":                                            ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16010:3: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":   _impl_._oneof_case_[0] = kFileNgdotReaddir;
Step #3 - "compile-libfuzzer-coverage-x86_64":   ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16015:14: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":       delete _impl_.item_.filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":              ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16024:47: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     ::ngolofuzz::FileNgdotReaddirArgs* temp = _impl_.item_.filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                               ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16028:5: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     _impl_.item_.filengdotreaddir_ = nullptr;
Step #3 - "compile-libfuzzer-coverage-x86_64":     ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16036:10: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":       ? *_impl_.item_.filengdotreaddir_
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16047:47: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     ::ngolofuzz::FileNgdotReaddirArgs* temp = _impl_.item_.filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                               ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16048:5: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     _impl_.item_.filengdotreaddir_ = nullptr;
Step #3 - "compile-libfuzzer-coverage-x86_64":     ^
Step #3 - "compile-libfuzzer-coverage-x86_64": fatal error: too many errors emitted, stopping now [-ferror-limit=]
Step #3 - "compile-libfuzzer-coverage-x86_64": 20 errors generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": In file included from /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11627:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11591:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11629:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool _internal_has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11593:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   bool _internal_has_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11632:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   void clear_filengdotreaddir() ;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11596:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   void clear_filengdotreaddir() ;
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11633:44: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReadDirArgs& filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11597:44: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReaddirArgs& filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11634:57: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   PROTOBUF_NODISCARD ::ngolofuzz::FileNgdotReadDirArgs* release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11598:57: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   PROTOBUF_NODISCARD ::ngolofuzz::FileNgdotReaddirArgs* release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11635:38: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReadDirArgs* mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11599:38: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReaddirArgs* mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11638:44: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReadDirArgs& _internal_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11602:44: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   const ::ngolofuzz::FileNgdotReaddirArgs& _internal_filengdotreaddir() const;
Step #3 - "compile-libfuzzer-coverage-x86_64":         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11639:38: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReadDirArgs* _internal_mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11603:38: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReaddirArgs* _internal_mutable_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11643:38: error: functions that differ only in their return type cannot be overloaded
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReadDirArgs* unsafe_arena_release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11607:38: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   ::ngolofuzz::FileNgdotReaddirArgs* unsafe_arena_release_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:13001:8: error: class member cannot be redeclared
Step #3 - "compile-libfuzzer-coverage-x86_64":   void set_has_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:12999:8: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":   void set_has_filengdotreaddir();
Step #3 - "compile-libfuzzer-coverage-x86_64":        ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:13090:42: error: duplicate member 'filengdotreaddir_'
Step #3 - "compile-libfuzzer-coverage-x86_64":       ::ngolofuzz::FileNgdotReadDirArgs* filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                          ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:13088:42: note: previous declaration is here
Step #3 - "compile-libfuzzer-coverage-x86_64":       ::ngolofuzz::FileNgdotReaddirArgs* filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                          ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:11484:44: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":   int GetCachedSize() const final { return _impl_._cached_size_.Get(); }
Step #3 - "compile-libfuzzer-coverage-x86_64":                                            ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16010:3: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":   _impl_._oneof_case_[0] = kFileNgdotReaddir;
Step #3 - "compile-libfuzzer-coverage-x86_64":   ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16015:14: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":       delete _impl_.item_.filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":              ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16024:47: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     ::ngolofuzz::FileNgdotReaddirArgs* temp = _impl_.item_.filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                               ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16028:5: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     _impl_.item_.filengdotreaddir_ = nullptr;
Step #3 - "compile-libfuzzer-coverage-x86_64":     ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16036:10: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":       ? *_impl_.item_.filengdotreaddir_
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16047:47: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     ::ngolofuzz::FileNgdotReaddirArgs* temp = _impl_.item_.filengdotreaddir_;
Step #3 - "compile-libfuzzer-coverage-x86_64":                                               ^
Step #3 - "compile-libfuzzer-coverage-x86_64": cpp/ngolofuzz.pb.h:16048:5: error: use of undeclared identifier '_impl_'
Step #3 - "compile-libfuzzer-coverage-x86_64":     _impl_.item_.filengdotreaddir_ = nullptr;
Step #3 - "compile-libfuzzer-coverage-x86_64":     ^
Step #3 - "compile-libfuzzer-coverage-x86_64": fatal error: too many errors emitted, stopping now [-ferror-limit=]
Step #3 - "compile-libfuzzer-coverage-x86_64": 20 errors generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=os
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_os
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module os: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:119:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:140:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:161:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:174:38: FileResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:175:2: FileResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:176:6: FileInfoResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:177:2: FileInfoResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:178:6: ProcessResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:2: ProcessResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:758:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:2: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_os/copy/dir.go fuzz_ng_os/copy/dir_unix.go fuzz_ng_os/copy/dirent_linux.go fuzz_ng_os/copy/endian_little.go fuzz_ng_os/copy/env.go fuzz_ng_os/copy/error.go fuzz_ng_os/copy/error_errno.go fuzz_ng_os/copy/error_posix.go fuzz_ng_os/copy/exec.go fuzz_ng_os/copy/exec_posix.go fuzz_ng_os/copy/exec_unix.go fuzz_ng_os/copy/executable.go fuzz_ng_os/copy/executable_procfs.go fuzz_ng_os/copy/file.go fuzz_ng_os/copy/file_open_unix.go fuzz_ng_os/copy/file_posix.go fuzz_ng_os/copy/file_unix.go fuzz_ng_os/copy/getwd.go fuzz_ng_os/copy/path.go fuzz_ng_os/copy/path_unix.go fuzz_ng_os/copy/pipe2_unix.go fuzz_ng_os/copy/proc.go fuzz_ng_os/copy/rawconn.go fuzz_ng_os/copy/removeall_at.go fuzz_ng_os/copy/stat.go fuzz_ng_os/copy/stat_linux.go fuzz_ng_os/copy/stat_unix.go fuzz_ng_os/copy/sticky_notbsd.go fuzz_ng_os/copy/sys.go fuzz_ng_os/copy/sys_linux.go fuzz_ng_os/copy/sys_unix.go fuzz_ng_os/copy/tempfile.go fuzz_ng_os/copy/types.go fuzz_ng_os/copy/types_unix.go fuzz_ng_os/copy/wait_waitid.go fuzz_ng_os/copy/zero_copy_linux.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os/copy/dir.go fuzz_ng_os/copy/dir_unix.go fuzz_ng_os/copy/dirent_linux.go fuzz_ng_os/copy/endian_little.go fuzz_ng_os/copy/env.go fuzz_ng_os/copy/error.go fuzz_ng_os/copy/error_errno.go fuzz_ng_os/copy/error_posix.go fuzz_ng_os/copy/exec.go fuzz_ng_os/copy/exec_posix.go fuzz_ng_os/copy/exec_unix.go fuzz_ng_os/copy/executable.go fuzz_ng_os/copy/executable_procfs.go fuzz_ng_os/copy/file.go fuzz_ng_os/copy/file_open_unix.go fuzz_ng_os/copy/file_posix.go fuzz_ng_os/copy/file_unix.go fuzz_ng_os/copy/getwd.go fuzz_ng_os/copy/path.go fuzz_ng_os/copy/path_unix.go fuzz_ng_os/copy/pipe2_unix.go fuzz_ng_os/copy/proc.go fuzz_ng_os/copy/rawconn.go fuzz_ng_os/copy/removeall_at.go fuzz_ng_os/copy/stat.go fuzz_ng_os/copy/stat_linux.go fuzz_ng_os/copy/stat_unix.go fuzz_ng_os/copy/sticky_notbsd.go fuzz_ng_os/copy/sys.go fuzz_ng_os/copy/sys_linux.go fuzz_ng_os/copy/sys_unix.go fuzz_ng_os/copy/tempfile.go fuzz_ng_os/copy/types.go fuzz_ng_os/copy/types_unix.go fuzz_ng_os/copy/wait_waitid.go fuzz_ng_os/copy/zero_copy_linux.go /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os/fuzz_ng.go fuzz_ng_os/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/os/env_test.go /src/goroot/src/os/env_unix_test.go /src/goroot/src/os/error_test.go /src/goroot/src/os/error_unix_test.go /src/goroot/src/os/error_windows_test.go /src/goroot/src/os/example_test.go /src/goroot/src/os/exec_unix_test.go /src/goroot/src/os/exec_windows_test.go /src/goroot/src/os/executable_test.go /src/goroot/src/os/export_linux_test.go /src/goroot/src/os/export_test.go /src/goroot/src/os/export_unix_test.go /src/goroot/src/os/export_windows_test.go /src/goroot/src/os/fifo_test.go /src/goroot/src/os/os_test.go /src/goroot/src/os/os_unix_test.go /src/goroot/src/os/os_windows_test.go /src/goroot/src/os/path_test.go /src/goroot/src/os/path_windows_test.go /src/goroot/src/os/pipe_test.go /src/goroot/src/os/rawconn_test.go /src/goroot/src/os/read_test.go /src/goroot/src/os/readfrom_linux_test.go /src/goroot/src/os/removeall_test.go /src/goroot/src/os/stat_test.go /src/goroot/src/os/tempfile_test.go /src/goroot/src/os/timeout_test.go /src/goroot/src/os/writeto_linux_test.go /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/os/testdata /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_os/' /src/goroot/src/fuzz_ng_os/dir.go /src/goroot/src/fuzz_ng_os/dir_unix.go /src/goroot/src/fuzz_ng_os/dirent_linux.go /src/goroot/src/fuzz_ng_os/endian_little.go /src/goroot/src/fuzz_ng_os/env.go /src/goroot/src/fuzz_ng_os/env_test.go /src/goroot/src/fuzz_ng_os/env_unix_test.go /src/goroot/src/fuzz_ng_os/error.go /src/goroot/src/fuzz_ng_os/error_errno.go /src/goroot/src/fuzz_ng_os/error_posix.go /src/goroot/src/fuzz_ng_os/error_test.go /src/goroot/src/fuzz_ng_os/error_unix_test.go /src/goroot/src/fuzz_ng_os/error_windows_test.go /src/goroot/src/fuzz_ng_os/example_test.go /src/goroot/src/fuzz_ng_os/exec.go /src/goroot/src/fuzz_ng_os/exec_posix.go /src/goroot/src/fuzz_ng_os/exec_unix.go /src/goroot/src/fuzz_ng_os/exec_unix_test.go /src/goroot/src/fuzz_ng_os/exec_windows_test.go /src/goroot/src/fuzz_ng_os/executable.go /src/goroot/src/fuzz_ng_os/executable_procfs.go /src/goroot/src/fuzz_ng_os/executable_test.go /src/goroot/src/fuzz_ng_os/export_linux_test.go /src/goroot/src/fuzz_ng_os/export_test.go /src/goroot/src/fuzz_ng_os/export_unix_test.go /src/goroot/src/fuzz_ng_os/export_windows_test.go /src/goroot/src/fuzz_ng_os/fifo_test.go /src/goroot/src/fuzz_ng_os/file.go /src/goroot/src/fuzz_ng_os/file_open_unix.go /src/goroot/src/fuzz_ng_os/file_posix.go /src/goroot/src/fuzz_ng_os/file_unix.go /src/goroot/src/fuzz_ng_os/fuzz_ng.go /src/goroot/src/fuzz_ng_os/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_os/getwd.go /src/goroot/src/fuzz_ng_os/ngolo_helper.go /src/goroot/src/fuzz_ng_os/os_test.go /src/goroot/src/fuzz_ng_os/os_unix_test.go /src/goroot/src/fuzz_ng_os/os_windows_test.go /src/goroot/src/fuzz_ng_os/path.go /src/goroot/src/fuzz_ng_os/path_test.go /src/goroot/src/fuzz_ng_os/path_unix.go /src/goroot/src/fuzz_ng_os/path_windows_test.go /src/goroot/src/fuzz_ng_os/pipe2_unix.go /src/goroot/src/fuzz_ng_os/pipe_test.go /src/goroot/src/fuzz_ng_os/proc.go /src/goroot/src/fuzz_ng_os/rawconn.go /src/goroot/src/fuzz_ng_os/rawconn_test.go /src/goroot/src/fuzz_ng_os/read_test.go /src/goroot/src/fuzz_ng_os/readfrom_linux_test.go /src/goroot/src/fuzz_ng_os/removeall_at.go /src/goroot/src/fuzz_ng_os/removeall_test.go /src/goroot/src/fuzz_ng_os/stat.go /src/goroot/src/fuzz_ng_os/stat_linux.go /src/goroot/src/fuzz_ng_os/stat_test.go /src/goroot/src/fuzz_ng_os/stat_unix.go /src/goroot/src/fuzz_ng_os/sticky_notbsd.go /src/goroot/src/fuzz_ng_os/sys.go /src/goroot/src/fuzz_ng_os/sys_linux.go /src/goroot/src/fuzz_ng_os/sys_unix.go /src/goroot/src/fuzz_ng_os/tempfile.go /src/goroot/src/fuzz_ng_os/tempfile_test.go /src/goroot/src/fuzz_ng_os/timeout_test.go /src/goroot/src/fuzz_ng_os/types.go /src/goroot/src/fuzz_ng_os/types_unix.go /src/goroot/src/fuzz_ng_os/wait_waitid.go /src/goroot/src/fuzz_ng_os/writeto_linux_test.go /src/goroot/src/fuzz_ng_os/zero_copy_linux.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_os /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_os [fuzz_ng_os.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./executable_test.go:58:6: sameFile redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./types_unix.go:28:6: other declaration of sameFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./os_test.go:166:6: newFile redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./file_unix.go:167:6: other declaration of newFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./proc.go:52:6: Getgroups already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/proc.go:52:6: other declaration of Getgroups
Step #3 - "compile-libfuzzer-coverage-x86_64": ./dir.go:82:6: DirEntry already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/dir.go:82:6: other declaration of DirEntry
Step #3 - "compile-libfuzzer-coverage-x86_64": ./exec.go:72:6: Signal already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/exec.go:72:6: other declaration of Signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ./exec.go:92:6: FindProcess already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/exec.go:92:6: other declaration of FindProcess
Step #3 - "compile-libfuzzer-coverage-x86_64": ./exec.go:109:6: StartProcess already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/exec.go:109:6: other declaration of StartProcess
Step #3 - "compile-libfuzzer-coverage-x86_64": ./types.go:13:6: Getpagesize already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/types.go:13:6: other declaration of Getpagesize
Step #3 - "compile-libfuzzer-coverage-x86_64": ./types.go:48:2: ModeCharDevice already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/types.go:48:2: other declaration of ModeCharDevice
Step #3 - "compile-libfuzzer-coverage-x86_64": ./types.go:49:2: ModeSticky already declared through dot-import of package os ("os")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/os/types.go:49:2: other declaration of ModeSticky
Step #3 - "compile-libfuzzer-coverage-x86_64": ./types.go:48:2: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_os [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_os/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_os_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo os
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/os/user/cgo_listgroups_unix.go /src/goroot/src/os/user/cgo_lookup_cgo.go /src/goroot/src/os/user/cgo_lookup_syscall.go /src/goroot/src/os/user/cgo_lookup_unix.go /src/goroot/src/os/user/cgo_unix_test.go /src/goroot/src/os/user/cgo_user_test.go /src/goroot/src/os/user/getgrouplist_syscall.go /src/goroot/src/os/user/getgrouplist_unix.go /src/goroot/src/os/user/listgroups_stub.go /src/goroot/src/os/user/listgroups_unix.go /src/goroot/src/os/user/listgroups_unix_test.go /src/goroot/src/os/user/lookup.go /src/goroot/src/os/user/lookup_android.go /src/goroot/src/os/user/lookup_plan9.go /src/goroot/src/os/user/lookup_stubs.go /src/goroot/src/os/user/lookup_unix.go /src/goroot/src/os/user/lookup_unix_test.go /src/goroot/src/os/user/lookup_windows.go /src/goroot/src/os/user/user.go /src/goroot/src/os/user/user_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 20 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^os_user '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing os/user fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Found package in /src/goroot/src/os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Type UnknownUserIdError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Type UnknownUserError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Type UnknownGroupIdError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Type UnknownGroupError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Function Error has unproduced recv UnknownUserIdError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Function Error has unproduced recv UnknownUserError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Function Error has unproduced recv UnknownGroupIdError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:46 Function Error has unproduced recv UnknownGroupError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/os_user.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/os_user.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module os/user: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_os_user/copy/cgo_listgroups_unix.go fuzz_ng_os_user/copy/cgo_lookup_unix.go fuzz_ng_os_user/copy/lookup.go fuzz_ng_os_user/copy/user.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os_user/copy/cgo_listgroups_unix.go fuzz_ng_os_user/copy/cgo_lookup_unix.go fuzz_ng_os_user/copy/lookup.go fuzz_ng_os_user/copy/user.go /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os_user/fuzz_ng.go fuzz_ng_os_user/fuzzng_unsure_test.go fuzz_ng_os_user/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/os/user/cgo_unix_test.go /src/goroot/src/os/user/cgo_user_test.go /src/goroot/src/os/user/listgroups_unix_test.go /src/goroot/src/os/user/lookup_unix_test.go /src/goroot/src/os/user/user_test.go /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/os/user/testdata /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/os/user/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_os_user/' /src/goroot/src/fuzz_ng_os_user/cgo_listgroups_unix.go /src/goroot/src/fuzz_ng_os_user/cgo_lookup_unix.go /src/goroot/src/fuzz_ng_os_user/cgo_unix_test.go /src/goroot/src/fuzz_ng_os_user/cgo_user_test.go /src/goroot/src/fuzz_ng_os_user/fuzz_ng.go /src/goroot/src/fuzz_ng_os_user/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_os_user/listgroups_unix_test.go /src/goroot/src/fuzz_ng_os_user/lookup.go /src/goroot/src/fuzz_ng_os_user/lookup_unix_test.go /src/goroot/src/fuzz_ng_os_user/ngolo_helper.go /src/goroot/src/fuzz_ng_os_user/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_os_user/user.go /src/goroot/src/fuzz_ng_os_user/user_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os_user/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os_user/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_os_user /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_os_user [fuzz_ng_os_user.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:70:21: undefined: _C_struct_passwd
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:135:22: undefined: _C_struct_group
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:143:17: undefined: _C_int
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:146:27: undefined: _C__SC_GETPW_R_SIZE_MAX
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:147:27: undefined: _C__SC_GETGR_R_SIZE_MAX
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:150:35: undefined: _C_size_t
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_lookup_unix.go:195:36: undefined: _C_struct_passwd
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_listgroups_unix.go:22:13: undefined: _C_gid_t
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_listgroups_unix.go:46:55: undefined: _C_gid_t
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_listgroups_unix.go:46:86: undefined: _C_int
Step #3 - "compile-libfuzzer-coverage-x86_64": ./cgo_listgroups_unix.go:22:13: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_os_user [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_os_user/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_user
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_os_user_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/os/exec/bench_test.go /src/goroot/src/os/exec/dot_test.go /src/goroot/src/os/exec/env_test.go /src/goroot/src/os/exec/example_test.go /src/goroot/src/os/exec/exec.go /src/goroot/src/os/exec/exec_linux_test.go /src/goroot/src/os/exec/exec_other_test.go /src/goroot/src/os/exec/exec_plan9.go /src/goroot/src/os/exec/exec_posix_test.go /src/goroot/src/os/exec/exec_test.go /src/goroot/src/os/exec/exec_unix.go /src/goroot/src/os/exec/exec_unix_test.go /src/goroot/src/os/exec/exec_windows.go /src/goroot/src/os/exec/exec_windows_test.go /src/goroot/src/os/exec/internal_test.go /src/goroot/src/os/exec/lp_linux_test.go /src/goroot/src/os/exec/lp_plan9.go /src/goroot/src/os/exec/lp_test.go /src/goroot/src/os/exec/lp_unix.go /src/goroot/src/os/exec/lp_unix_test.go /src/goroot/src/os/exec/lp_wasm.go /src/goroot/src/os/exec/lp_windows.go /src/goroot/src/os/exec/lp_windows_test.go /src/goroot/src/os/exec/read3.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 24 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^os_exec '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing os/exec fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Found package in /src/goroot/src/os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Type ExitError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Type Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Function Error has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Function Unwrap has unproduced recv Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Unhandled argument &ast.Ellipsis{Ellipsis:17764, Elt:(*ast.Ident)(0xc000205cc0)} for Command
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Function CommandContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Unhandled argument &ast.Ellipsis{Ellipsis:20412, Elt:(*ast.Ident)(0xc0002731a0)} for CommandContext
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:53 Function Error has unproduced recv ExitError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/os_exec.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/os_exec.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module os/exec: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_os_exec/copy/exec.go fuzz_ng_os_exec/copy/exec_unix.go fuzz_ng_os_exec/copy/lp_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os_exec/copy/exec.go fuzz_ng_os_exec/copy/exec_unix.go fuzz_ng_os_exec/copy/lp_unix.go /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os_exec/fuzz_ng.go fuzz_ng_os_exec/fuzzng_unsure_test.go fuzz_ng_os_exec/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/os/exec/bench_test.go /src/goroot/src/os/exec/dot_test.go /src/goroot/src/os/exec/env_test.go /src/goroot/src/os/exec/example_test.go /src/goroot/src/os/exec/exec_linux_test.go /src/goroot/src/os/exec/exec_other_test.go /src/goroot/src/os/exec/exec_posix_test.go /src/goroot/src/os/exec/exec_test.go /src/goroot/src/os/exec/exec_unix_test.go /src/goroot/src/os/exec/exec_windows_test.go /src/goroot/src/os/exec/internal_test.go /src/goroot/src/os/exec/lp_linux_test.go /src/goroot/src/os/exec/lp_test.go /src/goroot/src/os/exec/lp_unix_test.go /src/goroot/src/os/exec/lp_windows_test.go /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/os/exec/testdata /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/os/exec/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_os_exec/' /src/goroot/src/fuzz_ng_os_exec/bench_test.go /src/goroot/src/fuzz_ng_os_exec/dot_test.go /src/goroot/src/fuzz_ng_os_exec/env_test.go /src/goroot/src/fuzz_ng_os_exec/example_test.go /src/goroot/src/fuzz_ng_os_exec/exec.go /src/goroot/src/fuzz_ng_os_exec/exec_linux_test.go /src/goroot/src/fuzz_ng_os_exec/exec_other_test.go /src/goroot/src/fuzz_ng_os_exec/exec_posix_test.go /src/goroot/src/fuzz_ng_os_exec/exec_test.go /src/goroot/src/fuzz_ng_os_exec/exec_unix.go /src/goroot/src/fuzz_ng_os_exec/exec_unix_test.go /src/goroot/src/fuzz_ng_os_exec/exec_windows_test.go /src/goroot/src/fuzz_ng_os_exec/fuzz_ng.go /src/goroot/src/fuzz_ng_os_exec/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_os_exec/internal_test.go /src/goroot/src/fuzz_ng_os_exec/lp_linux_test.go /src/goroot/src/fuzz_ng_os_exec/lp_test.go /src/goroot/src/fuzz_ng_os_exec/lp_unix.go /src/goroot/src/fuzz_ng_os_exec/lp_unix_test.go /src/goroot/src/fuzz_ng_os_exec/lp_windows_test.go /src/goroot/src/fuzz_ng_os_exec/ngolo_helper.go /src/goroot/src/fuzz_ng_os_exec/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os_exec/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os_exec/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_os_exec /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_os_exec (test)
Step #3 - "compile-libfuzzer-coverage-x86_64": 	exec_test.go:26:2: use of internal package os/exec/internal/fdtest not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_os_exec [setup failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_os_exec/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_os_exec_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/os/exec/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/os/exec/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/os/exec/internal/fdtest/exists_plan9.go /src/goroot/src/os/exec/internal/fdtest/exists_test.go /src/goroot/src/os/exec/internal/fdtest/exists_unix.go /src/goroot/src/os/exec/internal/fdtest/exists_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/exec/internal/fdtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/os/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/os/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/os/testdata/dirfs/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/os/testdata/dirfs/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/os/testdata/dirfs/dir/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/os/testdata/dirfs/dir/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/os/testdata/issue37161/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/os/testdata/issue37161/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/os/signal/doc.go /src/goroot/src/os/signal/example_test.go /src/goroot/src/os/signal/example_unix_test.go /src/goroot/src/os/signal/signal.go /src/goroot/src/os/signal/signal_cgo_test.go /src/goroot/src/os/signal/signal_linux_test.go /src/goroot/src/os/signal/signal_plan9.go /src/goroot/src/os/signal/signal_plan9_test.go /src/goroot/src/os/signal/signal_test.go /src/goroot/src/os/signal/signal_unix.go /src/goroot/src/os/signal/signal_windows_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^os_signal '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing os/signal fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Found package in /src/goroot/src/os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Unhandled argument &ast.Ellipsis{Ellipsis:14386, Elt:(*ast.SelectorExpr)(0xc000222600)} for Ignore
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Function Ignored has unproduced argument os.Signal
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Unhandled argument &ast.ChanType{Begin:15672, Arrow:15676, Dir:1, Value:(*ast.SelectorExpr)(0xc0002228d0)} for Notify
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Unhandled argument &ast.Ellipsis{Ellipsis:15694, Elt:(*ast.SelectorExpr)(0xc000222900)} for Notify
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Unhandled argument &ast.Ellipsis{Ellipsis:16635, Elt:(*ast.SelectorExpr)(0xc000222b28)} for Reset
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Unhandled argument &ast.ChanType{Begin:16902, Arrow:16906, Dir:1, Value:(*ast.SelectorExpr)(0xc000222bd0)} for Stop
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Function NotifyContext has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:17:59 Unhandled argument &ast.Ellipsis{Ellipsis:19562, Elt:(*ast.SelectorExpr)(0xc000223200)} for NotifyContext
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/os_signal.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/os_signal.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module os/signal: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_signal [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_os_signal.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:16:2: "os/signal" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_os_signal/copy/doc.go fuzz_ng_os_signal/copy/signal.go fuzz_ng_os_signal/copy/signal_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os_signal/copy/doc.go fuzz_ng_os_signal/copy/signal.go fuzz_ng_os_signal/copy/signal_unix.go /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_os_signal/fuzz_ng.go fuzz_ng_os_signal/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/os/signal/example_test.go /src/goroot/src/os/signal/example_unix_test.go /src/goroot/src/os/signal/signal_cgo_test.go /src/goroot/src/os/signal/signal_linux_test.go /src/goroot/src/os/signal/signal_plan9_test.go /src/goroot/src/os/signal/signal_test.go /src/goroot/src/os/signal/signal_windows_test.go /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/os/signal/testdata /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/os/signal/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_os_signal/' /src/goroot/src/fuzz_ng_os_signal/doc.go /src/goroot/src/fuzz_ng_os_signal/example_test.go /src/goroot/src/fuzz_ng_os_signal/example_unix_test.go /src/goroot/src/fuzz_ng_os_signal/fuzz_ng.go /src/goroot/src/fuzz_ng_os_signal/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_os_signal/ngolo_helper.go /src/goroot/src/fuzz_ng_os_signal/signal.go /src/goroot/src/fuzz_ng_os_signal/signal_cgo_test.go /src/goroot/src/fuzz_ng_os_signal/signal_linux_test.go /src/goroot/src/fuzz_ng_os_signal/signal_plan9_test.go /src/goroot/src/fuzz_ng_os_signal/signal_test.go /src/goroot/src/fuzz_ng_os_signal/signal_unix.go /src/goroot/src/fuzz_ng_os_signal/signal_windows_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os_signal/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_os_signal/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_os_signal /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_os_signal [fuzz_ng_os_signal.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_os_signal [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_os_signal/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_os_signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_os_signal_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/plugin/plugin.go /src/goroot/src/plugin/plugin_dlopen.go /src/goroot/src/plugin/plugin_stubs.go /src/goroot/src/plugin/plugin_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^plugin '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing plugin fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:02 Found package in /src/goroot/src/plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/plugin.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/plugin.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module plugin: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_plugin/copy/plugin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_plugin/copy/plugin.go /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_plugin/fuzz_ng.go fuzz_ng_plugin/fuzzng_unsure_test.go fuzz_ng_plugin/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/plugin/plugin_test.go /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/plugin/testdata /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/plugin/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_plugin/' /src/goroot/src/fuzz_ng_plugin/fuzz_ng.go /src/goroot/src/fuzz_ng_plugin/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_plugin/ngolo_helper.go /src/goroot/src/fuzz_ng_plugin/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_plugin/plugin.go /src/goroot/src/fuzz_ng_plugin/plugin_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_plugin/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_plugin/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_plugin /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_plugin [fuzz_ng_plugin.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./plugin.go:81:9: undefined: open
Step #3 - "compile-libfuzzer-coverage-x86_64": ./plugin.go:89:9: undefined: lookup
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_plugin [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_plugin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_plugin_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/unicode/casetables.go /src/goroot/src/unicode/digit.go /src/goroot/src/unicode/digit_test.go /src/goroot/src/unicode/example_test.go /src/goroot/src/unicode/graphic.go /src/goroot/src/unicode/graphic_test.go /src/goroot/src/unicode/letter.go /src/goroot/src/unicode/letter_test.go /src/goroot/src/unicode/script_test.go /src/goroot/src/unicode/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^unicode '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing unicode fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Found package in /src/goroot/src/unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Type SpecialCase is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Function IsOneOf has unproduced argument RangeTable
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Unhandled argument &ast.Ellipsis{Ellipsis:213680, Elt:(*ast.StarExpr)(0xc0002dc558)} for In
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Function Is has unproduced argument RangeTable
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Function ToUpper has unproduced recv SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Function ToTitle has unproduced recv SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:09 Function ToLower has unproduced recv SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/unicode.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/unicode.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module unicode: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_unicode/copy/casetables.go fuzz_ng_unicode/copy/digit.go fuzz_ng_unicode/copy/graphic.go fuzz_ng_unicode/copy/letter.go fuzz_ng_unicode/copy/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_unicode/copy/casetables.go fuzz_ng_unicode/copy/digit.go fuzz_ng_unicode/copy/graphic.go fuzz_ng_unicode/copy/letter.go fuzz_ng_unicode/copy/tables.go /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_unicode/fuzz_ng.go fuzz_ng_unicode/fuzzng_unsure_test.go fuzz_ng_unicode/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/unicode/digit_test.go /src/goroot/src/unicode/example_test.go /src/goroot/src/unicode/graphic_test.go /src/goroot/src/unicode/letter_test.go /src/goroot/src/unicode/script_test.go /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/unicode/testdata /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/unicode/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_unicode/' /src/goroot/src/fuzz_ng_unicode/casetables.go /src/goroot/src/fuzz_ng_unicode/digit.go /src/goroot/src/fuzz_ng_unicode/digit_test.go /src/goroot/src/fuzz_ng_unicode/example_test.go /src/goroot/src/fuzz_ng_unicode/fuzz_ng.go /src/goroot/src/fuzz_ng_unicode/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_unicode/graphic.go /src/goroot/src/fuzz_ng_unicode/graphic_test.go /src/goroot/src/fuzz_ng_unicode/letter.go /src/goroot/src/fuzz_ng_unicode/letter_test.go /src/goroot/src/fuzz_ng_unicode/ngolo_helper.go /src/goroot/src/fuzz_ng_unicode/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_unicode/script_test.go /src/goroot/src/fuzz_ng_unicode/tables.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unicode/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unicode/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_unicode /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_unicode [fuzz_ng_unicode.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:5874:2: Gothic already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/tables.go:5874:2: other declaration of Gothic
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:5985:2: Tifinagh already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/tables.go:5985:2: other declaration of Tifinagh
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:5999:5: Properties already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/tables.go:5999:5: other declaration of Properties
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:7196:2: Bidi_Control already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/tables.go:7196:2: other declaration of Bidi_Control
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:7212:2: Other_ID_Continue already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/tables.go:7212:2: other declaration of Other_ID_Continue
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:7217:2: Pattern_Syntax already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/tables.go:7217:2: other declaration of Pattern_Syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": ./casetables.go:12:5: TurkishCase already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/casetables.go:12:5: other declaration of TurkishCase
Step #3 - "compile-libfuzzer-coverage-x86_64": ./letter.go:29:6: Range16 already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/letter.go:29:6: other declaration of Range16
Step #3 - "compile-libfuzzer-coverage-x86_64": ./letter.go:38:6: Range32 already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/letter.go:38:6: other declaration of Range32
Step #3 - "compile-libfuzzer-coverage-x86_64": ./letter.go:72:2: LowerCase already declared through dot-import of package unicode ("unicode")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/letter.go:72:2: other declaration of LowerCase
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tables.go:5999:5: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_unicode [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_unicode/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_unicode_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/unicode/utf16/export_test.go /src/goroot/src/unicode/utf16/utf16.go /src/goroot/src/unicode/utf16/utf16_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^unicode_utf16 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing unicode/utf16 fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:18 Found package in /src/goroot/src/unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:18 Array result for uint16 is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:18 Array result for uint16 is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:18 Array result for rune is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:18 Function Encode has unproduced array argument rune
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/unicode_utf16.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/unicode_utf16.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module unicode/utf16: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_unicode_utf16/copy/utf16.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_unicode_utf16/copy/utf16.go /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_unicode_utf16/fuzz_ng.go fuzz_ng_unicode_utf16/fuzzng_unsure_test.go fuzz_ng_unicode_utf16/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/unicode/utf16/export_test.go /src/goroot/src/unicode/utf16/utf16_test.go /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/unicode/utf16/testdata /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/unicode/utf16/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_unicode_utf16/' /src/goroot/src/fuzz_ng_unicode_utf16/export_test.go /src/goroot/src/fuzz_ng_unicode_utf16/fuzz_ng.go /src/goroot/src/fuzz_ng_unicode_utf16/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_unicode_utf16/ngolo_helper.go /src/goroot/src/fuzz_ng_unicode_utf16/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_unicode_utf16/utf16.go /src/goroot/src/fuzz_ng_unicode_utf16/utf16_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unicode_utf16/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unicode_utf16/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_unicode_utf16 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_unicode_utf16 [fuzz_ng_unicode_utf16.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf16.go:30:6: IsSurrogate already declared through dot-import of package utf16 ("unicode/utf16")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf16/utf16.go:30:6: other declaration of IsSurrogate
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf16.go:37:6: DecodeRune already declared through dot-import of package utf16 ("unicode/utf16")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf16/utf16.go:37:6: other declaration of DecodeRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf16.go:47:6: EncodeRune already declared through dot-import of package utf16 ("unicode/utf16")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf16/utf16.go:47:6: other declaration of EncodeRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf16.go:56:6: Encode already declared through dot-import of package utf16 ("unicode/utf16")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf16/utf16.go:56:6: other declaration of Encode
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf16.go:89:6: AppendRune already declared through dot-import of package utf16 ("unicode/utf16")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf16/utf16.go:89:6: other declaration of AppendRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf16.go:105:6: Decode already declared through dot-import of package utf16 ("unicode/utf16")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf16/utf16.go:105:6: other declaration of Decode
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_unicode_utf16 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_unicode_utf16/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode_utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_unicode_utf16_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/unicode/utf8/example_test.go /src/goroot/src/unicode/utf8/utf8.go /src/goroot/src/unicode/utf8/utf8_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^unicode_utf8 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing unicode/utf8 fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:26 Found package in /src/goroot/src/unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:26 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/unicode_utf8.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/unicode_utf8.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module unicode/utf8: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_unicode_utf8/copy/utf8.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_unicode_utf8/copy/utf8.go /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_unicode_utf8/fuzz_ng.go fuzz_ng_unicode_utf8/fuzzng_unsure_test.go fuzz_ng_unicode_utf8/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/unicode/utf8/example_test.go /src/goroot/src/unicode/utf8/utf8_test.go /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/unicode/utf8/testdata /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/unicode/utf8/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_unicode_utf8/' /src/goroot/src/fuzz_ng_unicode_utf8/example_test.go /src/goroot/src/fuzz_ng_unicode_utf8/fuzz_ng.go /src/goroot/src/fuzz_ng_unicode_utf8/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_unicode_utf8/ngolo_helper.go /src/goroot/src/fuzz_ng_unicode_utf8/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_unicode_utf8/utf8.go /src/goroot/src/fuzz_ng_unicode_utf8/utf8_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unicode_utf8/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_unicode_utf8/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_unicode_utf8 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_unicode_utf8 [fuzz_ng_unicode_utf8.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:16:2: RuneError already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:16:2: other declaration of RuneError
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:18:2: MaxRune already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:18:2: other declaration of MaxRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:124:6: FullRuneInString already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:124:6: other declaration of FullRuneInString
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:152:6: DecodeRune already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:151:6: other declaration of DecodeRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:200:6: DecodeRuneInString already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:199:6: other declaration of DecodeRuneInString
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:289:6: DecodeLastRuneInString already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:287:6: other declaration of DecodeLastRuneInString
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:345:6: EncodeRune already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:342:6: other declaration of EncodeRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:478:6: RuneStart already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:474:6: other declaration of RuneStart
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:481:6: Valid already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:477:6: other declaration of Valid
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:580:6: ValidRune already declared through dot-import of package utf8 ("unicode/utf8")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/unicode/utf8/utf8.go:575:6: other declaration of ValidRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./utf8.go:124:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_unicode_utf8 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_unicode_utf8/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_unicode_utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_unicode_utf8_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/io/example_test.go /src/goroot/src/io/export_test.go /src/goroot/src/io/io.go /src/goroot/src/io/io_test.go /src/goroot/src/io/multi.go /src/goroot/src/io/multi_test.go /src/goroot/src/io/pipe.go /src/goroot/src/io/pipe_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package io
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^io '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Pipe,LimitedReader'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Pipe,LimitedReader io fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Found package in /src/goroot/src/io
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Type WriterAt is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function Read has unproduced recv LimitedReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function NewOffsetWriter has unproduced argument WriterAt
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Unhandled argument &ast.Ellipsis{Ellipsis:29347, Elt:(*ast.Ident)(0xc0001b4120)} for MultiReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Unhandled argument &ast.Ellipsis{Ellipsis:30524, Elt:(*ast.Ident)(0xc0001b5100)} for MultiWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function Read has unproduced recv PipeReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function Close has unproduced recv PipeReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function CloseWithError has unproduced recv PipeReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function Write has unproduced recv PipeWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function Close has unproduced recv PipeWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:35 Function CloseWithError has unproduced recv PipeWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/io.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/io.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=io
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_io
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module io: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_io/copy/io.go fuzz_ng_io/copy/multi.go fuzz_ng_io/copy/pipe.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_io/copy/io.go fuzz_ng_io/copy/multi.go fuzz_ng_io/copy/pipe.go /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_io/fuzz_ng.go fuzz_ng_io/fuzzng_unsure_test.go fuzz_ng_io/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/io/example_test.go /src/goroot/src/io/export_test.go /src/goroot/src/io/io_test.go /src/goroot/src/io/multi_test.go /src/goroot/src/io/pipe_test.go /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/io/testdata /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/io/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_io/' /src/goroot/src/fuzz_ng_io/example_test.go /src/goroot/src/fuzz_ng_io/export_test.go /src/goroot/src/fuzz_ng_io/fuzz_ng.go /src/goroot/src/fuzz_ng_io/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_io/io.go /src/goroot/src/fuzz_ng_io/io_test.go /src/goroot/src/fuzz_ng_io/multi.go /src/goroot/src/fuzz_ng_io/multi_test.go /src/goroot/src/fuzz_ng_io/ngolo_helper.go /src/goroot/src/fuzz_ng_io/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_io/pipe.go /src/goroot/src/fuzz_ng_io/pipe_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_io/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_io/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_io /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_io [fuzz_ng_io.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:22:2: SeekStart already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:22:2: other declaration of SeekStart
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:99:6: Writer already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:99:6: other declaration of Writer
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:143:6: WriteCloser already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:143:6: other declaration of WriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:149:6: ReadWriteCloser already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:149:6: other declaration of ReadWriteCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:200:6: WriterTo already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:200:6: other declaration of WriterTo
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:262:6: ByteReader already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:262:6: other declaration of ByteReader
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:301:6: RuneScanner already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:301:6: other declaration of RuneScanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:314:6: WriteString already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:314:6: other declaration of WriteString
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:398:6: CopyBuffer already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:398:6: other declaration of CopyBuffer
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:486:6: NewSectionReader already declared through dot-import of package io ("io")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/io.go:486:6: other declaration of NewSectionReader
Step #3 - "compile-libfuzzer-coverage-x86_64": ./io.go:486:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_io [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_io/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_io_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo io
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/io/fs/example_test.go /src/goroot/src/io/fs/format.go /src/goroot/src/io/fs/format_test.go /src/goroot/src/io/fs/fs.go /src/goroot/src/io/fs/fs_test.go /src/goroot/src/io/fs/glob.go /src/goroot/src/io/fs/glob_test.go /src/goroot/src/io/fs/readdir.go /src/goroot/src/io/fs/readdir_test.go /src/goroot/src/io/fs/readfile.go /src/goroot/src/io/fs/readfile_test.go /src/goroot/src/io/fs/stat.go /src/goroot/src/io/fs/stat_test.go /src/goroot/src/io/fs/sub.go /src/goroot/src/io/fs/sub_test.go /src/goroot/src/io/fs/walk.go /src/goroot/src/io/fs/walk_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^io_fs '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing io/fs fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Found package in /src/goroot/src/io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Array result for DirEntry is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Type PathError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Type WalkDirFunc is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Function Error has unproduced recv PathError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Function Unwrap has unproduced recv PathError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Function Timeout has unproduced recv PathError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:44 Function WalkDir has unproduced argument WalkDirFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/io_fs.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/io_fs.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module io/fs: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io_fs [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io_fs.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:259:46: cannot use r0 (variable of type []fs.DirEntry) as []*fs.DirEntry value in argument to append
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_io_fs/copy/format.go fuzz_ng_io_fs/copy/fs.go fuzz_ng_io_fs/copy/glob.go fuzz_ng_io_fs/copy/readdir.go fuzz_ng_io_fs/copy/readfile.go fuzz_ng_io_fs/copy/stat.go fuzz_ng_io_fs/copy/sub.go fuzz_ng_io_fs/copy/walk.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_io_fs/copy/format.go fuzz_ng_io_fs/copy/fs.go fuzz_ng_io_fs/copy/glob.go fuzz_ng_io_fs/copy/readdir.go fuzz_ng_io_fs/copy/readfile.go fuzz_ng_io_fs/copy/stat.go fuzz_ng_io_fs/copy/sub.go fuzz_ng_io_fs/copy/walk.go /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_io_fs/fuzz_ng.go fuzz_ng_io_fs/fuzzng_unsure_test.go fuzz_ng_io_fs/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/io/fs/example_test.go /src/goroot/src/io/fs/format_test.go /src/goroot/src/io/fs/fs_test.go /src/goroot/src/io/fs/glob_test.go /src/goroot/src/io/fs/readdir_test.go /src/goroot/src/io/fs/readfile_test.go /src/goroot/src/io/fs/stat_test.go /src/goroot/src/io/fs/sub_test.go /src/goroot/src/io/fs/walk_test.go /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/io/fs/testdata /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/io/fs/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_io_fs/' /src/goroot/src/fuzz_ng_io_fs/example_test.go /src/goroot/src/fuzz_ng_io_fs/format.go /src/goroot/src/fuzz_ng_io_fs/format_test.go /src/goroot/src/fuzz_ng_io_fs/fs.go /src/goroot/src/fuzz_ng_io_fs/fs_test.go /src/goroot/src/fuzz_ng_io_fs/fuzz_ng.go /src/goroot/src/fuzz_ng_io_fs/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_io_fs/glob.go /src/goroot/src/fuzz_ng_io_fs/glob_test.go /src/goroot/src/fuzz_ng_io_fs/ngolo_helper.go /src/goroot/src/fuzz_ng_io_fs/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_io_fs/readdir.go /src/goroot/src/fuzz_ng_io_fs/readdir_test.go /src/goroot/src/fuzz_ng_io_fs/readfile.go /src/goroot/src/fuzz_ng_io_fs/readfile_test.go /src/goroot/src/fuzz_ng_io_fs/stat.go /src/goroot/src/fuzz_ng_io_fs/stat_test.go /src/goroot/src/fuzz_ng_io_fs/sub.go /src/goroot/src/fuzz_ng_io_fs/sub_test.go /src/goroot/src/fuzz_ng_io_fs/walk.go /src/goroot/src/fuzz_ng_io_fs/walk_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_io_fs/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_io_fs/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_io_fs /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_io_fs [fuzz_ng_io_fs.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fs.go:113:6: ReadDirFile already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/fs.go:112:6: other declaration of ReadDirFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fs.go:142:2: ErrClosed already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/fs.go:141:2: other declaration of ErrClosed
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fs.go:152:6: FileInfo already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/fs.go:151:6: other declaration of FileInfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fs.go:176:2: ModeDir already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/fs.go:175:2: other declaration of ModeDir
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fs.go:179:2: ModeTemporary already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/fs.go:178:2: other declaration of ModeTemporary
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fs.go:186:2: ModeCharDevice already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/fs.go:185:2: other declaration of ModeCharDevice
Step #3 - "compile-libfuzzer-coverage-x86_64": ./readfile.go:11:6: ReadFileFS already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/readfile.go:11:6: other declaration of ReadFileFS
Step #3 - "compile-libfuzzer-coverage-x86_64": ./glob.go:12:6: GlobFS already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/glob.go:12:6: other declaration of GlobFS
Step #3 - "compile-libfuzzer-coverage-x86_64": ./glob.go:33:6: Glob already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/glob.go:33:6: other declaration of Glob
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sub.go:34:6: Sub already declared through dot-import of package fs ("io/fs")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/fs/sub.go:34:6: other declaration of Sub
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sub.go:34:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_io_fs [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_io_fs/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io_fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_io_fs_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/io/ioutil/example_test.go /src/goroot/src/io/ioutil/ioutil.go /src/goroot/src/io/ioutil/ioutil_test.go /src/goroot/src/io/ioutil/tempfile.go /src/goroot/src/io/ioutil/tempfile_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^io_ioutil '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing io/ioutil fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:52 Found package in /src/goroot/src/io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:52 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:52 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:52 Array result for fs.FileInfo is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:52 Function WriteFile has unproduced argument fs.FileMode
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/io_ioutil.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/io_ioutil.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module io/ioutil: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_io_ioutil/copy/ioutil.go fuzz_ng_io_ioutil/copy/tempfile.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_io_ioutil/copy/ioutil.go fuzz_ng_io_ioutil/copy/tempfile.go /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_io_ioutil/fuzz_ng.go fuzz_ng_io_ioutil/fuzzng_unsure_test.go fuzz_ng_io_ioutil/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/io/ioutil/example_test.go /src/goroot/src/io/ioutil/ioutil_test.go /src/goroot/src/io/ioutil/tempfile_test.go /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/io/ioutil/testdata /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_io_ioutil/' /src/goroot/src/fuzz_ng_io_ioutil/example_test.go /src/goroot/src/fuzz_ng_io_ioutil/fuzz_ng.go /src/goroot/src/fuzz_ng_io_ioutil/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_io_ioutil/ioutil.go /src/goroot/src/fuzz_ng_io_ioutil/ioutil_test.go /src/goroot/src/fuzz_ng_io_ioutil/ngolo_helper.go /src/goroot/src/fuzz_ng_io_ioutil/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_io_ioutil/tempfile.go /src/goroot/src/fuzz_ng_io_ioutil/tempfile_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_io_ioutil/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_io_ioutil/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_io_ioutil /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_io_ioutil [fuzz_ng_io_ioutil.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:27:6: ReadAll already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/ioutil.go:26:6: other declaration of ReadAll
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:40:6: ReadFile already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/ioutil.go:36:6: other declaration of ReadFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:50:6: WriteFile already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/ioutil.go:45:6: other declaration of WriteFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:74:6: ReadDir already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/ioutil.go:69:6: other declaration of ReadDir
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:93:6: NopCloser already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/ioutil.go:87:6: other declaration of NopCloser
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:104:5: Discard already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/ioutil.go:95:5: other declaration of Discard
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tempfile.go:24:6: TempFile already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/tempfile.go:24:6: other declaration of TempFile
Step #3 - "compile-libfuzzer-coverage-x86_64": ./tempfile.go:40:6: TempDir already declared through dot-import of package ioutil ("io/ioutil")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/io/ioutil/tempfile.go:39:6: other declaration of TempDir
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ioutil.go:50:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_io_ioutil [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_io_ioutil/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_io_ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_io_ioutil_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/io/ioutil/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/io/ioutil/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/decode_example_test.go /src/goroot/src/image/decode_test.go /src/goroot/src/image/format.go /src/goroot/src/image/geom.go /src/goroot/src/image/geom_test.go /src/goroot/src/image/image.go /src/goroot/src/image/image_test.go /src/goroot/src/image/names.go /src/goroot/src/image/ycbcr.go /src/goroot/src/image/ycbcr_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits Rect.x1,Rect.y1 -exclude Div'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits Rect.x1,Rect.y1 -exclude Div image fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Found package in /src/goroot/src/image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Unhandled argument &ast.FuncType{Func:53198, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000121020), Results:(*ast.FieldList)(0xc000121080)} for RegisterFormat
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Unhandled argument &ast.FuncType{Func:53243, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001210b0), Results:(*ast.FieldList)(0xc000121110)} for RegisterFormat
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA has unproduced argument color.RGBA
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetNRGBA has unproduced argument color.NRGBA
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetNRGBA64 has unproduced argument color.NRGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetAlpha has unproduced argument color.Alpha
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetAlpha16 has unproduced argument color.Alpha16
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetGray has unproduced argument color.Gray
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetGray16 has unproduced argument color.Gray16
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetCMYK has unproduced argument color.CMYK
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Set has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function SetRGBA64 has unproduced argument color.RGBA64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function NewPaletted has unproduced argument color.Palette
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function Convert has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:18:59 Function NewUniform has unproduced argument color.Color
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/image.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image/copy/format.go fuzz_ng_image/copy/geom.go fuzz_ng_image/copy/image.go fuzz_ng_image/copy/names.go fuzz_ng_image/copy/ycbcr.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image/copy/format.go fuzz_ng_image/copy/geom.go fuzz_ng_image/copy/image.go fuzz_ng_image/copy/names.go fuzz_ng_image/copy/ycbcr.go /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image/fuzz_ng.go fuzz_ng_image/fuzzng_unsure_test.go fuzz_ng_image/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/image/decode_example_test.go /src/goroot/src/image/decode_test.go /src/goroot/src/image/geom_test.go /src/goroot/src/image/image_test.go /src/goroot/src/image/ycbcr_test.go /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/testdata /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image/' /src/goroot/src/fuzz_ng_image/decode_example_test.go /src/goroot/src/fuzz_ng_image/decode_test.go /src/goroot/src/fuzz_ng_image/format.go /src/goroot/src/fuzz_ng_image/fuzz_ng.go /src/goroot/src/fuzz_ng_image/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image/geom.go /src/goroot/src/fuzz_ng_image/geom_test.go /src/goroot/src/fuzz_ng_image/image.go /src/goroot/src/fuzz_ng_image/image_test.go /src/goroot/src/fuzz_ng_image/names.go /src/goroot/src/fuzz_ng_image/ngolo_helper.go /src/goroot/src/fuzz_ng_image/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image/ycbcr.go /src/goroot/src/fuzz_ng_image/ycbcr_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_image [fuzz_ng_image.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./image_test.go:13:6: image already declared through import of package image ("image")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./decode_example_test.go:11:2: other declaration of image
Step #3 - "compile-libfuzzer-coverage-x86_64": ./image_test.go:13:6: image already declared through import of package image ("image")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./decode_test.go:10:2: other declaration of image
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_image [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/draw/bench_test.go /src/goroot/src/image/draw/clip_test.go /src/goroot/src/image/draw/draw.go /src/goroot/src/image/draw/draw_test.go /src/goroot/src/image/draw/example_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image_draw '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing image/draw fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Found package in /src/goroot/src/image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Type Image is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument image.Rectangle
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument image.Point
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument image.Rectangle
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function Draw has unproduced argument image.Point
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function DrawMask has unproduced argument Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function DrawMask has unproduced argument image.Rectangle
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function DrawMask has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function DrawMask has unproduced argument image.Point
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function DrawMask has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:10 Function DrawMask has unproduced argument image.Point
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image_draw.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/image_draw.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:13:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:13:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image/draw: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_draw [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_draw.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:22: undefined: OpEnum
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:129:31: undefined: OpEnum
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:138:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:159:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:180:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:203:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image_draw/copy/draw.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_draw/copy/draw.go /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_draw/fuzz_ng.go fuzz_ng_image_draw/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/image/draw/bench_test.go /src/goroot/src/image/draw/clip_test.go /src/goroot/src/image/draw/draw_test.go /src/goroot/src/image/draw/example_test.go /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/draw/testdata /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/image/draw/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image_draw/' /src/goroot/src/fuzz_ng_image_draw/bench_test.go /src/goroot/src/fuzz_ng_image_draw/clip_test.go /src/goroot/src/fuzz_ng_image_draw/draw.go /src/goroot/src/fuzz_ng_image_draw/draw_test.go /src/goroot/src/fuzz_ng_image_draw/example_test.go /src/goroot/src/fuzz_ng_image_draw/fuzz_ng.go /src/goroot/src/fuzz_ng_image_draw/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_draw/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_draw/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_draw/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image_draw /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": 	draw.go:14:2: use of internal package image/internal/imageutil not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image_draw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_draw_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/gif/fuzz_test.go /src/goroot/src/image/gif/reader.go /src/goroot/src/image/gif/reader_test.go /src/goroot/src/image/gif/writer.go /src/goroot/src/image/gif/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image_gif '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing image/gif fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:12 Found package in /src/goroot/src/image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:12 Function Encode has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:12 Function Encode has unproduced argument Options
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image_gif.py
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/std/image_gif.py
Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 /src/ngolo-fuzzing/std/image_gif.py fuzz_ng_image_gif/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzz_ng_image_gif/fuzz_ngp.go fuzz_ng_image_gif/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image/gif: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image_gif/copy/reader.go fuzz_ng_image_gif/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_gif/copy/reader.go fuzz_ng_image_gif/copy/writer.go /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_gif/fuzz_ng.go fuzz_ng_image_gif/fuzzng_unsure_test.go fuzz_ng_image_gif/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/image/gif/fuzz_test.go /src/goroot/src/image/gif/reader_test.go /src/goroot/src/image/gif/writer_test.go /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/gif/testdata /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/image/gif/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image_gif/' /src/goroot/src/fuzz_ng_image_gif/fuzz_ng.go /src/goroot/src/fuzz_ng_image_gif/fuzz_test.go /src/goroot/src/fuzz_ng_image_gif/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_gif/ngolo_helper.go /src/goroot/src/fuzz_ng_image_gif/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_gif/reader.go /src/goroot/src/fuzz_ng_image_gif/reader_test.go /src/goroot/src/fuzz_ng_image_gif/writer.go /src/goroot/src/fuzz_ng_image_gif/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_gif/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_gif/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image_gif /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_image_gif [fuzz_ng_image_gif.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_image_gif [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image_gif/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_gif_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/png/example_test.go /src/goroot/src/image/png/fuzz.go /src/goroot/src/image/png/fuzz_test.go /src/goroot/src/image/png/paeth.go /src/goroot/src/image/png/paeth_test.go /src/goroot/src/image/png/reader.go /src/goroot/src/image/png/reader_test.go /src/goroot/src/image/png/writer.go /src/goroot/src/image/png/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image_png '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing image/png fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Found package in /src/goroot/src/image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Type FormatError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Type UnsupportedError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Function Error has unproduced recv FormatError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Function Error has unproduced recv UnsupportedError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Function Encode has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:19 Function Encode has unproduced recv Encoder
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image_png.py
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/std/image_png.py
Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 /src/ngolo-fuzzing/std/image_png.py fuzz_ng_image_png/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzz_ng_image_png/fuzz_ngp.go fuzz_ng_image_png/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image/png: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image_png/copy/paeth.go fuzz_ng_image_png/copy/reader.go fuzz_ng_image_png/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_png/copy/paeth.go fuzz_ng_image_png/copy/reader.go fuzz_ng_image_png/copy/writer.go /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_png/fuzz_ng.go fuzz_ng_image_png/fuzzng_unsure_test.go fuzz_ng_image_png/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/image/png/example_test.go /src/goroot/src/image/png/fuzz_test.go /src/goroot/src/image/png/paeth_test.go /src/goroot/src/image/png/reader_test.go /src/goroot/src/image/png/writer_test.go /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/png/testdata /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image_png/' /src/goroot/src/fuzz_ng_image_png/example_test.go /src/goroot/src/fuzz_ng_image_png/fuzz_ng.go /src/goroot/src/fuzz_ng_image_png/fuzz_test.go /src/goroot/src/fuzz_ng_image_png/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_png/ngolo_helper.go /src/goroot/src/fuzz_ng_image_png/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_png/paeth.go /src/goroot/src/fuzz_ng_image_png/paeth_test.go /src/goroot/src/fuzz_ng_image_png/reader.go /src/goroot/src/fuzz_ng_image_png/reader_test.go /src/goroot/src/fuzz_ng_image_png/writer.go /src/goroot/src/fuzz_ng_image_png/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_png/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_png/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image_png /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_image_png [fuzz_ng_image_png.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_image_png [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image_png/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_png
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_png_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/image/png/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/image/png/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/image/png/testdata/pngsuite/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/image/png/testdata/pngsuite/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/image/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/image/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/jpeg/dct_test.go /src/goroot/src/image/jpeg/fdct.go /src/goroot/src/image/jpeg/fuzz_test.go /src/goroot/src/image/jpeg/huffman.go /src/goroot/src/image/jpeg/idct.go /src/goroot/src/image/jpeg/reader.go /src/goroot/src/image/jpeg/reader_test.go /src/goroot/src/image/jpeg/scan.go /src/goroot/src/image/jpeg/writer.go /src/goroot/src/image/jpeg/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image_jpeg '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing image/jpeg fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Found package in /src/goroot/src/image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Type FormatError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Type UnsupportedError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Function Error has unproduced recv FormatError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Function Error has unproduced recv UnsupportedError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Function Encode has unproduced argument image.Image
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:25 Function Encode has unproduced argument Options
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image_jpeg.py
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/std/image_jpeg.py
Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 /src/ngolo-fuzzing/std/image_jpeg.py fuzz_ng_image_jpeg/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzz_ng_image_jpeg/fuzz_ngp.go fuzz_ng_image_jpeg/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image/jpeg: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image_jpeg/copy/fdct.go fuzz_ng_image_jpeg/copy/huffman.go fuzz_ng_image_jpeg/copy/idct.go fuzz_ng_image_jpeg/copy/reader.go fuzz_ng_image_jpeg/copy/scan.go fuzz_ng_image_jpeg/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_jpeg/copy/fdct.go fuzz_ng_image_jpeg/copy/huffman.go fuzz_ng_image_jpeg/copy/idct.go fuzz_ng_image_jpeg/copy/reader.go fuzz_ng_image_jpeg/copy/scan.go fuzz_ng_image_jpeg/copy/writer.go /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_jpeg/fuzz_ng.go fuzz_ng_image_jpeg/fuzzng_unsure_test.go fuzz_ng_image_jpeg/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/image/jpeg/dct_test.go /src/goroot/src/image/jpeg/fuzz_test.go /src/goroot/src/image/jpeg/reader_test.go /src/goroot/src/image/jpeg/writer_test.go /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/jpeg/testdata /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/image/jpeg/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image_jpeg/' /src/goroot/src/fuzz_ng_image_jpeg/dct_test.go /src/goroot/src/fuzz_ng_image_jpeg/fdct.go /src/goroot/src/fuzz_ng_image_jpeg/fuzz_ng.go /src/goroot/src/fuzz_ng_image_jpeg/fuzz_test.go /src/goroot/src/fuzz_ng_image_jpeg/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_jpeg/huffman.go /src/goroot/src/fuzz_ng_image_jpeg/idct.go /src/goroot/src/fuzz_ng_image_jpeg/ngolo_helper.go /src/goroot/src/fuzz_ng_image_jpeg/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_jpeg/reader.go /src/goroot/src/fuzz_ng_image_jpeg/reader_test.go /src/goroot/src/fuzz_ng_image_jpeg/scan.go /src/goroot/src/fuzz_ng_image_jpeg/writer.go /src/goroot/src/fuzz_ng_image_jpeg/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_jpeg/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_jpeg/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image_jpeg /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": 	reader.go:14:2: use of internal package image/internal/imageutil not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image_jpeg/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_jpeg_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/image/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/image/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/internal/imageutil/gen.go /src/goroot/src/image/internal/imageutil/imageutil.go /src/goroot/src/image/internal/imageutil/impl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/internal/imageutil
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/color/color.go /src/goroot/src/image/color/color_test.go /src/goroot/src/image/color/ycbcr.go /src/goroot/src/image/color/ycbcr_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image_color '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing image/color fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:31 Found package in /src/goroot/src/image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:31 Type Palette is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:31 Unhandled argument &ast.FuncType{Func:14327, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000121b60), Results:(*ast.FieldList)(0xc000121b90)} for ModelFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:31 Function Convert has unproduced recv Palette
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:31 Function Index has unproduced recv Palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image_color.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/image_color.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image/color: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:302:38: ColorResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:303:2: ColorResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:402:2: ColorNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:403:2: ColorResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image_color/copy/color.go fuzz_ng_image_color/copy/ycbcr.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_color/copy/color.go fuzz_ng_image_color/copy/ycbcr.go /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_color/fuzz_ng.go fuzz_ng_image_color/fuzzng_unsure_test.go fuzz_ng_image_color/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/image/color/color_test.go /src/goroot/src/image/color/ycbcr_test.go /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/color/testdata /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/image/color/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image_color/' /src/goroot/src/fuzz_ng_image_color/color.go /src/goroot/src/fuzz_ng_image_color/color_test.go /src/goroot/src/fuzz_ng_image_color/fuzz_ng.go /src/goroot/src/fuzz_ng_image_color/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_color/ngolo_helper.go /src/goroot/src/fuzz_ng_image_color/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_image_color/ycbcr.go /src/goroot/src/fuzz_ng_image_color/ycbcr_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_color/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_color/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image_color /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_image_color [fuzz_ng_image_color.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_image_color [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image_color/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_color
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_color_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/image/color/palette/gen.go /src/goroot/src/image/color/palette/generate.go /src/goroot/src/image/color/palette/palette.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^image_color_palette '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing image/color/palette fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:38 Found package in /src/goroot/src/image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/image_color_palette.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/image_color_palette.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module image/color/palette: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color_palette [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_image_color_palette.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "image/color/palette" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_image_color_palette/copy/generate.go fuzz_ng_image_color_palette/copy/palette.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_color_palette/copy/generate.go fuzz_ng_image_color_palette/copy/palette.go /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_image_color_palette/fuzz_ng.go fuzz_ng_image_color_palette/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/image/color/palette/*_test.go' /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/image/color/palette/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/image/color/palette/testdata /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/image/color/palette/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_image_color_palette/' /src/goroot/src/fuzz_ng_image_color_palette/fuzz_ng.go /src/goroot/src/fuzz_ng_image_color_palette/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_image_color_palette/generate.go /src/goroot/src/fuzz_ng_image_color_palette/ngolo_helper.go /src/goroot/src/fuzz_ng_image_color_palette/palette.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_color_palette/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_image_color_palette/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_image_color_palette /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_image_color_palette [fuzz_ng_image_color_palette.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_image_color_palette [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_image_color_palette/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_image_color_palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_image_color_palette_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/goarch/gengoarch.go /src/goroot/src/internal/goarch/goarch.go /src/goroot/src/internal/goarch/goarch_386.go /src/goroot/src/internal/goarch/goarch_amd64.go /src/goroot/src/internal/goarch/goarch_arm.go /src/goroot/src/internal/goarch/goarch_arm64.go /src/goroot/src/internal/goarch/goarch_loong64.go /src/goroot/src/internal/goarch/goarch_mips.go /src/goroot/src/internal/goarch/goarch_mips64.go /src/goroot/src/internal/goarch/goarch_mips64le.go /src/goroot/src/internal/goarch/goarch_mipsle.go /src/goroot/src/internal/goarch/goarch_ppc64.go /src/goroot/src/internal/goarch/goarch_ppc64le.go /src/goroot/src/internal/goarch/goarch_riscv64.go /src/goroot/src/internal/goarch/goarch_s390x.go /src/goroot/src/internal/goarch/goarch_wasm.go /src/goroot/src/internal/goarch/zgoarch_386.go /src/goroot/src/internal/goarch/zgoarch_amd64.go /src/goroot/src/internal/goarch/zgoarch_arm.go /src/goroot/src/internal/goarch/zgoarch_arm64.go /src/goroot/src/internal/goarch/zgoarch_arm64be.go /src/goroot/src/internal/goarch/zgoarch_armbe.go /src/goroot/src/internal/goarch/zgoarch_loong64.go /src/goroot/src/internal/goarch/zgoarch_mips.go /src/goroot/src/internal/goarch/zgoarch_mips64.go /src/goroot/src/internal/goarch/zgoarch_mips64le.go /src/goroot/src/internal/goarch/zgoarch_mips64p32.go /src/goroot/src/internal/goarch/zgoarch_mips64p32le.go /src/goroot/src/internal/goarch/zgoarch_mipsle.go /src/goroot/src/internal/goarch/zgoarch_ppc.go /src/goroot/src/internal/goarch/zgoarch_ppc64.go /src/goroot/src/internal/goarch/zgoarch_ppc64le.go /src/goroot/src/internal/goarch/zgoarch_riscv.go /src/goroot/src/internal/goarch/zgoarch_riscv64.go /src/goroot/src/internal/goarch/zgoarch_s390.go /src/goroot/src/internal/goarch/zgoarch_s390x.go /src/goroot/src/internal/goarch/zgoarch_sparc.go /src/goroot/src/internal/goarch/zgoarch_sparc64.go /src/goroot/src/internal/goarch/zgoarch_wasm.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 39 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/goarch
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/fmtsort/export_test.go /src/goroot/src/internal/fmtsort/sort.go /src/goroot/src/internal/fmtsort/sort_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/fmtsort
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/goos/gengoos.go /src/goroot/src/internal/goos/goos.go /src/goroot/src/internal/goos/nonunix.go /src/goroot/src/internal/goos/unix.go /src/goroot/src/internal/goos/zgoos_aix.go /src/goroot/src/internal/goos/zgoos_android.go /src/goroot/src/internal/goos/zgoos_darwin.go /src/goroot/src/internal/goos/zgoos_dragonfly.go /src/goroot/src/internal/goos/zgoos_freebsd.go /src/goroot/src/internal/goos/zgoos_hurd.go /src/goroot/src/internal/goos/zgoos_illumos.go /src/goroot/src/internal/goos/zgoos_ios.go /src/goroot/src/internal/goos/zgoos_js.go /src/goroot/src/internal/goos/zgoos_linux.go /src/goroot/src/internal/goos/zgoos_netbsd.go /src/goroot/src/internal/goos/zgoos_openbsd.go /src/goroot/src/internal/goos/zgoos_plan9.go /src/goroot/src/internal/goos/zgoos_solaris.go /src/goroot/src/internal/goos/zgoos_wasip1.go /src/goroot/src/internal/goos/zgoos_windows.go /src/goroot/src/internal/goos/zgoos_zos.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 21 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/goos
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/cfg/cfg.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/cfg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/intern/intern.go /src/goroot/src/internal/intern/intern_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/intern
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/txtar/archive.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/txtar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/godebug/godebug.go /src/goroot/src/internal/godebug/godebug_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/godebug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/xcoff/ar.go /src/goroot/src/internal/xcoff/ar_test.go /src/goroot/src/internal/xcoff/file.go /src/goroot/src/internal/xcoff/file_test.go /src/goroot/src/internal/xcoff/xcoff.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/xcoff
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/xcoff/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/xcoff/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/syscall/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/syscall/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/syscall/windows/exec_windows_test.go /src/goroot/src/internal/syscall/windows/memory_windows.go /src/goroot/src/internal/syscall/windows/mksyscall.go /src/goroot/src/internal/syscall/windows/net_windows.go /src/goroot/src/internal/syscall/windows/psapi_windows.go /src/goroot/src/internal/syscall/windows/reparse_windows.go /src/goroot/src/internal/syscall/windows/security_windows.go /src/goroot/src/internal/syscall/windows/symlink_windows.go /src/goroot/src/internal/syscall/windows/syscall_windows.go /src/goroot/src/internal/syscall/windows/zsyscall_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/syscall/windows
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/syscall/windows/sysdll/sysdll.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/syscall/windows/sysdll
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/syscall/windows/registry/export_test.go /src/goroot/src/internal/syscall/windows/registry/key.go /src/goroot/src/internal/syscall/windows/registry/mksyscall.go /src/goroot/src/internal/syscall/windows/registry/registry_test.go /src/goroot/src/internal/syscall/windows/registry/syscall.go /src/goroot/src/internal/syscall/windows/registry/value.go /src/goroot/src/internal/syscall/windows/registry/zsyscall_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/syscall/windows/registry
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/syscall/execenv/execenv_default.go /src/goroot/src/internal/syscall/execenv/execenv_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/syscall/execenv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/syscall/unix/at.go /src/goroot/src/internal/syscall/unix/at_aix.go /src/goroot/src/internal/syscall/unix/at_fstatat.go /src/goroot/src/internal/syscall/unix/at_fstatat2.go /src/goroot/src/internal/syscall/unix/at_js.go /src/goroot/src/internal/syscall/unix/at_libc.go /src/goroot/src/internal/syscall/unix/at_libc2.go /src/goroot/src/internal/syscall/unix/at_solaris.go /src/goroot/src/internal/syscall/unix/at_sysnum_darwin.go /src/goroot/src/internal/syscall/unix/at_sysnum_dragonfly.go /src/goroot/src/internal/syscall/unix/at_sysnum_freebsd.go /src/goroot/src/internal/syscall/unix/at_sysnum_fstatat64_linux.go /src/goroot/src/internal/syscall/unix/at_sysnum_fstatat_linux.go /src/goroot/src/internal/syscall/unix/at_sysnum_linux.go /src/goroot/src/internal/syscall/unix/at_sysnum_netbsd.go /src/goroot/src/internal/syscall/unix/at_sysnum_newfstatat_linux.go /src/goroot/src/internal/syscall/unix/at_sysnum_openbsd.go /src/goroot/src/internal/syscall/unix/at_wasip1.go /src/goroot/src/internal/syscall/unix/constants.go /src/goroot/src/internal/syscall/unix/copy_file_range_linux.go /src/goroot/src/internal/syscall/unix/eaccess_bsd.go /src/goroot/src/internal/syscall/unix/eaccess_linux.go /src/goroot/src/internal/syscall/unix/eaccess_other.go /src/goroot/src/internal/syscall/unix/fallocate_freebsd_386.go /src/goroot/src/internal/syscall/unix/fallocate_freebsd_64bit.go /src/goroot/src/internal/syscall/unix/fallocate_freebsd_arm.go /src/goroot/src/internal/syscall/unix/fcntl_js.go /src/goroot/src/internal/syscall/unix/fcntl_unix.go /src/goroot/src/internal/syscall/unix/fcntl_wasip1.go /src/goroot/src/internal/syscall/unix/getentropy_darwin.go /src/goroot/src/internal/syscall/unix/getentropy_netbsd.go /src/goroot/src/internal/syscall/unix/getentropy_openbsd.go /src/goroot/src/internal/syscall/unix/getentropy_openbsd_mips64.go /src/goroot/src/internal/syscall/unix/getrandom.go /src/goroot/src/internal/syscall/unix/getrandom_dragonfly.go /src/goroot/src/internal/syscall/unix/getrandom_freebsd.go /src/goroot/src/internal/syscall/unix/getrandom_linux.go /src/goroot/src/internal/syscall/unix/getrandom_solaris.go /src/goroot/src/internal/syscall/unix/ioctl_aix.go /src/goroot/src/internal/syscall/unix/kernel_version_linux.go /src/goroot/src/internal/syscall/unix/kernel_version_other.go /src/goroot/src/internal/syscall/unix/net.go /src/goroot/src/internal/syscall/unix/net_darwin.go /src/goroot/src/internal/syscall/unix/net_js.go /src/goroot/src/internal/syscall/unix/net_wasip1.go /src/goroot/src/internal/syscall/unix/nonblocking_js.go /src/goroot/src/internal/syscall/unix/nonblocking_unix.go /src/goroot/src/internal/syscall/unix/nonblocking_wasip1.go /src/goroot/src/internal/syscall/unix/pidfd_linux.go /src/goroot/src/internal/syscall/unix/pty_darwin.go /src/goroot/src/internal/syscall/unix/sysnum_linux_386.go /src/goroot/src/internal/syscall/unix/sysnum_linux_amd64.go /src/goroot/src/internal/syscall/unix/sysnum_linux_arm.go /src/goroot/src/internal/syscall/unix/sysnum_linux_generic.go /src/goroot/src/internal/syscall/unix/sysnum_linux_mips64x.go /src/goroot/src/internal/syscall/unix/sysnum_linux_mipsx.go /src/goroot/src/internal/syscall/unix/sysnum_linux_ppc64x.go /src/goroot/src/internal/syscall/unix/sysnum_linux_s390x.go /src/goroot/src/internal/syscall/unix/user_darwin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 59 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/syscall/unix
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/goroot/gc.go /src/goroot/src/internal/goroot/gccgo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/goroot
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/types/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/types/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/types/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/types/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/spec/assignability.go /src/goroot/src/internal/types/testdata/spec/comparable.go /src/goroot/src/internal/types/testdata/spec/comparable1.19.go /src/goroot/src/internal/types/testdata/spec/comparisons.go /src/goroot/src/internal/types/testdata/spec/conversions.go /src/goroot/src/internal/types/testdata/spec/range.go /src/goroot/src/internal/types/testdata/spec/range_int.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/spec
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/check/blank.go /src/goroot/src/internal/types/testdata/check/builtins0.go /src/goroot/src/internal/types/testdata/check/builtins1.go /src/goroot/src/internal/types/testdata/check/chans.go /src/goroot/src/internal/types/testdata/check/compliterals.go /src/goroot/src/internal/types/testdata/check/const0.go /src/goroot/src/internal/types/testdata/check/const1.go /src/goroot/src/internal/types/testdata/check/constdecl.go /src/goroot/src/internal/types/testdata/check/conversions0.go /src/goroot/src/internal/types/testdata/check/conversions1.go /src/goroot/src/internal/types/testdata/check/cycles0.go /src/goroot/src/internal/types/testdata/check/cycles1.go /src/goroot/src/internal/types/testdata/check/cycles2.go /src/goroot/src/internal/types/testdata/check/cycles3.go /src/goroot/src/internal/types/testdata/check/cycles4.go /src/goroot/src/internal/types/testdata/check/cycles5.go /src/goroot/src/internal/types/testdata/check/cycles5a.go /src/goroot/src/internal/types/te++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": stdata/check/decls0.go /src/goroot/src/internal/types/testdata/check/decls1.go /src/goroot/src/internal/types/testdata/check/decls3.go /src/goroot/src/internal/types/testdata/check/decls4.go /src/goroot/src/internal/types/testdata/check/decls5.go /src/goroot/src/internal/types/testdata/check/errors.go /src/goroot/src/internal/types/testdata/check/expr0.go /src/goroot/src/internal/types/testdata/check/expr1.go /src/goroot/src/internal/types/testdata/check/expr2.go /src/goroot/src/internal/types/testdata/check/expr3.go /src/goroot/src/internal/types/testdata/check/funcinference.go /src/goroot/src/internal/types/testdata/check/go1_12.go /src/goroot/src/internal/types/testdata/check/go1_13.go /src/goroot/src/internal/types/testdata/check/go1_16.go /src/goroot/src/internal/types/testdata/check/go1_19.go /src/goroot/src/internal/types/testdata/check/go1_19_20.go /src/goroot/src/internal/types/testdata/check/go1_20_19.go /src/goroot/src/internal/types/testdata/check/go1_21_19.go /src/goroot/src/internal/types/testdata/check/go1_8.go /src/goroot/src/internal/types/testdata/check/go1_xx_19.go /src/goroot/src/internal/types/testdata/check/gotos.go /src/goroot/src/internal/types/testdata/check/importC.go /src/goroot/src/internal/types/testdata/check/init0.go /src/goroot/src/internal/types/testdata/check/init1.go /src/goroot/src/internal/types/testdata/check/init2.go /src/goroot/src/internal/types/testdata/check/issues0.go /src/goroot/src/internal/types/testdata/check/issues1.go /src/goroot/src/internal/types/testdata/check/labels.go /src/goroot/src/internal/types/testdata/check/linalg.go /src/goroot/src/internal/types/testdata/check/literals.go /src/goroot/src/internal/types/testdata/check/main0.go /src/goroot/src/internal/types/testdata/check/main1.go /src/goroot/src/internal/types/testdata/check/map0.go /src/goroot/src/internal/types/testdata/check/map1.go /src/goroot/src/internal/types/testdata/check/methodsets.go /src/goroot/src/internal/types/testdata/check/shifts.go /src/goroot/src/internal/types/testdata/check/slices.go /src/goroot/src/internal/types/testdata/check/stmt0.go /src/goroot/src/internal/types/testdata/check/stmt1.go /src/goroot/src/internal/types/testdata/check/typeinference.go /src/goroot/src/internal/types/testdata/check/typeinst0.go /src/goroot/src/internal/types/testdata/check/typeinst1.go /src/goroot/src/internal/types/testdata/check/typeinstcycles.go /src/goroot/src/internal/types/testdata/check/typeparams.go /src/goroot/src/internal/types/testdata/check/unions.go /src/goroot/src/internal/types/testdata/check/vardecl.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 63 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/check
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/check/importdecl1/importdecl1a.go /src/goroot/src/internal/types/testdata/check/importdecl1/importdecl1b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/check/importdecl1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/check/importdecl0/importdecl0a.go /src/goroot/src/internal/types/testdata/check/importdecl0/importdecl0b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/check/importdecl0
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/check/decls2/decls2a.go /src/goroot/src/internal/types/testdata/check/decls2/decls2b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/check/decls2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/check/issue25008/issue25008a.go /src/goroot/src/internal/types/testdata/check/issue25008/issue25008b.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/check/issue25008
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/fixedbugs/issue20583.go /src/goroot/src/internal/types/testdata/fixedbugs/issue23203a.go /src/goroot/src/internal/types/testdata/fixedbugs/issue23203b.go /src/goroot/src/internal/types/testdata/fixedbugs/issue25838.go /src/goroot/src/internal/types/testdata/fixedbugs/issue26390.go /src/goroot/src/internal/types/testdata/fixedbugs/issue28251.go /src/goroot/src/internal/types/testdata/fixedbugs/issue3117.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39634.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39664.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39680.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39693.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39699.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39711.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39723.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39725.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39754.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39755.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39768.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39938.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39948.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39976.go /src/goroot/src/internal/types/testdata/fixedbugs/issue39982.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40038.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40056.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40057.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40301.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40350.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40684.go /src/goroot/src/internal/types/testdata/fixedbugs/issue40789.go /src/goroot/src/internal/types/testdata/fixedbugs/issue41124.go /src/goroot/src/internal/types/testdata/fixedbugs/issue41176.go /src/goroot/src/internal/types/testdata/fixedbugs/issue42695.go /src/goroot/src/internal/types/testdata/fixedbugs/issue42758.go /src/goroot/src/internal/types/testdata/fixedbugs/issue42881.go /src/goroot/src/internal/types/testdata/fixedbugs/issue42987.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43056.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43087.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43109.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43110.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43124.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43125.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43190.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43527.go /src/goroot/src/internal/types/testdata/fixedbugs/issue43671.go /src/goroot/src/internal/types/testdata/fixedbugs/issue44688.go /src/goroot/src/internal/types/testdata/fixedbugs/issue44799.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45114.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45548.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45550.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45635.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45639.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45920.go /src/goroot/src/internal/types/testdata/fixedbugs/issue45985.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46090.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46275.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46403.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46404.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46461.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46461a.go /src/goroot/src/internal/types/testdata/fixedbugs/issue46583.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47031.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47115.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47127.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47411.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47747.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47796.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47818.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47887.go /src/goroot/src/internal/types/testdata/fixedbugs/issue47968.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48008.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48018.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48048.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48082.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48083.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48136.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48234.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48312.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48472.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48529.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48582.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48619.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48656.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48695.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48703.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48712.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48819.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48827.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48951.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48962.go /src/goroot/src/internal/types/testdata/fixedbugs/issue48974.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49003.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49005.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49043.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49112.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49179.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49242.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49247.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49276.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49296.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49439.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49482.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49541.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49579.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49592.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49602.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49705.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49735.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49739.go /src/goroot/src/internal/types/testdata/fixedbugs/issue49864.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50259.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50276.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50281.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50321.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50372.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50417.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50426.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50427.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50450.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50516.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50646.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50729.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50755.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50779.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50779a.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50782.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50816.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50833.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50912.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50918.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50929.go /src/goroot/src/internal/types/testdata/fixedbugs/issue50965.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51025.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51048.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51139.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51145.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51158.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51229.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51232.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51233.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51257.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51335.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51339.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51360.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51376.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51386.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51437.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51472.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51509.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51525.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51533.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51578.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51593.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51607.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51610.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51616.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51658.go /src/goroot/src/internal/types/testdata/fixedbugs/issue51877.go /src/goroot/src/internal/types/testdata/fixedbugs/issue52031.go /src/goroot/src/internal/types/testdata/fixedbugs/issue52401.go /src/goroot/src/internal/types/testdata/fixedbugs/issue52529.go /src/goroot/src/internal/types/testdata/fixedbugs/issue52698.go /src/goroot/src/internal/types/testdata/fixedbugs/issue52915.go /src/goroot/src/internal/types/testdata/fixedbugs/issue53358.go /src/goroot/src/internal/types/testdata/fixedbugs/issue53650.go /src/goroot/src/internal/types/testdata/fixedbugs/issue53692.go /src/goroot/src/internal/types/testdata/fixedbugs/issue54280.go /src/goroot/src/internal/types/testdata/fixedbugs/issue54405.go /src/goroot/src/internal/types/testdata/fixedbugs/issue54424.go /src/goroot/src/internal/types/testdata/fixedbugs/issue54942.go /src/goroot/src/internal/types/testdata/fixedbugs/issue56351.go /src/goroot/src/internal/types/testdata/fixedbugs/issue56425.go /src/goroot/src/internal/types/testdata/fixedbugs/issue56665.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57155.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57160.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57192.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57352.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57486.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57500.go /src/goroot/src/internal/types/testdata/fixedbugs/issue57522.go /src/goroot/src/internal/types/testdata/fixedbugs/issue58611.go /src/goroot/src/internal/types/testdata/fixedbugs/issue58612.go /src/goroot/src/internal/types/testdata/fixedbugs/issue58671.go /src/goroot/src/internal/types/testdata/fixedbugs/issue58742.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59190.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59207.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59209.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59338a.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59338b.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59371.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59639.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59740.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59848.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59890.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59953.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59956.go /src/goroot/src/internal/types/testdata/fixedbugs/issue59958.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60346.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60377.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60434.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60460.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60500.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60542.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60556.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60562.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60688.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60906.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60933.go /src/goroot/src/internal/types/testdata/fixedbugs/issue60946.go /src/goroot/src/internal/types/testdata/fixedbugs/issue61486.go /src/goroot/src/internal/types/testdata/fixedbugs/issue61822.go /src/goroot/src/internal/types/testdata/fixedbugs/issue61879.go /src/goroot/src/internal/types/testdata/fixedbugs/issue61903.go /src/goroot/src/internal/types/testdata/fixedbugs/issue62157.go /src/goroot/src/internal/types/testdata/fixedbugs/issue63563.go /src/goroot/src/internal/types/testdata/fixedbugs/issue64406.go /src/goroot/src/internal/types/testdata/fixedbugs/issue6977.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 216 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/fixedbugs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/testdata/examples/constraints.go /src/goroot/src/internal/types/testdata/examples/functions.go /src/goroot/src/internal/types/testdata/examples/inference.go /src/goroot/src/internal/types/testdata/examples/inference2.go /src/goroot/src/internal/types/testdata/examples/methods.go /src/goroot/src/internal/types/testdata/examples/operations.go /src/goroot/src/internal/types/testdata/examples/types.go /src/goroot/src/internal/types/testdata/examples/typesets.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/testdata/examples
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/types/errors/code_string.go /src/goroot/src/internal/types/errors/codes.go /src/goroot/src/internal/types/errors/codes_test.go /src/goroot/src/internal/types/errors/generrordocs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/types/errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/godebugs/godebugs_test.go /src/goroot/src/internal/godebugs/table.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/godebugs
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/testenv/exec.go /src/goroot/src/internal/testenv/noopt.go /src/goroot/src/internal/testenv/opt.go /src/goroot/src/internal/testenv/testenv.go /src/goroot/src/internal/testenv/testenv_notunix.go /src/goroot/src/internal/testenv/testenv_notwin.go /src/goroot/src/internal/testenv/testenv_test.go /src/goroot/src/internal/testenv/testenv_unix.go /src/goroot/src/internal/testenv/testenv_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/testenv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/race/doc.go /src/goroot/src/internal/race/norace.go /src/goroot/src/internal/race/race.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/bytealg/bytealg.go /src/goroot/src/internal/bytealg/compare_generic.go /src/goroot/src/internal/bytealg/compare_native.go /src/goroot/src/internal/bytealg/count_generic.go /src/goroot/src/internal/bytealg/count_native.go /src/goroot/src/internal/bytealg/equal_generic.go /src/goroot/src/internal/bytealg/equal_native.go /src/goroot/src/internal/bytealg/index_amd64.go /src/goroot/src/internal/bytealg/index_arm64.go /src/goroot/src/internal/bytealg/index_generic.go /src/goroot/src/internal/bytealg/index_native.go /src/goroot/src/internal/bytealg/index_ppc64x.go /src/goroot/src/internal/bytealg/index_s390x.go /src/goroot/src/internal/bytealg/indexbyte_generic.go /src/goroot/src/internal/bytealg/indexbyte_native.go /src/goroot/src/internal/bytealg/lastindexbyte_generic.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 16 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/bytealg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/defs.go /src/goroot/src/internal/coverage/pkid.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/slicewriter/slicewriter.go /src/goroot/src/internal/coverage/slicewriter/slw_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/slicewriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/stringtab/stringtab.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/stringtab
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/decodemeta/decode.go /src/goroot/src/internal/coverage/decodemeta/decodefile.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/decodemeta
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/cmerge/merge.go /src/goroot/src/internal/coverage/cmerge/merge_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/cmerge
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/rtcov/rtcov.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/rtcov
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/calloc/batchcounteralloc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/calloc
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/uleb128/uleb128.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/uleb128
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/encodecounter/encode.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/encodecounter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/slicereader/slicereader.go /src/goroot/src/internal/coverage/slicereader/slr_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/slicereader
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/decodecounter/decodecounterfile.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/decodecounter
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/cformat/fmt_test.go /src/goroot/src/internal/coverage/cformat/format.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/cformat
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/pods/pods.go /src/goroot/src/internal/coverage/pods/pods_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/pods
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/test/counter_test.go /src/goroot/src/internal/coverage/test/roundtrip_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/test
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/coverage/encodemeta/encode.go /src/goroot/src/internal/coverage/encodemeta/encodefile.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/coverage/encodemeta
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/profile/encode.go /src/goroot/src/internal/profile/filter.go /src/goroot/src/internal/profile/legacy_profile.go /src/goroot/src/internal/profile/merge.go /src/goroot/src/internal/profile/profile.go /src/goroot/src/internal/profile/profile_test.go /src/goroot/src/internal/profile/proto.go /src/goroot/src/internal/profile/proto_test.go /src/goroot/src/internal/profile/prune.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/profile
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/oserror/errors.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/oserror
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/obscuretestdata/obscuretestdata.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/obscuretestdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/lazyregexp/lazyre.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/lazyregexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/cpu/cpu.go /src/goroot/src/internal/cpu/cpu_arm.go /src/goroot/src/internal/cpu/cpu_arm64.go /src/goroot/src/internal/cpu/cpu_arm64_android.go /src/goroot/src/internal/cpu/cpu_arm64_darwin.go /src/goroot/src/internal/cpu/cpu_arm64_freebsd.go /src/goroot/src/internal/cpu/cpu_arm64_hwcap.go /src/goroot/src/internal/cpu/cpu_arm64_linux.go /src/goroot/src/internal/cpu/cpu_arm64_openbsd.go /src/goroot/src/internal/cpu/cpu_arm64_other.go /src/goroot/src/internal/cpu/cpu_loong64.go /src/goroot/src/internal/cpu/cpu_mips.go /src/goroot/src/internal/cpu/cpu_mips64x.go /src/goroot/src/internal/cpu/cpu_mipsle.go /src/goroot/src/internal/cpu/cpu_no_name.go /src/goroot/src/internal/cpu/cpu_ppc64x.go /src/goroot/src/internal/cpu/cpu_ppc64x_aix.go /src/goroot/src/internal/cpu/cpu_ppc64x_linux.go /src/goroot/src/internal/cpu/cpu_ppc64x_other.go /src/goroot/src/internal/cpu/cpu_riscv64.go /src/goroot/src/internal/cpu/cpu_s390x.go /src/goroot/src/internal/cpu/cpu_s390x_test.go /src/goroot/src/internal/cpu/cpu_test.go /src/goroot/src/internal/cpu/cpu_wasm.go /src/goroot/src/internal/cpu/cpu_x86.go /src/goroot/src/internal/cpu/cpu_x86_test.go /src/goroot/src/internal/cpu/export_test.go /src/goroot/src/internal/cpu/export_x86_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 28 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/cpu
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/safefilepath/path.go /src/goroot/src/internal/safefilepath/path_other.go /src/goroot/src/internal/safefilepath/path_test.go /src/goroot/src/internal/safefilepath/path_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/safefilepath
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/zstd/bits.go /src/goroot/src/internal/zstd/block.go /src/goroot/src/internal/zstd/fse.go /src/goroot/src/internal/zstd/fse_test.go /src/goroot/src/internal/zstd/fuzz_test.go /src/goroot/src/internal/zstd/huff.go /src/goroot/src/internal/zstd/literals.go /src/goroot/src/internal/zstd/window.go /src/goroot/src/internal/zstd/window_test.go /src/goroot/src/internal/zstd/xxhash.go /src/goroot/src/internal/zstd/xxhash_test.go /src/goroot/src/internal/zstd/zstd.go /src/goroot/src/internal/zstd/zstd_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/zstd
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/zstd/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/zstd/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/unsafeheader/unsafeheader.go /src/goroot/src/internal/unsafeheader/unsafeheader_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/unsafeheader
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/testlog/exit.go /src/goroot/src/internal/testlog/log.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/testlog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/buildcfg/cfg.go /src/goroot/src/internal/buildcfg/cfg_test.go /src/goroot/src/internal/buildcfg/exp.go /src/goroot/src/internal/buildcfg/zbootstrap.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/buildcfg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/gc.go /src/goroot/src/internal/trace/gc_test.go /src/goroot/src/internal/trace/goroutines.go /src/goroot/src/internal/trace/mud.go /src/goroot/src/internal/trace/mud_test.go /src/goroot/src/internal/trace/order.go /src/goroot/src/internal/trace/parser.go /src/goroot/src/internal/trace/parser_test.go /src/goroot/src/internal/trace/summary.go /src/goroot/src/internal/trace/summary_test.go /src/goroot/src/internal/trace/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/trace/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/trace/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/base.go /src/goroot/src/internal/trace/v2/batch.go /src/goroot/src/internal/trace/v2/batchcursor.go /src/goroot/src/internal/trace/v2/batchcursor_test.go /src/goroot/src/internal/trace/v2/event.go /src/goroot/src/internal/trace/v2/event_test.go /src/goroot/src/internal/trace/v2/generation.go /src/goroot/src/internal/trace/v2/order.go /src/goroot/src/internal/trace/v2/reader.go /src/goroot/src/internal/trace/v2/reader_test.go /src/goroot/src/internal/trace/v2/resources.go /src/goroot/src/internal/trace/v2/trace_test.go /src/goroot/src/internal/trace/v2/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 13 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/testtrace/expectation.go /src/goroot/src/internal/trace/v2/testtrace/format.go /src/goroot/src/internal/trace/v2/testtrace/validation.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/testtrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/event/event.go /src/goroot/src/internal/trace/v2/event/requirements.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/event
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/event/go122/event.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/event/go122
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/testdata/generate.go /src/goroot/src/internal/trace/v2/testdata/mktests.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/testdata/testprog/annotations-stress.go /src/goroot/src/internal/trace/v2/testdata/testprog/annotations.go /src/goroot/src/internal/trace/v2/testdata/testprog/cgo-callback.go /src/goroot/src/internal/trace/v2/testdata/testprog/cpu-profile.go /src/goroot/src/internal/trace/v2/testdata/testprog/futile-wakeup.go /src/goroot/src/internal/trace/v2/testdata/testprog/gc-stress.go /src/goroot/src/internal/trace/v2/testdata/testprog/gomaxprocs.go /src/goroot/src/internal/trace/v2/testdata/testprog/many-start-stop.go /src/goroot/src/internal/trace/v2/testdata/testprog/stacks.go /src/goroot/src/internal/trace/v2/testdata/testprog/stress-start-stop.go /src/goroot/src/internal/trace/v2/testdata/testprog/stress.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/trace/v2/testdata/tests/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/trace/v2/testdata/tests/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/trace/v2/testdata/cmd/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/trace/v2/testdata/cmd/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/testdata/cmd/gotraceraw/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/testdata/cmd/gotraceraw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/testdata/cmd/gotracevalidate/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/testdata/cmd/gotracevalidate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/testdata/generators/go122-confuse-seq-across-generations.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-create-syscall-with-p.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-go-create-without-running-g.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-ambiguous.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-gen-boundary-bare-m.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-gen-boundary-reacquire-new-proc-bare-m.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-gen-boundary-reacquire-new-proc.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-gen-boundary.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-reacquire-new-proc-bare-m.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-reacquire-new-proc.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-self.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-simple-bare-m.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-simple.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-syscall-steal-proc-sitting-in-syscall.go /src/goroot/src/internal/trace/v2/testdata/generators/go122-task-across-generations.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 15 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/testdata/generators
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/raw/doc.go /src/goroot/src/internal/trace/v2/raw/event.go /src/goroot/src/internal/trace/v2/raw/reader.go /src/goroot/src/internal/trace/v2/raw/textreader.go /src/goroot/src/internal/trace/v2/raw/textwriter.go /src/goroot/src/internal/trace/v2/raw/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/raw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/trace/v2/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/trace/v2/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/trace/v2/internal/testgen/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/trace/v2/internal/testgen/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/internal/testgen/go122/trace.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/internal/testgen/go122
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/v2/version/version.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/v2/version
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/traceviewer/emitter.go /src/goroot/src/internal/trace/traceviewer/histogram.go /src/goroot/src/internal/trace/traceviewer/http.go /src/goroot/src/internal/trace/traceviewer/mmu.go /src/goroot/src/internal/trace/traceviewer/pprof.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/traceviewer
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/trace/traceviewer/format/format.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/trace/traceviewer/format
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/trace/traceviewer/static/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/trace/traceviewer/static/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/testpty/pty.go /src/goroot/src/internal/testpty/pty_cgo.go /src/goroot/src/internal/testpty/pty_darwin.go /src/goroot/src/internal/testpty/pty_none.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/testpty
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/goexperiment/exp_allocheaders_off.go /src/goroot/src/internal/goexperiment/exp_allocheaders_on.go /src/goroot/src/internal/goexperiment/exp_arenas_off.go /src/goroot/src/internal/goexperiment/exp_arenas_on.go /src/goroot/src/internal/goexperiment/exp_boringcrypto_off.go /src/goroot/src/internal/goexperiment/exp_boringcrypto_on.go /src/goroot/src/internal/goexperiment/exp_cacheprog_off.go /src/goroot/src/internal/goexperiment/exp_cacheprog_on.go /src/goroot/src/internal/goexperiment/exp_cgocheck2_off.go /src/goroot/src/internal/goexperiment/exp_cgocheck2_on.go /src/goroot/src/internal/goexperiment/exp_coverageredesign_off.go /src/goroot/src/internal/goexperiment/exp_coverageredesign_on.go /src/goroot/src/internal/goexperiment/exp_exectracer2_off.go /src/goroot/src/internal/goexperiment/exp_exectracer2_on.go /src/goroot/src/internal/goexperiment/exp_fieldtrack_off.go /src/goroot/src/internal/goexperiment/exp_fieldtrack_on.go /src/goroot/src/internal/goexperiment/exp_heapminimum512++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": kib_off.go /src/goroot/src/internal/goexperiment/exp_heapminimum512kib_on.go /src/goroot/src/internal/goexperiment/exp_loopvar_off.go /src/goroot/src/internal/goexperiment/exp_loopvar_on.go /src/goroot/src/internal/goexperiment/exp_newinliner_off.go /src/goroot/src/internal/goexperiment/exp_newinliner_on.go /src/goroot/src/internal/goexperiment/exp_pagetrace_off.go /src/goroot/src/internal/goexperiment/exp_pagetrace_on.go /src/goroot/src/internal/goexperiment/exp_preemptibleloops_off.go /src/goroot/src/internal/goexperiment/exp_preemptibleloops_on.go /src/goroot/src/internal/goexperiment/exp_rangefunc_off.go /src/goroot/src/internal/goexperiment/exp_rangefunc_on.go /src/goroot/src/internal/goexperiment/exp_regabiargs_off.go /src/goroot/src/internal/goexperiment/exp_regabiargs_on.go /src/goroot/src/internal/goexperiment/exp_regabiwrappers_off.go /src/goroot/src/internal/goexperiment/exp_regabiwrappers_on.go /src/goroot/src/internal/goexperiment/exp_staticlockranking_off.go /src/goroot/src/internal/goexperiment/exp_staticlockranking_on.go /src/goroot/src/internal/goexperiment/flags.go /src/goroot/src/internal/goexperiment/mkconsts.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 36 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/goexperiment
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/goversion/goversion.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/goversion
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/diff/diff.go /src/goroot/src/internal/diff/diff_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/diff
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/internal/diff/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/internal/diff/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/gover/gover.go /src/goroot/src/internal/gover/gover_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/gover
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/fuzz/counters_supported.go /src/goroot/src/internal/fuzz/counters_unsupported.go /src/goroot/src/internal/fuzz/coverage.go /src/goroot/src/internal/fuzz/encoding.go /src/goroot/src/internal/fuzz/encoding_test.go /src/goroot/src/internal/fuzz/fuzz.go /src/goroot/src/internal/fuzz/mem.go /src/goroot/src/internal/fuzz/minimize.go /src/goroot/src/internal/fuzz/minimize_test.go /src/goroot/src/internal/fuzz/mutator.go /src/goroot/src/internal/fuzz/mutator_test.go /src/goroot/src/internal/fuzz/mutators_byteslice.go /src/goroot/src/internal/fuzz/mutators_byteslice_test.go /src/goroot/src/internal/fuzz/pcg.go /src/goroot/src/internal/fuzz/queue.go /src/goroot/src/internal/fuzz/queue_test.go /src/goroot/src/internal/fuzz/sys_posix.go /src/goroot/src/internal/fuzz/sys_unimplemented.go /src/goroot/src/internal/fuzz/sys_windows.go /src/goroot/src/internal/fuzz/trace.go /src/goroot/src/internal/fuzz/worker.go /src/goroot/src/internal/fuzz/worker_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 22 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/fuzz
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/saferio/io.go /src/goroot/src/internal/saferio/io_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/saferio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/pkgbits/codes.go /src/goroot/src/internal/pkgbits/decoder.go /src/goroot/src/internal/pkgbits/doc.go /src/goroot/src/internal/pkgbits/encoder.go /src/goroot/src/internal/pkgbits/flags.go /src/goroot/src/internal/pkgbits/reloc.go /src/goroot/src/internal/pkgbits/support.go /src/goroot/src/internal/pkgbits/sync.go /src/goroot/src/internal/pkgbits/syncmarker_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/pkgbits
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/reflectlite/all_test.go /src/goroot/src/internal/reflectlite/export_test.go /src/goroot/src/internal/reflectlite/reflect_mirror_test.go /src/goroot/src/internal/reflectlite/set_test.go /src/goroot/src/internal/reflectlite/swapper.go /src/goroot/src/internal/reflectlite/tostring_test.go /src/goroot/src/internal/reflectlite/type.go /src/goroot/src/internal/reflectlite/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/reflectlite
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/singleflight/singleflight.go /src/goroot/src/internal/singleflight/singleflight_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/singleflight
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/bisect/bisect.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/bisect
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/nettrace/nettrace.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/nettrace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/sysinfo/cpuinfo_linux.go /src/goroot/src/internal/sysinfo/cpuinfo_stub.go /src/goroot/src/internal/sysinfo/sysinfo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/sysinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/poll/copy_file_range_linux.go /src/goroot/src/internal/poll/errno_unix.go /src/goroot/src/internal/poll/errno_windows.go /src/goroot/src/internal/poll/error_linux_test.go /src/goroot/src/internal/poll/error_stub_test.go /src/goroot/src/internal/poll/error_test.go /src/goroot/src/internal/poll/export_linux_test.go /src/goroot/src/internal/poll/export_posix_test.go /src/goroot/src/internal/poll/export_test.go /src/goroot/src/internal/poll/export_windows_test.go /src/goroot/src/internal/poll/fd.go /src/goroot/src/internal/poll/fd_fsync_darwin.go /src/goroot/src/internal/poll/fd_fsync_posix.go /src/goroot/src/internal/poll/fd_fsync_windows.go /src/goroot/src/internal/poll/fd_io_plan9.go /src/goroot/src/internal/poll/fd_mutex.go /src/goroot/src/internal/poll/fd_mutex_test.go /src/goroot/src/internal/poll/fd_opendir_darwin.go /src/goroot/src/internal/poll/fd_plan9.go /src/goroot/src/internal/poll/fd_poll_js.go /src/goroot/src/internal/poll/fd_poll_runtime.go /src/goroot/src/internal/p++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": oll/fd_posix.go /src/goroot/src/internal/poll/fd_posix_test.go /src/goroot/src/internal/poll/fd_unix.go /src/goroot/src/internal/poll/fd_unixjs.go /src/goroot/src/internal/poll/fd_wasip1.go /src/goroot/src/internal/poll/fd_windows.go /src/goroot/src/internal/poll/fd_windows_test.go /src/goroot/src/internal/poll/fd_writev_libc.go /src/goroot/src/internal/poll/fd_writev_unix.go /src/goroot/src/internal/poll/file_plan9.go /src/goroot/src/internal/poll/hook_cloexec.go /src/goroot/src/internal/poll/hook_unix.go /src/goroot/src/internal/poll/hook_windows.go /src/goroot/src/internal/poll/iovec_solaris.go /src/goroot/src/internal/poll/iovec_unix.go /src/goroot/src/internal/poll/read_test.go /src/goroot/src/internal/poll/sendfile_bsd.go /src/goroot/src/internal/poll/sendfile_linux.go /src/goroot/src/internal/poll/sendfile_solaris.go /src/goroot/src/internal/poll/sendfile_windows.go /src/goroot/src/internal/poll/sock_cloexec.go /src/goroot/src/internal/poll/sock_cloexec_accept.go /src/goroot/src/internal/poll/sockopt.go /src/goroot/src/internal/poll/sockopt_linux.go /src/goroot/src/internal/poll/sockopt_unix.go /src/goroot/src/internal/poll/sockopt_windows.go /src/goroot/src/internal/poll/sockoptip.go /src/goroot/src/internal/poll/splice_linux.go /src/goroot/src/internal/poll/splice_linux_test.go /src/goroot/src/internal/poll/strconv.go /src/goroot/src/internal/poll/sys_cloexec.go /src/goroot/src/internal/poll/writev.go /src/goroot/src/internal/poll/writev_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 54 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/poll
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/dag/alg.go /src/goroot/src/internal/dag/alg_test.go /src/goroot/src/internal/dag/parse.go /src/goroot/src/internal/dag/parse_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/dag
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/itoa/itoa.go /src/goroot/src/internal/itoa/itoa_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/itoa
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/lazytemplate/lazytemplate.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/lazytemplate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/platform/supported.go /src/goroot/src/internal/platform/zosarch.go /src/goroot/src/internal/platform/zosarch_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/platform
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/abi/abi.go /src/goroot/src/internal/abi/abi_amd64.go /src/goroot/src/internal/abi/abi_arm64.go /src/goroot/src/internal/abi/abi_generic.go /src/goroot/src/internal/abi/abi_loong64.go /src/goroot/src/internal/abi/abi_ppc64x.go /src/goroot/src/internal/abi/abi_riscv64.go /src/goroot/src/internal/abi/abi_test.go /src/goroot/src/internal/abi/compiletype.go /src/goroot/src/internal/abi/export_test.go /src/goroot/src/internal/abi/funcpc.go /src/goroot/src/internal/abi/funcpc_gccgo.go /src/goroot/src/internal/abi/map.go /src/goroot/src/internal/abi/stack.go /src/goroot/src/internal/abi/switch.go /src/goroot/src/internal/abi/symtab.go /src/goroot/src/internal/abi/type.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 17 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/abi
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/internal/abi/testdata/x.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo internal/abi/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/embed/embed.go /src/goroot/src/embed/example_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^embed '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing embed fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Found package in /src/goroot/src/embed
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Array result for fs.DirEntry is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Type FS is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Function Open has unproduced recv FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Function ReadDir has unproduced recv FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:40 Function ReadFile has unproduced recv FS
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/embed.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/embed.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo embed
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module embed: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_embed [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_embed.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "embed" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_embed/copy/embed.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_embed/copy/embed.go /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_embed/fuzz_ng.go fuzz_ng_embed/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/embed/example_test.go /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/embed/testdata /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/embed/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_embed/' /src/goroot/src/fuzz_ng_embed/embed.go /src/goroot/src/fuzz_ng_embed/example_test.go /src/goroot/src/fuzz_ng_embed/fuzz_ng.go /src/goroot/src/fuzz_ng_embed/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_embed/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_embed/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_embed/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_embed /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": example_test.go:13:12: pattern internal/embedtest/testdata/*.txt: no matching files found
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_embed [setup failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_embed/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_embed_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo embed
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/embed/internal/embedtest/embed_test.go /src/goroot/src/embed/internal/embedtest/embedx_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo embed/internal/embedtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/_more/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/_more/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/.more/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/.more/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/more/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/.hidden/more/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/-not-hidden/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/-not-hidden/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/i/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/i/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/i/j/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/i/j/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/i/j/k/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/i/j/k/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/embed/internal/embedtest/testdata/_hidden/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/embed/internal/embedtest/testdata/_hidden/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/cmp/cmp.go /src/goroot/src/cmp/cmp_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^cmp '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing cmp fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:42 Found package in /src/goroot/src/cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:42 Function Less has unproduced argument T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:42 Function Compare has unproduced argument T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:42 Unhandled argument &ast.Ellipsis{Ellipsis:1928, Elt:(*ast.Ident)(0xc0000b7560)} for Or
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/cmp.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/cmp.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module cmp: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmp [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_cmp.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "cmp" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_cmp/copy/cmp.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmp/copy/cmp.go /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_cmp/fuzz_ng.go fuzz_ng_cmp/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/cmp/cmp_test.go /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/cmp/testdata /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/cmp/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_cmp/' /src/goroot/src/fuzz_ng_cmp/cmp.go /src/goroot/src/fuzz_ng_cmp/cmp_test.go /src/goroot/src/fuzz_ng_cmp/fuzz_ng.go /src/goroot/src/fuzz_ng_cmp/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_cmp/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmp/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_cmp/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_cmp /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_cmp [fuzz_ng_cmp.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_cmp [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_cmp/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_cmp_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/builtin/builtin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^builtin '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing builtin fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:47 Found package in /src/goroot/src/builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/builtin.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/builtin.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module builtin: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_builtin [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_builtin.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:9:2: could not import builtin (open : no such file or directory)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_builtin/copy/builtin.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_builtin/copy/builtin.go /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_builtin/fuzz_ng.go fuzz_ng_builtin/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/builtin/*_test.go' /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/builtin/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/builtin/testdata /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/builtin/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_builtin/' /src/goroot/src/fuzz_ng_builtin/builtin.go /src/goroot/src/fuzz_ng_builtin/fuzz_ng.go /src/goroot/src/fuzz_ng_builtin/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_builtin/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_builtin/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_builtin/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_builtin /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_builtin [fuzz_ng_builtin.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:16:6: invalid recursive type: bool refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:26:6: invalid recursive type: uint8 refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:30:6: invalid recursive type: uint16 refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:34:6: invalid recursive type: uint32 refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:38:6: invalid recursive type: uint64 refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:42:6: invalid recursive type: int8 refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:46:6: invalid recursive type: int16 refers to itself
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:215:6: generic function is missing function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:221:6: generic function is missing function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:251:6: generic function is missing function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./builtin.go:46:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_builtin [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_builtin/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_builtin_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/compress/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/compress/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/compress/lzw/reader.go /src/goroot/src/compress/lzw/reader_test.go /src/goroot/src/compress/lzw/writer.go /src/goroot/src/compress/lzw/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^compress_lzw '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing compress/lzw fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Found package in /src/goroot/src/compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Type Reader is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Type Writer is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Function Read has unproduced recv Reader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Function Close has unproduced recv Reader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Function Reset has unproduced recv Reader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Function Write has unproduced recv Writer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Function Close has unproduced recv Writer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:49 Function Reset has unproduced recv Writer
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/compress_lzw.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/compress_lzw.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module compress/lzw: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_compress_lzw/copy/reader.go fuzz_ng_compress_lzw/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_lzw/copy/reader.go fuzz_ng_compress_lzw/copy/writer.go /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_lzw/fuzz_ng.go fuzz_ng_compress_lzw/fuzzng_unsure_test.go fuzz_ng_compress_lzw/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/compress/lzw/reader_test.go /src/goroot/src/compress/lzw/writer_test.go /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/compress/lzw/testdata /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/compress/lzw/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_compress_lzw/' /src/goroot/src/fuzz_ng_compress_lzw/fuzz_ng.go /src/goroot/src/fuzz_ng_compress_lzw/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_compress_lzw/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_lzw/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_lzw/reader.go /src/goroot/src/fuzz_ng_compress_lzw/reader_test.go /src/goroot/src/fuzz_ng_compress_lzw/writer.go /src/goroot/src/fuzz_ng_compress_lzw/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_lzw/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_lzw/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_compress_lzw /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_compress_lzw [fuzz_ng_compress_lzw.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_compress_lzw [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_compress_lzw/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_compress_lzw_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/compress/bzip2/bit_reader.go /src/goroot/src/compress/bzip2/bzip2.go /src/goroot/src/compress/bzip2/bzip2_test.go /src/goroot/src/compress/bzip2/huffman.go /src/goroot/src/compress/bzip2/move_to_front.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^compress_bzip2 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing compress/bzip2 fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:55 Found package in /src/goroot/src/compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:55 Type StructuralError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:19:55 Function Error has unproduced recv StructuralError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/compress_bzip2.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/compress_bzip2.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module compress/bzip2: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_compress_bzip2/copy/bit_reader.go fuzz_ng_compress_bzip2/copy/bzip2.go fuzz_ng_compress_bzip2/copy/huffman.go fuzz_ng_compress_bzip2/copy/move_to_front.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_bzip2/copy/bit_reader.go fuzz_ng_compress_bzip2/copy/bzip2.go fuzz_ng_compress_bzip2/copy/huffman.go fuzz_ng_compress_bzip2/copy/move_to_front.go /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_bzip2/fuzz_ng.go fuzz_ng_compress_bzip2/fuzzng_unsure_test.go fuzz_ng_compress_bzip2/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/compress/bzip2/bzip2_test.go /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/compress/bzip2/testdata /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_compress_bzip2/' /src/goroot/src/fuzz_ng_compress_bzip2/bit_reader.go /src/goroot/src/fuzz_ng_compress_bzip2/bzip2.go /src/goroot/src/fuzz_ng_compress_bzip2/bzip2_test.go /src/goroot/src/fuzz_ng_compress_bzip2/fuzz_ng.go /src/goroot/src/fuzz_ng_compress_bzip2/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_compress_bzip2/huffman.go /src/goroot/src/fuzz_ng_compress_bzip2/move_to_front.go /src/goroot/src/fuzz_ng_compress_bzip2/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_bzip2/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_bzip2/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_bzip2/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_compress_bzip2 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_compress_bzip2 [fuzz_ng_compress_bzip2.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_compress_bzip2 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_compress_bzip2/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_compress_bzip2_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/compress/bzip2/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/compress/bzip2/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/compress/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/compress/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/compress/gzip/example_test.go /src/goroot/src/compress/gzip/fuzz_test.go /src/goroot/src/compress/gzip/gunzip.go /src/goroot/src/compress/gzip/gunzip_test.go /src/goroot/src/compress/gzip/gzip.go /src/goroot/src/compress/gzip/gzip_test.go /src/goroot/src/compress/gzip/issue14937_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^compress_gzip '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing compress/gzip fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:01 Found package in /src/goroot/src/compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/compress_gzip.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/compress_gzip.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module compress/gzip: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_compress_gzip/copy/gunzip.go fuzz_ng_compress_gzip/copy/gzip.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_gzip/copy/gunzip.go fuzz_ng_compress_gzip/copy/gzip.go /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_gzip/fuzz_ng.go fuzz_ng_compress_gzip/fuzzng_unsure_test.go fuzz_ng_compress_gzip/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/compress/gzip/example_test.go /src/goroot/src/compress/gzip/fuzz_test.go /src/goroot/src/compress/gzip/gunzip_test.go /src/goroot/src/compress/gzip/gzip_test.go /src/goroot/src/compress/gzip/issue14937_test.go /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/compress/gzip/testdata /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_compress_gzip/' /src/goroot/src/fuzz_ng_compress_gzip/example_test.go /src/goroot/src/fuzz_ng_compress_gzip/fuzz_ng.go /src/goroot/src/fuzz_ng_compress_gzip/fuzz_test.go /src/goroot/src/fuzz_ng_compress_gzip/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_compress_gzip/gunzip.go /src/goroot/src/fuzz_ng_compress_gzip/gunzip_test.go /src/goroot/src/fuzz_ng_compress_gzip/gzip.go /src/goroot/src/fuzz_ng_compress_gzip/gzip_test.go /src/goroot/src/fuzz_ng_compress_gzip/issue14937_test.go /src/goroot/src/fuzz_ng_compress_gzip/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_gzip/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_gzip/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_gzip/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_compress_gzip /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_compress_gzip [fuzz_ng_compress_gzip.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_compress_gzip [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_compress_gzip/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_compress_gzip_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/compress/gzip/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/compress/gzip/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/compress/zlib/example_test.go /src/goroot/src/compress/zlib/reader.go /src/goroot/src/compress/zlib/reader_test.go /src/goroot/src/compress/zlib/writer.go /src/goroot/src/compress/zlib/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^compress_zlib '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing compress/zlib fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:09 Found package in /src/goroot/src/compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/compress_zlib.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/compress_zlib.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module compress/zlib: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_compress_zlib/copy/reader.go fuzz_ng_compress_zlib/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_zlib/copy/reader.go fuzz_ng_compress_zlib/copy/writer.go /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_zlib/fuzz_ng.go fuzz_ng_compress_zlib/fuzzng_unsure_test.go fuzz_ng_compress_zlib/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/compress/zlib/example_test.go /src/goroot/src/compress/zlib/reader_test.go /src/goroot/src/compress/zlib/writer_test.go /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/compress/zlib/testdata /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/compress/zlib/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_compress_zlib/' /src/goroot/src/fuzz_ng_compress_zlib/example_test.go /src/goroot/src/fuzz_ng_compress_zlib/fuzz_ng.go /src/goroot/src/fuzz_ng_compress_zlib/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_compress_zlib/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_zlib/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_zlib/reader.go /src/goroot/src/fuzz_ng_compress_zlib/reader_test.go /src/goroot/src/fuzz_ng_compress_zlib/writer.go /src/goroot/src/fuzz_ng_compress_zlib/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_zlib/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_zlib/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_compress_zlib /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_compress_zlib [fuzz_ng_compress_zlib.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_compress_zlib [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_compress_zlib/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_compress_zlib_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/compress/flate/deflate.go /src/goroot/src/compress/flate/deflate_test.go /src/goroot/src/compress/flate/deflatefast.go /src/goroot/src/compress/flate/dict_decoder.go /src/goroot/src/compress/flate/dict_decoder_test.go /src/goroot/src/compress/flate/example_test.go /src/goroot/src/compress/flate/flate_test.go /src/goroot/src/compress/flate/huffman_bit_writer.go /src/goroot/src/compress/flate/huffman_bit_writer_test.go /src/goroot/src/compress/flate/huffman_code.go /src/goroot/src/compress/flate/inflate.go /src/goroot/src/compress/flate/inflate_test.go /src/goroot/src/compress/flate/reader_test.go /src/goroot/src/compress/flate/token.go /src/goroot/src/compress/flate/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 15 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^compress_flate '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing compress/flate fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Found package in /src/goroot/src/compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Type ReadError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Type WriteError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Type CorruptInputError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Type InternalError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Function Error has unproduced recv CorruptInputError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Function Error has unproduced recv InternalError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Function Error has unproduced recv ReadError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:15 Function Error has unproduced recv WriteError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/compress_flate.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/compress_flate.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module compress/flate: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_compress_flate/copy/deflate.go fuzz_ng_compress_flate/copy/deflatefast.go fuzz_ng_compress_flate/copy/dict_decoder.go fuzz_ng_compress_flate/copy/huffman_bit_writer.go fuzz_ng_compress_flate/copy/huffman_code.go fuzz_ng_compress_flate/copy/inflate.go fuzz_ng_compress_flate/copy/token.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_flate/copy/deflate.go fuzz_ng_compress_flate/copy/deflatefast.go fuzz_ng_compress_flate/copy/dict_decoder.go fuzz_ng_compress_flate/copy/huffman_bit_writer.go fuzz_ng_compress_flate/copy/huffman_code.go fuzz_ng_compress_flate/copy/inflate.go fuzz_ng_compress_flate/copy/token.go /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_compress_flate/fuzz_ng.go fuzz_ng_compress_flate/fuzzng_unsure_test.go fuzz_ng_compress_flate/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/compress/flate/deflate_test.go /src/goroot/src/compress/flate/dict_decoder_test.go /src/goroot/src/compress/flate/example_test.go /src/goroot/src/compress/flate/flate_test.go /src/goroot/src/compress/flate/huffman_bit_writer_test.go /src/goroot/src/compress/flate/inflate_test.go /src/goroot/src/compress/flate/reader_test.go /src/goroot/src/compress/flate/writer_test.go /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/compress/flate/testdata /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_compress_flate/' /src/goroot/src/fuzz_ng_compress_flate/deflate.go /src/goroot/src/fuzz_ng_compress_flate/deflate_test.go /src/goroot/src/fuzz_ng_compress_flate/deflatefast.go /src/goroot/src/fuzz_ng_compress_flate/dict_decoder.go /src/goroot/src/fuzz_ng_compress_flate/dict_decoder_test.go /src/goroot/src/fuzz_ng_compress_flate/example_test.go /src/goroot/src/fuzz_ng_compress_flate/flate_test.go /src/goroot/src/fuzz_ng_compress_flate/fuzz_ng.go /src/goroot/src/fuzz_ng_compress_flate/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_compress_flate/huffman_bit_writer.go /src/goroot/src/fuzz_ng_compress_flate/huffman_bit_writer_test.go /src/goroot/src/fuzz_ng_compress_flate/huffman_code.go /src/goroot/src/fuzz_ng_compress_flate/inflate.go /src/goroot/src/fuzz_ng_compress_flate/inflate_test.go /src/goroot/src/fuzz_ng_compress_flate/ngolo_helper.go /src/goroot/src/fuzz_ng_compress_flate/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_compress_flate/reader_test.go /src/goroot/src/fuzz_ng_compress_flate/token.go /src/goroot/src/fuzz_ng_compress_flate/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_flate/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_compress_flate/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_compress_flate /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_compress_flate [fuzz_ng_compress_flate.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_compress_flate [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_compress_flate/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_compress_flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_compress_flate_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/compress/flate/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/compress/flate/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/abi_test.go /src/goroot/src/runtime/alg.go /src/goroot/src/runtime/align_runtime_test.go /src/goroot/src/runtime/align_test.go /src/goroot/src/runtime/arena.go /src/goroot/src/runtime/arena_test.go /src/goroot/src/runtime/asan.go /src/goroot/src/runtime/asan0.go /src/goroot/src/runtime/atomic_pointer.go /src/goroot/src/runtime/auxv_none.go /src/goroot/src/runtime/callers_test.go /src/goroot/src/runtime/cgo.go /src/goroot/src/runtime/cgo_mmap.go /src/goroot/src/runtime/cgo_ppc64x.go /src/goroot/src/runtime/cgo_sigaction.go /src/goroot/src/runtime/cgocall.go /src/goroot/src/runtime/cgocallback.go /src/goroot/src/runtime/cgocheck.go /src/goroot/src/runtime/chan.go /src/goroot/src/runtime/chan_test.go /src/goroot/src/runtime/chanbarrier_test.go /src/goroot/src/runtime/checkptr.go /src/goroot/src/runtime/checkptr_test.go /src/goroot/src/runtime/closure_test.go /src/goroot/src/runtime/compiler.go /src/goroot/src/runtime/complex.go /src/goroot/src/runtime/complex_test.go /src/goroot/src/runtime/conv_wasm_test.go /src/goroot/src/runtime/covercounter.go /src/goroot/src/runtime/covermeta.go /src/goroot/src/runtime/cpuflags.go /src/goroot/src/runtime/cpuflags_amd64.go /src/goroot/src/runtime/cpuflags_arm64.go /src/goroot/src/runtime/cpuprof.go /src/goroot/src/runtime/cputicks.go /src/goroot/src/runtime/crash_cgo_test.go /src/goroot/src/runtime/crash_test.go /src/goroot/src/runtime/crash_unix_test.go /src/goroot/src/runtime/create_file_nounix.go /src/goroot/src/runtime/create_file_unix.go /src/goroot/src/runtime/debug.go /src/goroot/src/runtime/debug_test.go /src/goroot/src/runtime/debugcall.go /src/goroot/src/runtime/debuglog.go /src/goroot/src/runtime/debuglog_off.go /src/goroot/src/runtime/debuglog_on.go /src/goroot/src/runtime/debuglog_test.go /src/goroot/src/runtime/defer_test.go /src/goroot/src/runtime/defs1_linux.go /src/goroot/src/runtime/defs1_netbsd_386.go /src/goroot/src/runtime/defs1_netbsd_amd64.go /src/goroot/src/runtime/defs1_netbsd_arm.go /src/goroot/src/runtime/defs1_netbsd_arm64.go /src/goroot/src/runtime/defs1_solaris_amd64.go /src/goroot/src/runtime/defs2_linux.go /src/goroot/src/runtime/defs3_linux.go /src/goroot/src/runtime/defs_aix.go /src/goroot/src/runtime/defs_aix_ppc64.go /src/goroot/src/runtime/defs_arm_linux.go /src/goroot/src/runtime/defs_darwin.go /src/goroot/src/runtime/defs_darwin_amd64.go /src/goroot/src/runtime/defs_darwin_arm64.go /src/goroot/src/runtime/defs_dragonfly.go /src/goroot/src/runtime/defs_dragonfly_amd64.go /src/goroot/src/runtime/defs_freebsd.go /src/goroot/src/runtime/defs_freebsd_386.go /src/goroot/src/runtime/defs_freebsd_amd64.go /src/goroot/src/runtime/defs_freebsd_arm.go /src/goroot/src/runtime/defs_freebsd_arm64.go /src/goroot/src/runtime/defs_freebsd_riscv64.go /src/goroot/src/runtime/defs_illumos_amd64.go /src/goroot/src/runtime/defs_linux.go /src/goroot/src/runtime/defs_linux_386.go /src/goroot/src/runtime/defs_linux_amd64.go /src/goroot/src/runtime/defs_linux_arm.go /src/goroot/src/runtime/defs_linux_arm64.go /src/goroot/src/runtime/defs_linux_loong64.go /src/goroot/src/runtime/defs_linux_mips64x.go /src/goroot/src/runtime/defs_linux_mipsx.go /src/goroot/src/runtime/defs_linux_ppc64.go /src/goroot/src/runtime/defs_linux_ppc64le.go /src/goroot/src/runtime/defs_linux_riscv64.go /src/goroot/src/runtime/defs_linux_s390x.go /src/goroot/src/runtime/defs_netbsd.go /src/goroot/src/runtime/defs_netbsd_386.go /src/goroot/src/runtime/defs_netbsd_amd64.go /src/goroot/src/runtime/defs_netbsd_arm.go /src/goroot/src/runtime/defs_openbsd.go /src/goroot/src/runtime/defs_openbsd_386.go /src/goroot/src/runtime/defs_openbsd_amd64.go /src/goroot/src/runtime/defs_openbsd_arm.go /src/goroot/src/runtime/defs_openbsd_arm64.go /src/goroot/src/runtime/defs_openbsd_mips64.go /src/goroot/src/runtime/defs_openbsd_ppc64.go /src/goroot/src/runtime/defs_openbsd_riscv64.go /src/goroot/src/runtime/defs_plan9_386.go /src/goroot/src/runtime/defs_plan9_amd64.go /src/goroot/src/runtime/defs_plan9_arm.go /src/goroot/src/runtime/defs_solaris.go /src/goroot/src/runtime/defs_solaris_amd64.go /src/goroot/src/runtime/defs_windows.go /src/goroot/src/runtime/defs_windows_386.go /src/goroot/src/runtime/defs_windows_amd64.go /src/goroot/src/runtime/defs_windows_arm.go /src/goroot/src/runtime/defs_windows_arm64.go /src/goroot/src/runtime/ehooks_test.go /src/goroot/src/runtime/env_plan9.go /src/goroot/src/runtime/env_posix.go /src/goroot/src/runtime/env_test.go /src/goroot/src/runtime/error.go /src/goroot/src/runtime/example_test.go /src/goroot/src/runtime/exithook.go /src/goroot/src/runtime/export_aix_test.go /src/goroot/src/runtime/export_arm_test.go /src/goroot/src/runtime/export_darwin_test.go /src/goroot/src/runtime/export_debug_amd64_test.go /src/goroot/src/runtime/export_debug_arm64_test.go /src/goroot/src/runtime/export_debug_ppc64le_test.go /src/goroot/src/runtime/export_debug_test.go /src/goroot/src/runtime/export_debuglog_test.go /src/goroot/src/runtime/export_linux_test.go /src/goroot/src/runtime/export_mmap_test.go /src/goroot/src/runtime/export_pipe2_test.go /src/goroot/src/runtime/export_pipe_test.go /src/goroot/src/runtime/export_test.go /src/goroot/src/runtime/export_unix_test.go /src/goroot/src/runtime/export_windows_test.go /src/goroot/src/runtime/extern.go /src/goroot/src/runtime/fastlog2.go /src/goroot/src/runtime/fastlog2_test.go /src/goroot/src/runtime/fastlog2table.go /src/goroot/src/runtime/fds_nonunix.go /src/goroot/src/runtime/fds_test.go /src/goroot/src/runtime/fds_unix.go /src/goroot/src/runtime/float.go /src/goroot/src/runtime/float_test.go /src/goroot/src/runtime/gc_test.go /src/goroot/src/runtime/gcinfo_test.go /src/goroot/src/runtime/hash32.go /src/goroot/src/runtime/hash64.go /src/goroot/src/runtime/hash_test.go /src/goroot/src/runtime/heap_test.go /src/goroot/src/runtime/heapdump.go /src/goroot/src/runtime/histogram.go /src/goroot/src/runtime/histogram_test.go /src/goroot/src/runtime/iface.go /src/goroot/src/runtime/iface_test.go /src/goroot/src/runtime/import_test.go /src/goroot/src/runtime/importx_test.go /src/goroot/src/runtime/lfstack.go /src/goroot/src/runtime/lfstack_test.go /src/goroot/src/runtime/libfuzzer.go /src/goroot/src/runtime/lock_futex.go /src/goroot/src/runtime/lock_js.go /src/goroot/src/runtime/lock_sema.go /src/goroot/src/runtime/lock_wasip1.go /src/goroot/src/runtime/lockrank.go /src/goroot/src/runtime/lockrank_off.go /src/goroot/src/runtime/lockrank_on.go /src/goroot/src/runtime/lockrank_test.go /src/goroot/src/runtime/malloc.go /src/goroot/src/runtime/malloc_test.go /src/goroot/src/runtime/map.go /src/goroot/src/runtime/map_benchmark_test.go /src/goroot/src/runtime/map_fast32.go /src/goroot/src/runtime/map_fast64.go /src/goroot/src/runtime/map_faststr.go /src/goroot/src/runtime/map_test.go /src/goroot/src/runtime/mbarrier.go /src/goroot/src/runtime/mbitmap.go /src/goroot/src/runtime/mbitmap_allocheaders.go /src/goroot/src/runtime/mbitmap_noallocheaders.go /src/goroot/src/runtime/mcache.go /src/goroot/src/runtime/mcentral.go /src/goroot/src/runtime/mcheckmark.go /src/goroot/src/runtime/mem.go /src/goroot/src/runtime/mem_aix.go /src/goroot/src/runtime/mem_bsd.go /src/goroot/src/runtime/mem_darwin.go /src/goroot/src/runtime/mem_js.go /src/goroot/src/runtime/mem_linux.go /src/goroot/src/runtime/mem_plan9.go /src/goroot/src/runtime/mem_sbrk.go /src/goroot/src/runtime/mem_wasip1.go /src/goroot/src/runtime/mem_wasm.go /src/goroot/src/runtime/mem_windows.go /src/goroot/src/runtime/memmove_linux_amd64_test.go /src/goroot/src/runtime/memmove_test.go /src/goroot/src/runtime/metrics.go /src/goroot/src/runtime/metrics_test.go /src/goroot/src/runtime/mfinal.go /src/goroot/src/runtime/mfinal_test.go /src/goroot/src/runtime/mfixalloc.go /src/goroot/src/runtime/mgc.go /src/goroot/src/runtime/mgclimit.go /src/goroot/src/runtime/mgclimit_test.go /src/goroot/src/runtime/mgcmark.go /src/goroot/src/runtime/mgcpacer.go /src/goroot/src/runtime/mgcpacer_test.go /src/goroot/src/runtime/mgcscavenge.go /src/goroot/src/runtime/mgcscavenge_test.go /src/goroot/src/runtime/mgcstack.go /src/goroot/src/runtime/mgcsweep.go /src/goroot/src/runtime/mgcwork.go /src/goroot/src/runtime/mheap.go /src/goroot/src/runtime/minmax.go /src/goroot/src/runtime/minmax_test.go /src/goroot/src/runtime/mkduff.go /src/goroot/src/runtime/mkfastlog2table.go /src/goroot/src/runtime/mklockrank.go /src/goroot/src/runtime/mkpreempt.go /src/goroot/src/runtime/mksizeclasses.go /src/goroot/src/runtime/mmap.go /src/goroot/src/runtime/mpagealloc.go /src/goroot/src/runtime/mpagealloc_32bit.go /src/goroot/src/runtime/mpagealloc_64bit.go /src/goroot/src/runtime/mpagealloc_test.go /src/goroot/src/runtime/mpagecache.go /src/goroot/src/runtime/mpagecache_test.go /src/goroot/src/runtime/mpallocbits.go /src/goroot/src/runtime/mpallocbits_test.go /src/goroot/src/runtime/mprof.go /src/goroot/src/runtime/mranges.go /src/goroot/src/runtime/mranges_test.go /src/goroot/src/runtime/msan.go /src/goroot/src/runtime/msan0.go /src/goroot/src/runtime/msize_allocheaders.go /src/goroot/src/runtime/msize_noallocheaders.go /src/goroot/src/runtime/mspanset.go /src/goroot/src/runtime/mstats.go /src/goroot/src/runtime/mwbbuf.go /src/goroot/src/runtime/nbpipe_pipe.go /src/goroot/src/runtime/nbpipe_pipe2.go /src/goroot/src/runtime/nbpipe_pipe_test.go /src/goroot/src/runtime/nbpipe_test.go /src/goroot/src/runtime/net_plan9.go /src/goroot/src/runtime/netpoll.go /src/goroot/src/runtime/netpoll_aix.go /src/goroot/src/runtime/netpoll_epoll.go /src/goroot/src/runtime/netpoll_fake.go /src/goroot/src/runtime/netpoll_kqueue.go /src/goroot/src/runtime/netpoll_os_test.go /src/goroot/src/runtime/netpoll_solaris.go /src/goroot/src/runtime/netpoll_stub.go /src/goroot/src/runtime/netpoll_wasip1.go /src/goroot/src/runtime/netpoll_windows.go /src/goroot/src/runtime/nonwindows_stub.go /src/goroot/src/runtime/norace_linux_test.go /src/goroot/src/runtime/norace_test.go /src/goroot/src/runtime/numcpu_freebsd_test.go /src/goroot/src/runtime/os2_aix.go /src/goroot/src/runtime/os2_freebsd.go /src/goroot/src/runtime/os2_openbsd.go /src/goroot/src/runtime/os2_plan9.go /src/goroot/src/runtime/os2_solaris.go /src/goroot/src/runtime/os3_plan9.go /src/goroot/src/runtime/os3_solaris.go /src/goroot/src/runtime/os_aix.go /src/goroot/src/runtime/os_android.go /src/goroot/src/runtime/os_darwin.go /src/goroot/src/runtime/os_darwin_arm64.go /src/goroot/src/runtime/os_dragonfly.go /src/goroot/src/runtime/os_freebsd.go /src/goroot/src/runtime/os_freebsd2.go /src/goroot/src/runtime/os_freebsd_amd64.go /src/goroot/src/runtime/os_freebsd_arm.go /src/goroot/src/runtime/os_freebsd_arm64.go /src/goroot/src/runtime/os_freebsd_noauxv.go /src/goroot/src/runtime/os_freebsd_riscv64.go /src/goroot/src/runtime/os_illumos.go /src/goroot/src/runtime/os_js.go /src/goroot/src/runtime/os_linux.go /src/goroot/src/runtime/os_linux_arm.go /src/goroot/src/runtime/os_linux_arm64.go /src/goroot/src/runtime/os_linux_be64.go /src/goroot/src/runtime/os_linux_generic.go /src/goroot/src/runtime/os_linux_loong64.go /src/goroot/src/runtime/os_linux_mips64x.go /src/goroot/src/runtime/os_linux_mipsx.go /src/goroot/src/runtime/os_linux_noauxv.go /src/goroot/src/runtime/os_linux_novdso.go /src/goroot/src/runtime/os_linux_ppc64x.go /src/goroot/src/runtime/os_linux_riscv64.go /src/goroot/src/runtime/os_linux_s390x.go /src/goroot/src/runtime/os_linux_x86.go /src/goroot/src/runtime/os_netbsd.go /src/goroot/src/runtime/os_netbsd_386.go /src/goroot/src/runtime/os_netbsd_amd64.go /src/goroot/src/runtime/os_netbsd_arm.go /src/goroot/src/runtime/os_netbsd_arm64.go /src/goroot/src/runtime/os_nonopenbsd.go /src/goroot/src/runtime/os_only_solaris.go /src/goroot/src/runtime/os_openbsd.go /src/goroot/src/runtime/os_openbsd_arm.go /src/goroot/src/runtime/os_openbsd_arm64.go /src/goroot/src/runtime/os_openbsd_libc.go /src/goroot/src/runtime/os_openbsd_mips64.go /src/goroot/src/runtime/os_openbsd_syscall.go /src/goroot/src/runtime/os_openbsd_syscall1.go /src/goroot/src/runtime/os_openbsd_syscall2.go /src/goroot/src/runtime/os_plan9.go /src/goroot/src/runtime/os_plan9_arm.go /src/goroot/src/runtime/os_solaris.go /src/goroot/src/runtime/os_unix.go /src/goroot/src/runtime/os_unix_nonlinux.go /src/goroot/src/runtime/os_wasip1.go /src/goroot/src/runtime/os_wasm.go /src/goroot/src/runtime/os_windows.go /src/goroot/src/runtime/os_windows_arm.go /src/goroot/src/runtime/os_windows_arm64.go /src/goroot/src/runtime/pagetrace_off.go /src/goroot/src/runtime/pagetrace_on.go /src/goroot/src/runtime/panic.go /src/goroot/src/runtime/panic32.go /src/goroot/src/runtime/panic_test.go /src/goroot/src/runtime/panicnil_test.go /src/goroot/src/runtime/pinner.go /src/goroot/src/runtime/pinner_test.go /src/goroot/src/runtime/plugin.go /src/goroot/src/runtime/preempt.go /src/goroot/src/runtime/preempt_nonwindows.go /src/goroot/src/runtime/print.go /src/goroot/src/runtime/proc.go /src/goroot/src/runtime/proc_runtime_test.go /src/goroot/src/runtime/proc_test.go /src/goroot/src/runtime/profbuf.go /src/goroot/src/runtime/profbuf_test.go /src/goroot/src/runtime/proflabel.go /src/goroot/src/runtime/race.go /src/goroot/src/runtime/race0.go /src/goroot/src/runtime/rand_test.go /src/goroot/src/runtime/rdebug.go /src/goroot/src/runtime/retry.go /src/goroot/src/runtime/runtime-gdb_test.go /src/goroot/src/runtime/runtime-gdb_unix_test.go /src/goroot/src/runtime/runtime-lldb_test.go /src/goroot/src/runtime/runtime-seh_windows_test.go /src/goroot/src/runtime/runtime.go /src/goroot/src/runtime/runtime1.go /src/goroot/src/runtime/runtime2.go /src/goroot/src/runtime/runtime_boring.go /src/goroot/src/runtime/runtime_linux_test.go /src/goroot/src/runtime/runtime_mmap_test.go /src/goroot/src/runtime/runtime_test.go /src/goroot/src/runtime/runtime_unix_test.go /src/goroot/src/runtime/rwmutex.go /src/goroot/src/runtime/rwmutex_test.go /src/goroot/src/runtime/security_aix.go /src/goroot/src/runtime/security_issetugid.go /src/goroot/src/runtime/security_linux.go /src/goroot/src/runtime/security_nonunix.go /src/goroot/src/runtime/security_test.go /src/goroot/src/runtime/security_unix.go /src/goroot/src/runtime/select.go /src/goroot/src/runtime/sema.go /src/goroot/src/runtime/sema_test.go /src/goroot/src/runtime/semasleep_test.go /src/goroot/src/runtime/sigaction.go /src/goroot/src/runtime/signal_386.go /src/goroot/src/runtime/signal_aix_ppc64.go /src/goroot/src/runtime/signal_amd64.go /src/goroot/src/runtime/signal_arm.go /src/goroot/src/runtime/signal_arm64.go /src/goroot/src/runtime/signal_darwin.go /src/goroot/src/runtime/signal_darwin_amd64.go /src/goroot/src/runtime/signal_darwin_arm64.go /src/goroot/src/runtime/signal_dragonfly.go /src/goroot/src/runtime/signal_dragonfly_amd64.go /src/goroot/src/runtime/signal_freebsd.go /src/goroot/src/runtime/signal_freebsd_386.go /src/goroot/src/runtime/signal_freebsd_amd64.go /src/goroot/src/runtime/signal_freebsd_arm.go /src/goroot/src/runtime/signal_freebsd_arm64.go /src/goroot/src/runtime/signal_freebsd_riscv64.go /src/goroot/src/runtime/signal_linux_386.go /src/goroot/src/runtime/signal_linux_amd64.go /src/goroot/src/runtime/signal_linux_arm.go /src/goroot/src/runtime/signal_linux_arm64.go /src/goroot/src/runtime/signal_linux_loong64.go /src/goroot/src/runtime/signal_linux_mips64x.go /src/goroot/src/runtime/signal_linux_mipsx.go /src/goroot/src/runtime/signal_linux_ppc64x.go /src/goroot/src/runtime/signal_linux_riscv64.go /src/goroot/src/runtime/signal_linux_s390x.go /src/goroot/src/runtime/signal_loong64.go /src/goroot/src/runtime/signal_mips64x.go /src/goroot/src/runtime/signal_mipsx.go /src/goroot/src/runtime/signal_netbsd.go /src/goroot/src/runtime/signal_netbsd_386.go /src/goroot/src/runtime/signal_netbsd_amd64.go /src/goroot/src/runtime/signal_netbsd_arm.go /src/goroot/src/runtime/signal_netbsd_arm64.go /src/goroot/src/runtime/signal_openbsd.go /src/goroot/src/runtime/signal_openbsd_386.go /src/goroot/src/runtime/signal_openbsd_amd64.go /src/goroot/src/runtime/signal_openbsd_arm.go /src/goroot/src/runtime/signal_openbsd_arm64.go /src/goroot/src/runtime/signal_openbsd_mips64.go /src/goroot/src/runtime/signal_openbsd_ppc64.go /src/goroot/src/runtime/signal_openbsd_riscv64.go /src/goroot/src/runtime/signal_plan9.go /src/goroot/src/runtime/signal_ppc64x.go /src/goroot/src/runtime/signal_riscv64.go /src/goroot/src/runtime/signal_solaris.go /src/goroot/src/runtime/signal_solaris_amd64.go /src/goroot/src/runtime/signal_unix.go /src/goroot/src/runtime/signal_windows.go /src/goroot/src/runtime/signal_windows_test.go /src/goroot/src/runtime/sigqueue.go /src/goroot/src/runtime/sigqueue_note.go /src/goroot/src/runtime/sigqueue_plan9.go /src/goroot/src/runtime/sigtab_aix.go /src/goroot/src/runtime/sigtab_linux_generic.go /src/goroot/src/runtime/sigtab_linux_mipsx.go /src/goroot/src/runtime/sizeclasses.go /src/goroot/src/runtime/sizeof_test.go /src/goroot/src/runtime/slice.go /src/goroot/src/runtime/slice_test.go /src/goroot/src/runtime/softfloat64.go /src/goroot/src/runtime/softfloat64_test.go /src/goroot/src/runtime/stack.go /src/goroot/src/runtime/stack_test.go /src/goroot/src/runtime/start_line_amd64_test.go /src/goroot/src/runtime/start_line_test.go /src/goroot/src/runtime/stkframe.go /src/goroot/src/runtime/string.go /src/goroot/src/runtime/string_test.go /src/goroot/src/runtime/stubs.go /src/goroot/src/runtime/stubs2.go /src/goroot/src/runtime/stubs3.go /src/goroot/src/runtime/stubs_386.go /src/goroot/src/runtime/stubs_amd64.go /src/goroot/src/runtime/stubs_arm.go /src/goroot/src/runtime/stubs_arm64.go /src/goroot/src/runtime/stubs_linux.go /src/goroot/src/runtime/stubs_loong64.go /src/goroot/src/runtime/stubs_mips64x.go /src/goroot/src/runtime/stubs_mipsx.go /src/goroot/src/runtime/stubs_nonlinux.go /src/goroot/src/runtime/stubs_ppc64.go /src/goroot/src/runtime/stubs_ppc64x.go /src/goroot/src/runtime/stubs_riscv64.go /src/goroot/src/runtime/stubs_s390x.go /src/goroot/src/runtime/symtab.go /src/goroot/src/runtime/symtab_test.go /src/goroot/src/runtime/symtabinl.go /src/goroot/src/runtime/symtabinl_test.go /src/goroot/src/runtime/sys_arm.go /src/goroot/src/runtime/sys_arm64.go /src/goroot/src/runtime/sys_darwin.go /src/goroot/src/runtime/sys_darwin_arm64.go /src/goroot/src/runtime/sys_libc.go /src/goroot/src/runtime/sys_loong64.go /src/goroot/src/runtime/sys_mips64x.go /src/goroot/src/runtime/sys_mipsx.go /src/goroot/src/runtime/sys_nonppc64x.go /src/goroot/src/runtime/sys_openbsd.go /src/goroot/src/runtime/sys_openbsd1.go /src/goroot/src/runtime/sys_openbsd2.go /src/goroot/src/runtime/sys_openbsd3.go /src/goroot/src/runtime/sys_ppc64x.go /src/goroot/src/runtime/sys_riscv64.go /src/goroot/src/runtime/sys_s390x.go /src/goroot/src/runtime/sys_wasm.go /src/goroot/src/runtime/sys_x86.go /src/goroot/src/runtime/syscall2_solaris.go /src/goroot/src/runtime/syscall_aix.go /src/goroot/src/runtime/syscall_solaris.go /src/goroot/src/runtime/syscall_unix_test.go /src/goroot/src/runtime/syscall_windows.go /src/goroot/src/runtime/syscall_windows_test.go /src/goroot/src/runtime/tagptr.go /src/goroot/src/runtime/tagptr_32bit.go /src/goroot/src/runtime/tagptr_64bit.go /src/goroot/src/runtime/test_amd64.go /src/goroot/src/runtime/test_stubs.go /src/goroot/src/runtime/time.go /src/goroot/src/runtime/time_fake.go /src/goroot/src/runtime/time_nofake.go /src/goroot/src/runtime/time_test.go /src/goroot/src/runtime/timeasm.go /src/goroot/src/runtime/timestub.go /src/goroot/src/runtime/timestub2.go /src/goroot/src/runtime/tls_stub.go /src/goroot/src/runtime/tls_windows_amd64.go /src/goroot/src/runtime/trace.go /src/goroot/src/runtime/trace2.go /src/goroot/src/runtime/trace2buf.go /src/goroot/src/runtime/trace2cpu.go /src/goroot/src/runtime/trace2event.go /src/goroot/src/runtime/trace2map.go /src/goroot/src/runtime/trace2region.go /src/goroot/src/runtime/trace2runtime.go /src/goroot/src/runtime/trace2stack.go /src/goroot/src/runtime/trace2status.go /src/goroot/src/runtime/trace2string.go /src/goroot/src/runtime/trace2time.go /src/goroot/src/runtime/trace_cgo_test.go /src/goroot/src/runtime/traceback.go /src/goroot/src/runtime/traceback_test.go /src/goroot/src/runtime/tracebackx_test.go /src/goroot/src/runtime/type.go /src/goroot/src/runtime/typekind.go /src/goroot/src/runtime/unsafe.go /src/goroot/src/runtime/unsafepoint_test.go /src/goroot/src/runtime/utf8.go /src/goroot/src/runtime/vdso_elf32.go /src/goroot/src/runtime/vdso_elf64.go /src/goroot/src/runtime/vdso_freebsd.go /src/goroot/src/runtime/vdso_freebsd_arm.go /src/goroot/src/runtime/vdso_freebsd_arm64.go /src/goroot/src/runtime/vdso_freebsd_riscv64.go /src/goroot/src/runtime/vdso_freebsd_x86.go /src/goroot/src/runtime/vdso_in_none.go /src/goroot/src/runtime/vdso_linux.go /src/goroot/src/runtime/vdso_linux_386.go /src/goroot/src/runtime/vdso_linux_amd64.go /src/goroot/src/runtime/vdso_linux_arm.go /src/goroot/src/runtime/vdso_linux_arm64.go /src/goroot/src/runtime/vdso_linux_loong64.go /src/goroot/src/runtime/vdso_linux_mips64x.go /src/goroot/src/runtime/vdso_linux_ppc64x.go /src/goroot/src/runtime/vdso_linux_riscv64.go /src/goroot/src/runtime/vdso_linux_s390x.go /src/goroot/src/runtime/vdso_test.go /src/goroot/src/runtime/vlop_arm_test.go /src/goroot/src/runtime/vlrt.go /src/goroot/src/runtime/wincallback.go /src/goroot/src/runtime/write_err.go /src/goroot/src/runtime/write_err_android.go /src/goroot/src/runtime/zcallback_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 531 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude Goexit,ReadTrace,GOMAXPROCS,StopTrace,SetFinalizer'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude Goexit,ReadTrace,GOMAXPROCS,StopTrace,SetFinalizer runtime fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Found package in /src/goroot/src/runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Array result for uintptr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Array result for uintptr is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Type Pinner is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Type TypeAssertionError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Type PanicNilError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function RuntimeError has unproduced recv TypeAssertionError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Error has unproduced recv TypeAssertionError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Callers has unproduced array argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Stack has unproduced recv StackRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function InUseBytes has unproduced recv MemProfileRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function InUseObjects has unproduced recv MemProfileRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Stack has unproduced recv MemProfileRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function MemProfile has unproduced array argument MemProfileRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function BlockProfile has unproduced array argument BlockProfileRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function MutexProfile has unproduced array argument BlockProfileRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function ThreadCreateProfile has unproduced array argument StackRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function GoroutineProfile has unproduced array argument StackRecord
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function ReadMemStats has unproduced argument MemStats
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Error has unproduced recv PanicNilError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function RuntimeError has unproduced recv PanicNilError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Pin has unproduced recv Pinner
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function Unpin has unproduced recv Pinner
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function CallersFrames has unproduced array argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function FuncForPC has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function FileLine has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:23 Function SetCgoTraceback has unproduced argument unsafe.Pointer
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime/copy/alg.go fuzz_ng_runtime/copy/arena.go fuzz_ng_runtime/copy/asan0.go fuzz_ng_runtime/copy/atomic_pointer.go fuzz_ng_runtime/copy/cgo.go fuzz_ng_runtime/copy/cgo_mmap.go fuzz_ng_runtime/copy/cgo_sigaction.go fuzz_ng_runtime/copy/cgocall.go fuzz_ng_runtime/copy/cgocallback.go fuzz_ng_runtime/copy/cgocheck.go fuzz_ng_runtime/copy/chan.go fuzz_ng_runtime/copy/checkptr.go fuzz_ng_runtime/copy/compiler.go fuzz_ng_runtime/copy/complex.go fuzz_ng_runtime/copy/covercounter.go fuzz_ng_runtime/copy/covermeta.go fuzz_ng_runtime/copy/cpuflags.go fuzz_ng_runtime/copy/cpuflags_amd64.go fuzz_ng_runtime/copy/cpuprof.go fuzz_ng_runtime/copy/cputicks.go fuzz_ng_runtime/copy/create_file_unix.go fuzz_ng_runtime/copy/debug.go fuzz_ng_runtime/copy/debugcall.go fuzz_ng_runtime/copy/debuglog.go fuzz_ng_runtime/copy/debuglog_off.go fuzz_ng_runtime/copy/defs_linux_amd64.go fuzz_ng_runtime/copy/env_posix.go fuzz_ng_runtime/copy/error.go fuzz_ng_runtime/copy/exithook.go fuzz_ng_runtime/copy/extern.go fuzz_ng_runtime/copy/fastlog2.go fuzz_ng_runtime/copy/fastlog2table.go fuzz_ng_runtime/copy/fds_unix.go fuzz_ng_runtime/copy/float.go fuzz_ng_runtime/copy/hash64.go fuzz_ng_runtime/copy/heapdump.go fuzz_ng_runtime/copy/histogram.go fuzz_ng_runtime/copy/iface.go fuzz_ng_runtime/copy/lfstack.go fuzz_ng_runtime/copy/lock_futex.go fuzz_ng_runtime/copy/lockrank.go fuzz_ng_runtime/copy/lockrank_off.go fuzz_ng_runtime/copy/malloc.go fuzz_ng_runtime/copy/map.go fuzz_ng_runtime/copy/map_fast32.go fuzz_ng_runtime/copy/map_fast64.go fuzz_ng_runtime/copy/map_faststr.go fuzz_ng_runtime/copy/mbarrier.go fuzz_ng_runtime/copy/mbitmap.go fuzz_ng_runtime/copy/mbitmap_allocheaders.go fuzz_ng_runtime/copy/mcache.go fuzz_ng_runtime/copy/mcentral.go fuzz_ng_runtime/copy/mcheckmark.go fuzz_ng_runtime/copy/mem.go fuzz_ng_runtime/copy/mem_linux.go fuzz_ng_runtime/copy/metrics.go fuzz_ng_runtime/copy/mfinal.go fuzz_ng_runtime/copy/mfixalloc.go fuzz_ng_runtime/copy/mgc.go fuzz_ng_runtime/copy/mgclimit.go fuzz_ng_runtime/copy/mgcmark.go fuzz_ng_runtime/copy/mgcpacer.go fuzz_ng_runtime/copy/mgcscavenge.go fuzz_ng_runtime/copy/mgcstack.go fuzz_ng_runtime/copy/mgcsweep.go fuzz_ng_runtime/copy/mgcwork.go fuzz_ng_runtime/copy/mheap.go fuzz_ng_runtime/copy/minmax.go fuzz_ng_runtime/copy/mpagealloc.go fuzz_ng_runtime/copy/mpagealloc_64bit.go fuzz_ng_runtime/copy/mpagecache.go fuzz_ng_runtime/copy/mpallocbits.go fuzz_ng_runtime/copy/mprof.go fuzz_ng_runtime/copy/mranges.go fuzz_ng_runtime/copy/msan0.go fuzz_ng_runtime/copy/msize_allocheaders.go fuzz_ng_runtime/copy/mspanset.go fuzz_ng_runtime/copy/mstats.go fuzz_ng_runtime/copy/mwbbuf.go fuzz_ng_runtime/copy/nbpipe_pipe2.go fuzz_ng_runtime/copy/netpoll.go fuzz_ng_runtime/copy/netpoll_epoll.go fuzz_ng_runtime/copy/nonwindows_stub.go fuzz_ng_runtime/copy/os_linux.go fuzz_ng_runtime/copy/os_linux_generic.go fuzz_ng_runtime/copy/os_linux_noauxv.go fuzz_ng_runtime/copy/os_linux_x86.go fuzz_ng_runtime/copy/os_nonopenbsd.go fuzz_ng_runtime/copy/os_unix.go fuzz_ng_runtime/copy/pagetrace_off.go fuzz_ng_runtime/copy/panic.go fuzz_ng_runtime/copy/pinner.go fuzz_ng_runtime/copy/plugin.go fuzz_ng_runtime/copy/preempt.go fuzz_ng_runtime/copy/preempt_nonwindows.go fuzz_ng_runtime/copy/print.go fuzz_ng_runtime/copy/proc.go fuzz_ng_runtime/copy/profbuf.go fuzz_ng_runtime/copy/proflabel.go fuzz_ng_runtime/copy/race0.go fuzz_ng_runtime/copy/rdebug.go fuzz_ng_runtime/copy/retry.go fuzz_ng_runtime/copy/runtime.go fuzz_ng_runtime/copy/runtime1.go fuzz_ng_runtime/copy/runtime2.go fuzz_ng_runtime/copy/runtime_boring.go fuzz_ng_runtime/copy/rwmutex.go fuzz_ng_runtime/copy/security_linux.go fuzz_ng_runtime/copy/security_unix.go fuzz_ng_runtime/copy/select.go fuzz_ng_runtime/copy/sema.go fuzz_ng_runtime/copy/signal_amd64.go fuzz_ng_runtime/copy/signal_linux_amd64.go fuzz_ng_runtime/copy/signal_unix.go fuzz_ng_runtime/copy/sigqueue.go fuzz_ng_runtime/copy/sigqueue_note.go fuzz_ng_runtime/copy/sigtab_linux_generic.go fuzz_ng_runtime/copy/sizeclasses.go fuzz_ng_runtime/copy/slice.go fuzz_ng_runtime/copy/softfloat64.go fuzz_ng_runtime/copy/stack.go fuzz_ng_runtime/copy/stkframe.go fuzz_ng_runtime/copy/string.go fuzz_ng_runtime/copy/stubs.go fuzz_ng_runtime/copy/stubs2.go fuzz_ng_runtime/copy/stubs3.go fuzz_ng_runtime/copy/stubs_amd64.go fuzz_ng_runtime/copy/stubs_linux.go fuzz_ng_runtime/copy/symtab.go fuzz_ng_runtime/copy/symtabinl.go fuzz_ng_runtime/copy/sys_nonppc64x.go fuzz_ng_runtime/copy/sys_x86.go fuzz_ng_runtime/copy/tagptr.go fuzz_ng_runtime/copy/tagptr_64bit.go fuzz_ng_runtime/copy/test_amd64.go fuzz_ng_runtime/copy/time.go fuzz_ng_runtime/copy/time_nofake.go fuzz_ng_runtime/copy/timeasm.go fuzz_ng_runtime/copy/tls_stub.go fuzz_ng_runtime/copy/trace2.go fuzz_ng_runtime/copy/trace2buf.go fuzz_ng_runtime/copy/trace2cpu.go fuzz_ng_runtime/copy/trace2event.go fuzz_ng_runtime/copy/trace2map.go fuzz_ng_runtime/copy/trace2region.go fuzz_ng_runtime/copy/trace2runtime.go fuzz_ng_runtime/copy/trace2stack.go fuzz_ng_runtime/copy/trace2status.go fuzz_ng_runtime/copy/trace2string.go fuzz_ng_runtime/copy/trace2time.go fuzz_ng_runtime/copy/traceback.go fuzz_ng_runtime/copy/type.go fuzz_ng_runtime/copy/typekind.go fuzz_ng_runtime/copy/unsafe.go fuzz_ng_runtime/copy/utf8.go fuzz_ng_runtime/copy/vdso_elf64.go fuzz_ng_runtime/copy/vdso_linux.go fuzz_ng_runtime/copy/vdso_linux_amd64.go fuzz_ng_runtime/copy/write_err.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime/copy/alg.go fuzz_ng_runtime/copy/arena.go fuzz_ng_runtime/copy/asan0.go fuzz_ng_runtime/copy/atomic_pointer.go fuzz_ng_runtime/copy/cgo.go fuzz_ng_runtime/copy/cgo_mmap.go fuzz_ng_runtime/copy/cgo_sigaction.go fuzz_ng_runtime/copy/cgocall.go fuzz_ng_runtime/copy/cgocallback.go fuzz_ng_runtime/copy/cgocheck.go fuzz_ng_runtime/copy/chan.go fuzz_ng_runtime/copy/checkptr.go fuzz_ng_runtime/copy/compiler.go fuzz_ng_runtime/copy/complex.go fuzz_ng_runtime/copy/covercounter.go fuzz_ng_runtime/copy/covermeta.go fuzz_ng_runtime/copy/cpuflags.go fuzz_ng_runtime/copy/cpuflags_amd64.go fuzz_ng_runtime/copy/cpuprof.go fuzz_ng_runtime/copy/cputicks.go fuzz_ng_runtime/copy/create_file_unix.go fuzz_ng_runtime/copy/debug.go fuzz_ng_runtime/copy/debugcall.go fuzz_ng_runtime/copy/debuglog.go fuzz_ng_runtime/copy/debuglog_off.go fuzz_ng_runtime/copy/defs_linux_amd64.go fuzz_ng_runtime/copy/env_posix.go fuzz_ng_runtime/copy/error.go fuzz_ng_runtime/copy/exithook.go fuzz_ng_runtime/copy/extern.go fuzz_ng_runtime/copy/fastlog2.go fuzz_ng_runtime/copy/fastlog2table.go fuzz_ng_runtime/copy/fds_unix.go fuzz_ng_runtime/copy/float.go fuzz_ng_runtime/copy/hash64.go fuzz_ng_runtime/copy/heapdump.go fuzz_ng_runtime/copy/histogram.go fuzz_ng_runtime/copy/iface.go fuzz_ng_runtime/copy/lfstack.go fuzz_ng_runtime/copy/lock_futex.go fuzz_ng_runtime/copy/lockrank.go fuzz_ng_runtime/copy/lockrank_off.go fuzz_ng_runtime/copy/malloc.go fuzz_ng_runtime/copy/map.go fuzz_ng_runtime/copy/map_fast32.go fuzz_ng_runtime/copy/map_fast64.go fuzz_ng_runtime/copy/map_faststr.go fuzz_ng_runtime/copy/mbarrier.go fuzz_ng_runtime/copy/mbitmap.go fuzz_ng_runtime/copy/mbitmap_allocheaders.go fuzz_ng_runtime/copy/mcache.go fuzz_ng_runtime/copy/mcentral.go fuzz_ng_runtime/copy/mcheckmark.go fuzz_ng_runtime/copy/mem.go fuzz_ng_runtime/copy/mem_linux.go fuzz_ng_runtime/copy/metrics.go fuzz_ng_runtime/copy/mfinal.go fuzz_ng_runtime/copy/mfixalloc.go fuzz_ng_runtime/copy/mgc.go fuzz_ng_runtime/copy/mgclimit.go fuzz_ng_runtime/copy/mgcmark.go fuzz_ng_runtime/copy/mgcpacer.go fuzz_ng_runtime/copy/mgcscavenge.go fuzz_ng_runtime/copy/mgcstack.go fuzz_ng_runtime/copy/mgcsweep.go fuzz_ng_runtime/copy/mgcwork.go fuzz_ng_runtime/copy/mheap.go fuzz_ng_runtime/copy/minmax.go fuzz_ng_runtime/copy/mpagealloc.go fuzz_ng_runtime/copy/mpagealloc_64bit.go fuzz_ng_runtime/copy/mpagecache.go fuzz_ng_runtime/copy/mpallocbits.go fuzz_ng_runtime/copy/mprof.go fuzz_ng_runtime/copy/mranges.go fuzz_ng_runtime/copy/msan0.go fuzz_ng_runtime/copy/msize_allocheaders.go fuzz_ng_runtime/copy/mspanset.go fuzz_ng_runtime/copy/mstats.go fuzz_ng_runtime/copy/mwbbuf.go fuzz_ng_runtime/copy/nbpipe_pipe2.go fuzz_ng_runtime/copy/netpoll.go fuzz_ng_runtime/copy/netpoll_epoll.go fuzz_ng_runtime/copy/nonwindows_stub.go fuzz_ng_runtime/copy/os_linux.go fuzz_ng_runtime/copy/os_linux_generic.go fuzz_ng_runtime/copy/os_linux_noauxv.go fuzz_ng_runtime/copy/os_linux_x86.go fuzz_ng_runtime/copy/os_nonopenbsd.go fuzz_ng_runtime/copy/os_unix.go fuzz_ng_runtime/copy/pagetrace_off.go fuzz_ng_runtime/copy/panic.go fuzz_ng_runtime/copy/pinner.go fuzz_ng_runtime/copy/plugin.go fuzz_ng_runtime/copy/preempt.go fuzz_ng_runtime/copy/preempt_nonwindows.go fuzz_ng_runtime/copy/print.go fuzz_ng_runtime/copy/proc.go fuzz_ng_runtime/copy/profbuf.go fuzz_ng_runtime/copy/proflabel.go fuzz_ng_runtime/copy/race0.go fuzz_ng_runtime/copy/rdebug.go fuzz_ng_runtime/copy/retry.go fuzz_ng_runtime/copy/runtime.go fuzz_ng_runtime/copy/runtime1.go fuzz_ng_runtime/copy/runtime2.go fuzz_ng_runtime/copy/runtime_boring.go fuzz_ng_runtime/copy/rwmutex.go fuzz_ng_runtime/copy/security_linux.go fuzz_ng_runtime/copy/security_unix.go fuzz_ng_runtime/copy/select.go fuzz_ng_runtime/copy/sema.go fuzz_ng_runtime/copy/signal_amd64.go fuzz_ng_runtime/copy/signal_linux_amd64.go fuzz_ng_runtime/copy/signal_unix.go fuzz_ng_runtime/copy/sigqueue.go fuzz_ng_runtime/copy/sigqueue_note.go fuzz_ng_runtime/copy/sigtab_linux_generic.go fuzz_ng_runtime/copy/sizeclasses.go fuzz_ng_runtime/copy/slice.go fuzz_ng_runtime/copy/softfloat64.go fuzz_ng_runtime/copy/stack.go fuzz_ng_runtime/copy/stkframe.go fuzz_ng_runtime/copy/string.go fuzz_ng_runtime/copy/stubs.go fuzz_ng_runtime/copy/stubs2.go fuzz_ng_runtime/copy/stubs3.go fuzz_ng_runtime/copy/stubs_amd64.go fuzz_ng_runtime/copy/stubs_linux.go fuzz_ng_runtime/copy/symtab.go fuzz_ng_runtime/copy/symtabinl.go fuzz_ng_runtime/copy/sys_nonppc64x.go fuzz_ng_runtime/copy/sys_x86.go fuzz_ng_runtime/copy/tagptr.go fuzz_ng_runtime/copy/tagptr_64bit.go fuzz_ng_runtime/copy/test_amd64.go fuzz_ng_runtime/copy/time.go fuzz_ng_runtime/copy/time_nofake.go fuzz_ng_runtime/copy/timeasm.go fuzz_ng_runtime/copy/tls_stub.go fuzz_ng_runtime/copy/trace2.go fuzz_ng_runtime/copy/trace2buf.go fuzz_ng_runtime/copy/trace2cpu.go fuzz_ng_runtime/copy/trace2event.go fuzz_ng_runtime/copy/trace2map.go fuzz_ng_runtime/copy/trace2region.go fuzz_ng_runtime/copy/trace2runtime.go fuzz_ng_runtime/copy/trace2stack.go fuzz_ng_runtime/copy/trace2status.go fuzz_ng_runtime/copy/trace2string.go fuzz_ng_runtime/copy/trace2time.go fuzz_ng_runtime/copy/traceback.go fuzz_ng_runtime/copy/type.go fuzz_ng_runtime/copy/typekind.go fuzz_ng_runtime/copy/unsafe.go fuzz_ng_runtime/copy/utf8.go fuzz_ng_runtime/copy/vdso_elf64.go fuzz_ng_runtime/copy/vdso_linux.go fuzz_ng_runtime/copy/vdso_linux_amd64.go fuzz_ng_runtime/copy/write_err.go /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime/fuzz_ng.go fuzz_ng_runtime/fuzzng_unsure_test.go fuzz_ng_runtime/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/abi_test.go /src/goroot/src/runtime/align_runtime_test.go /src/goroot/src/runtime/align_test.go /src/goroot/src/runtime/arena_test.go /src/goroot/src/runtime/callers_test.go /src/goroot/src/runtime/chan_test.go /src/goroot/src/runtime/chanbarrier_test.go /src/goroot/src/runtime/checkptr_test.go /src/goroot/src/runtime/closure_test.go /src/goroot/src/runtime/complex_test.go /src/goroot/src/runtime/conv_wasm_test.go /src/goroot/src/runtime/crash_cgo_test.go /src/goroot/src/runtime/crash_test.go /src/goroot/src/runtime/crash_unix_test.go /src/goroot/src/runtime/debug_test.go /src/goroot/src/runtime/debuglog_test.go /src/goroot/src/runtime/defer_test.go /src/goroot/src/runtime/ehooks_test.go /src/goroot/src/runtime/env_test.go /src/goroot/src/runtime/example_test.go /src/goroot/src/runtime/export_aix_test.go /src/goroot/src/runtime/export_arm_test.go /src/goroot/src/runtime/export_darwin_test.go /src/goroot/src/runtime/export_debug_amd64_test.go /src/goroot/src/runtime/export_debug_arm64_test.go /src/goroot/src/runtime/export_debug_ppc64le_test.go /src/goroot/src/runtime/export_debug_test.go /src/goroot/src/runtime/export_debuglog_test.go /src/goroot/src/runtime/export_linux_test.go /src/goroot/src/runtime/export_mmap_test.go /src/goroot/src/runtime/export_pipe2_test.go /src/goroot/src/runtime/export_pipe_test.go /src/goroot/src/runtime/export_test.go /src/goroot/src/runtime/export_unix_test.go /src/goroot/src/runtime/export_windows_test.go /src/goroot/src/runtime/fastlog2_test.go /src/goroot/src/runtime/fds_test.go /src/goroot/src/runtime/float_test.go /src/goroot/src/runtime/gc_test.go /src/goroot/src/runtime/gcinfo_test.go /src/goroot/src/runtime/hash_test.go /src/goroot/src/runtime/heap_test.go /src/goroot/src/runtime/histogram_test.go /src/goroot/src/runtime/iface_test.go /src/goroot/src/runtime/import_test.go /src/goroot/src/runtime/importx_test.go /src/goroot/src/runtime/lfstack_test.go /src/goroot/src/runtime/lockrank_test.go /src/goroot/src/runtime/malloc_test.go /src/goroot/src/runtime/map_benchmark_test.go /src/goroot/src/runtime/map_test.go /src/goroot/src/runtime/memmove_linux_amd64_test.go /src/goroot/src/runtime/memmove_test.go /src/goroot/src/runtime/metrics_test.go /src/goroot/src/runtime/mfinal_test.go /src/goroot/src/runtime/mgclimit_test.go /src/goroot/src/runtime/mgcpacer_test.go /src/goroot/src/runtime/mgcscavenge_test.go /src/goroot/src/runtime/minmax_test.go /src/goroot/src/runtime/mpagealloc_test.go /src/goroot/src/runtime/mpagecache_test.go /src/goroot/src/runtime/mpallocbits_test.go /src/goroot/src/runtime/mranges_test.go /src/goroot/src/runtime/nbpipe_pipe_test.go /src/goroot/src/runtime/nbpipe_test.go /src/goroot/src/runtime/netpoll_os_test.go /src/goroot/src/runtime/norace_linux_test.go /src/goroot/src/runtime/norace_test.go /src/goroot/src/runtime/numcpu_freebsd_test.go /src/goroot/src/runtime/panic_test.go /src/goroot/src/runtime/panicnil_test.go /src/goroot/src/runtime/pinner_test.go /src/goroot/src/runtime/proc_runtime_test.go /src/goroot/src/runtime/proc_test.go /src/goroot/src/runtime/profbuf_test.go /src/goroot/src/runtime/rand_test.go /src/goroot/src/runtime/runtime-gdb_test.go /src/goroot/src/runtime/runtime-gdb_unix_test.go /src/goroot/src/runtime/runtime-lldb_test.go /src/goroot/src/runtime/runtime-seh_windows_test.go /src/goroot/src/runtime/runtime_linux_test.go /src/goroot/src/runtime/runtime_mmap_test.go /src/goroot/src/runtime/runtime_test.go /src/goroot/src/runtime/runtime_unix_test.go /src/goroot/src/runtime/rwmutex_test.go /src/goroot/src/runtime/security_test.go /src/goroot/src/runtime/sema_test.go /src/goroot/src/runtime/semasleep_test.go /src/goroot/src/runtime/signal_windows_test.go /src/goroot/src/runtime/sizeof_test.go /src/goroot/src/runtime/slice_test.go /src/goroot/src/runtime/softfloat64_test.go /src/goroot/src/runtime/stack_test.go /src/goroot/src/runtime/start_line_amd64_test.go /src/goroot/src/runtime/start_line_test.go /src/goroot/src/runtime/string_test.go /src/goroot/src/runtime/symtab_test.go /src/goroot/src/runtime/symtabinl_test.go /src/goroot/src/runtime/syscall_unix_test.go /src/goroot/src/runtime/syscall_windows_test.go /src/goroot/src/runtime/time_test.go /src/goroot/src/runtime/trace_cgo_test.go /src/goroot/src/runtime/traceback_test.go /src/goroot/src/runtime/tracebackx_test.go /src/goroot/src/runtime/unsafepoint_test.go /src/goroot/src/runtime/vdso_test.go /src/goroot/src/runtime/vlop_arm_test.go /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/testdata /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime/' /src/goroot/src/fuzz_ng_runtime/abi_test.go /src/goroot/src/fuzz_ng_runtime/alg.go /src/goroot/src/fuzz_ng_runtime/align_runtime_test.go /src/goroot/src/fuzz_ng_runtime/align_test.go /src/goroot/src/fuzz_ng_runtime/arena.go /src/goroot/src/fuzz_ng_runtime/arena_test.go /src/goroot/src/fuzz_ng_runtime/asan0.go /src/goroot/src/fuzz_ng_runtime/atomic_pointer.go /src/goroot/src/fuzz_ng_runtime/callers_test.go /src/goroot/src/fuzz_ng_runtime/cgo.go /src/goroot/src/fuzz_ng_runtime/cgo_mmap.go /src/goroot/src/fuzz_ng_runtime/cgo_sigaction.go /src/goroot/src/fuzz_ng_runtime/cgocall.go /src/goroot/src/fuzz_ng_runtime/cgocallback.go /src/goroot/src/fuzz_ng_runtime/cgocheck.go /src/goroot/src/fuzz_ng_runtime/chan.go /src/goroot/src/fuzz_ng_runtime/chan_test.go /src/goroot/src/fuzz_ng_runtime/chanbarrier_test.go /src/goroot/src/fuzz_ng_runtime/checkptr.go /src/goroot/src/fuzz_ng_runtime/checkptr_test.go /src/goroot/src/fuzz_ng_runtime/closure_test.go /src/goroot/src/fuzz_ng_runtime/compiler.go /src/goroot/src/fuzz_ng_runtime/complex.go /src/goroot/src/fuzz_ng_runtime/complex_test.go /src/goroot/src/fuzz_ng_runtime/conv_wasm_test.go /src/goroot/src/fuzz_ng_runtime/covercounter.go /src/goroot/src/fuzz_ng_runtime/covermeta.go /src/goroot/src/fuzz_ng_runtime/cpuflags.go /src/goroot/src/fuzz_ng_runtime/cpuflags_amd64.go /src/goroot/src/fuzz_ng_runtime/cpuprof.go /src/goroot/src/fuzz_ng_runtime/cputicks.go /src/goroot/src/fuzz_ng_runtime/crash_cgo_test.go /src/goroot/src/fuzz_ng_runtime/crash_test.go /src/goroot/src/fuzz_ng_runtime/crash_unix_test.go /src/goroot/src/fuzz_ng_runtime/create_file_unix.go /src/goroot/src/fuzz_ng_runtime/debug.go /src/goroot/src/fuzz_ng_runtime/debug_test.go /src/goroot/src/fuzz_ng_runtime/debugcall.go /src/goroot/src/fuzz_ng_runtime/debuglog.go /src/goroot/src/fuzz_ng_runtime/debuglog_off.go /src/goroot/src/fuzz_ng_runtime/debuglog_test.go /src/goroot/src/fuzz_ng_runtime/defer_test.go /src/goroot/src/fuzz_ng_runtime/defs_linux_amd64.go /src/goroot/src/fuzz_ng_runtime/ehooks_test.go /src/goroot/src/fuzz_ng_runtime/env_posix.go /src/goroot/src/fuzz_ng_runtime/env_test.go /src/goroot/src/fuzz_ng_runtime/error.go /src/goroot/src/fuzz_ng_runtime/example_test.go /src/goroot/src/fuzz_ng_runtime/exithook.go /src/goroot/src/fuzz_ng_runtime/export_aix_test.go /src/goroot/src/fuzz_ng_runtime/export_arm_test.go /src/goroot/src/fuzz_ng_runtime/export_darwin_test.go /src/goroot/src/fuzz_ng_runtime/export_debug_amd64_test.go /src/goroot/src/fuzz_ng_runtime/export_debug_arm64_test.go /src/goroot/src/fuzz_ng_runtime/export_debug_ppc64le_test.go /src/goroot/src/fuzz_ng_runtime/export_debug_test.go /src/goroot/src/fuzz_ng_runtime/export_debuglog_test.go /src/goroot/src/fuzz_ng_runtime/export_linux_test.go /src/goroot/src/fuzz_ng_runtime/export_mmap_test.go /src/goroot/src/fuzz_ng_runtime/export_pipe2_test.go /src/goroot/src/fuzz_ng_runtime/export_pipe_test.go /src/goroot/src/fuzz_ng_runtime/export_test.go /src/goroot/src/fuzz_ng_runtime/export_unix_test.go /src/goroot/src/fuzz_ng_runtime/export_windows_test.go /src/goroot/src/fuzz_ng_runtime/extern.go /src/goroot/src/fuzz_ng_runtime/fastlog2.go /src/goroot/src/fuzz_ng_runtime/fastlog2_test.go /src/goroot/src/fuzz_ng_runtime/fastlog2table.go /src/goroot/src/fuzz_ng_runtime/fds_test.go /src/goroot/src/fuzz_ng_runtime/fds_unix.go /src/goroot/src/fuzz_ng_runtime/float.go /src/goroot/src/fuzz_ng_runtime/float_test.go /src/goroot/src/fuzz_ng_runtime/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime/gc_test.go /src/goroot/src/fuzz_ng_runtime/gcinfo_test.go /src/goroot/src/fuzz_ng_runtime/hash64.go /src/goroot/src/fuzz_ng_runtime/hash_test.go /src/goroot/src/fuzz_ng_runtime/heap_test.go /src/goroot/src/fuzz_ng_runtime/heapdump.go /src/goroot/src/fuzz_ng_runtime/histogram.go /src/goroot/src/fuzz_ng_runtime/histogram_test.go /src/goroot/src/fuzz_ng_runtime/iface.go /src/goroot/src/fuzz_ng_runtime/iface_test.go /src/goroot/src/fuzz_ng_runtime/import_test.go /src/goroot/src/fuzz_ng_runtime/importx_test.go /src/goroot/src/fuzz_ng_runtime/lfstack.go /src/goroot/src/fuzz_ng_runtime/lfstack_test.go /src/goroot/src/fuzz_ng_runtime/lock_futex.go /src/goroot/src/fuzz_ng_runtime/lockrank.go /src/goroot/src/fuzz_ng_runtime/lockrank_off.go /src/goroot/src/fuzz_ng_runtime/lockrank_test.go /src/goroot/src/fuzz_ng_runtime/malloc.go /src/goroot/src/fuzz_ng_runtime/malloc_test.go /src/goroot/src/fuzz_ng_runtime/map.go /src/goroot/src/fuzz_ng_runtime/map_benchmark_test.go /src/goroot/src/fuzz_ng_runtime/map_fast32.go /src/goroot/src/fuzz_ng_runtime/map_fast64.go /src/goroot/src/fuzz_ng_runtime/map_faststr.go /src/goroot/src/fuzz_ng_runtime/map_test.go /src/goroot/src/fuzz_ng_runtime/mbarrier.go /src/goroot/src/fuzz_ng_runtime/mbitmap.go /src/goroot/src/fuzz_ng_runtime/mbitmap_allocheaders.go /src/goroot/src/fuzz_ng_runtime/mcache.go /src/goroot/src/fuzz_ng_runtime/mcentral.go /src/goroot/src/fuzz_ng_runtime/mcheckmark.go /src/goroot/src/fuzz_ng_runtime/mem.go /src/goroot/src/fuzz_ng_runtime/mem_linux.go /src/goroot/src/fuzz_ng_runtime/memmove_linux_amd64_test.go /src/goroot/src/fuzz_ng_runtime/memmove_test.go /src/goroot/src/fuzz_ng_runtime/metrics.go /src/goroot/src/fuzz_ng_runtime/metrics_test.go /src/goroot/src/fuzz_ng_runtime/mfinal.go /src/goroot/src/fuzz_ng_runtime/mfinal_test.go /src/goroot/src/fuzz_ng_runtime/mfixalloc.go /src/goroot/src/fuzz_ng_runtime/mgc.go /src/goroot/src/fuzz_ng_runtime/mgclimit.go /src/goroot/src/fuzz_ng_runtime/mgclimit_test.go /src/goroot/src/fuzz_ng_runtime/mgcmark.go /src/goroot/src/fuzz_ng_runtime/mgcpacer.go /src/goroot/src/fuzz_ng_runtime/mgcpacer_test.go /src/goroot/src/fuzz_ng_runtime/mgcscavenge.go /src/goroot/src/fuzz_ng_runtime/mgcscavenge_test.go /src/goroot/src/fuzz_ng_runtime/mgcstack.go /src/goroot/src/fuzz_ng_runtime/mgcsweep.go /src/goroot/src/fuzz_ng_runtime/mgcwork.go /src/goroot/src/fuzz_ng_runtime/mheap.go /src/goroot/src/fuzz_ng_runtime/minmax.go /src/goroot/src/fuzz_ng_runtime/minmax_test.go /src/goroot/src/fuzz_ng_runtime/mpagealloc.go /src/goroot/src/fuzz_ng_runtime/mpagealloc_64bit.go /src/goroot/src/fuzz_ng_runtime/mpagealloc_test.go /src/goroot/src/fuzz_ng_runtime/mpagecache.go /src/goroot/src/fuzz_ng_runtime/mpagecache_test.go /src/goroot/src/fuzz_ng_runtime/mpallocbits.go /src/goroot/src/fuzz_ng_runtime/mpallocbits_test.go /src/goroot/src/fuzz_ng_runtime/mprof.go /src/goroot/src/fuzz_ng_runtime/mranges.go /src/goroot/src/fuzz_ng_runtime/mranges_test.go /src/goroot/src/fuzz_ng_runtime/msan0.go /src/goroot/src/fuzz_ng_runtime/msize_allocheaders.go /src/goroot/src/fuzz_ng_runtime/mspanset.go /src/goroot/src/fuzz_ng_runtime/mstats.go /src/goroot/src/fuzz_ng_runtime/mwbbuf.go /src/goroot/src/fuzz_ng_runtime/nbpipe_pipe2.go /src/goroot/src/fuzz_ng_runtime/nbpipe_pipe_test.go /src/goroot/src/fuzz_ng_runtime/nbpipe_test.go /src/goroot/src/fuzz_ng_runtime/netpoll.go /src/goroot/src/fuzz_ng_runtime/netpoll_epoll.go /src/goroot/src/fuzz_ng_runtime/netpoll_os_test.go /src/goroot/src/fuzz_ng_runtime/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime/nonwindows_stub.go /src/goroot/src/fuzz_ng_runtime/norace_linux_test.go /src/goroot/src/fuzz_ng_runtime/norace_test.go /src/goroot/src/fuzz_ng_runtime/numcpu_freebsd_test.go /src/goroot/src/fuzz_ng_runtime/os_linux.go /src/goroot/src/fuzz_ng_runtime/os_linux_generic.go /src/goroot/src/fuzz_ng_runtime/os_linux_noauxv.go /src/goroot/src/fuzz_ng_runtime/os_linux_x86.go /src/goroot/src/fuzz_ng_runtime/os_nonopenbsd.go /src/goroot/src/fuzz_ng_runtime/os_unix.go /src/goroot/src/fuzz_ng_runtime/pagetrace_off.go /src/goroot/src/fuzz_ng_runtime/panic.go /src/goroot/src/fuzz_ng_runtime/panic_test.go /src/goroot/src/fuzz_ng_runtime/panicnil_test.go /src/goroot/src/fuzz_ng_runtime/pinner.go /src/goroot/src/fuzz_ng_runtime/pinner_test.go /src/goroot/src/fuzz_ng_runtime/plugin.go /src/goroot/src/fuzz_ng_runtime/preempt.go /src/goroot/src/fuzz_ng_runtime/preempt_nonwindows.go /src/goroot/src/fuzz_ng_runtime/print.go /src/goroot/src/fuzz_ng_runtime/proc.go /src/goroot/src/fuzz_ng_runtime/proc_runtime_test.go /src/goroot/src/fuzz_ng_runtime/proc_test.go /src/goroot/src/fuzz_ng_runtime/profbuf.go /src/goroot/src/fuzz_ng_runtime/profbuf_test.go /src/goroot/src/fuzz_ng_runtime/proflabel.go /src/goroot/src/fuzz_ng_runtime/race0.go /src/goroot/src/fuzz_ng_runtime/rand_test.go /src/goroot/src/fuzz_ng_runtime/rdebug.go /src/goroot/src/fuzz_ng_runtime/retry.go /src/goroot/src/fuzz_ng_runtime/runtime-gdb_test.go /src/goroot/src/fuzz_ng_runtime/runtime-gdb_unix_test.go /src/goroot/src/fuzz_ng_runtime/runtime-lldb_test.go /src/goroot/src/fuzz_ng_runtime/runtime-seh_windows_test.go /src/goroot/src/fuzz_ng_runtime/runtime.go /src/goroot/src/fuzz_ng_runtime/runtime1.go /src/goroot/src/fuzz_ng_runtime/runtime2.go /src/goroot/src/fuzz_ng_runtime/runtime_boring.go /src/goroot/src/fuzz_ng_runtime/runtime_linux_test.go /src/goroot/src/fuzz_ng_runtime/runtime_mmap_test.go /src/goroot/src/fuzz_ng_runtime/runtime_test.go /src/goroot/src/fuzz_ng_runtime/runtime_unix_test.go /src/goroot/src/fuzz_ng_runtime/rwmutex.go /src/goroot/src/fuzz_ng_runtime/rwmutex_test.go /src/goroot/src/fuzz_ng_runtime/security_linux.go /src/goroot/src/fuzz_ng_runtime/security_test.go /src/goroot/src/fuzz_ng_runtime/security_unix.go /src/goroot/src/fuzz_ng_runtime/select.go /src/goroot/src/fuzz_ng_runtime/sema.go /src/goroot/src/fuzz_ng_runtime/sema_test.go /src/goroot/src/fuzz_ng_runtime/semasleep_test.go /src/goroot/src/fuzz_ng_runtime/signal_amd64.go /src/goroot/src/fuzz_ng_runtime/signal_linux_amd64.go /src/goroot/src/fuzz_ng_runtime/signal_unix.go /src/goroot/src/fuzz_ng_runtime/signal_windows_test.go /src/goroot/src/fuzz_ng_runtime/sigqueue.go /src/goroot/src/fuzz_ng_runtime/sigqueue_note.go /src/goroot/src/fuzz_ng_runtime/sigtab_linux_generic.go /src/goroot/src/fuzz_ng_runtime/sizeclasses.go /src/goroot/src/fuzz_ng_runtime/sizeof_test.go /src/goroot/src/fuzz_ng_runtime/slice.go /src/goroot/src/fuzz_ng_runtime/slice_test.go /src/goroot/src/fuzz_ng_runtime/softfloat64.go /src/goroot/src/fuzz_ng_runtime/softfloat64_test.go /src/goroot/src/fuzz_ng_runtime/stack.go /src/goroot/src/fuzz_ng_runtime/stack_test.go /src/goroot/src/fuzz_ng_runtime/start_line_amd64_test.go /src/goroot/src/fuzz_ng_runtime/start_line_test.go /src/goroot/src/fuzz_ng_runtime/stkframe.go /src/goroot/src/fuzz_ng_runtime/string.go /src/goroot/src/fuzz_ng_runtime/string_test.go /src/goroot/src/fuzz_ng_runtime/stubs.go /src/goroot/src/fuzz_ng_runtime/stubs2.go /src/goroot/src/fuzz_ng_runtime/stubs3.go /src/goroot/src/fuzz_ng_runtime/stubs_amd64.go /src/goroot/src/fuzz_ng_runtime/stubs_linux.go /src/goroot/src/fuzz_ng_runtime/symtab.go /src/goroot/src/fuzz_ng_runtime/symtab_test.go /src/goroot/src/fuzz_ng_runtime/symtabinl.go /src/goroot/src/fuzz_ng_runtime/symtabinl_test.go /src/goroot/src/fuzz_ng_runtime/sys_nonppc64x.go /src/goroot/src/fuzz_ng_runtime/sys_x86.go /src/goroot/src/fuzz_ng_runtime/syscall_unix_test.go /src/goroot/src/fuzz_ng_runtime/syscall_windows_test.go /src/goroot/src/fuzz_ng_runtime/tagptr.go /src/goroot/src/fuzz_ng_runtime/tagptr_64bit.go /src/goroot/src/fuzz_ng_runtime/test_amd64.go /src/goroot/src/fuzz_ng_runtime/time.go /src/goroot/src/fuzz_ng_runtime/time_nofake.go /src/goroot/src/fuzz_ng_runtime/time_test.go /src/goroot/src/fuzz_ng_runtime/timeasm.go /src/goroot/src/fuzz_ng_runtime/tls_stub.go /src/goroot/src/fuzz_ng_runtime/trace2.go /src/goroot/src/fuzz_ng_runtime/trace2buf.go /src/goroot/src/fuzz_ng_runtime/trace2cpu.go /src/goroot/src/fuzz_ng_runtime/trace2event.go /src/goroot/src/fuzz_ng_runtime/trace2map.go /src/goroot/src/fuzz_ng_runtime/trace2region.go /src/goroot/src/fuzz_ng_runtime/trace2runtime.go /src/goroot/src/fuzz_ng_runtime/trace2stack.go /src/goroot/src/fuzz_ng_runtime/trace2status.go /src/goroot/src/fuzz_ng_runtime/trace2string.go /src/goroot/src/fuzz_ng_runtime/trace2time.go /src/goroot/src/fuzz_ng_runtime/trace_cgo_test.go /src/goroot/src/fuzz_ng_runtime/traceback.go /src/goroot/src/fuzz_ng_runtime/traceback_test.go /src/goroot/src/fuzz_ng_runtime/tracebackx_test.go /src/goroot/src/fuzz_ng_runtime/type.go /src/goroot/src/fuzz_ng_runtime/typekind.go /src/goroot/src/fuzz_ng_runtime/unsafe.go /src/goroot/src/fuzz_ng_runtime/unsafepoint_test.go /src/goroot/src/fuzz_ng_runtime/utf8.go /src/goroot/src/fuzz_ng_runtime/vdso_elf64.go /src/goroot/src/fuzz_ng_runtime/vdso_linux.go /src/goroot/src/fuzz_ng_runtime/vdso_linux_amd64.go /src/goroot/src/fuzz_ng_runtime/vdso_test.go /src/goroot/src/fuzz_ng_runtime/vlop_arm_test.go /src/goroot/src/fuzz_ng_runtime/write_err.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": 	arena.go:88:2: use of internal package runtime/internal/atomic not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/metrics/description.go /src/goroot/src/runtime/metrics/description_test.go /src/goroot/src/runtime/metrics/doc.go /src/goroot/src/runtime/metrics/example_test.go /src/goroot/src/runtime/metrics/histogram.go /src/goroot/src/runtime/metrics/sample.go /src/goroot/src/runtime/metrics/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_metrics '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/metrics fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Found package in /src/goroot/src/runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Array result for Description is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Type Value is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Function Read has unproduced array argument Sample
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Function Kind has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Function Uint64 has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Function Float64 has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:38 Function Float64Histogram has unproduced recv Value
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_metrics.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_metrics.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/metrics: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_metrics [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_metrics.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:189:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_metrics/copy/description.go fuzz_ng_runtime_metrics/copy/doc.go fuzz_ng_runtime_metrics/copy/histogram.go fuzz_ng_runtime_metrics/copy/sample.go fuzz_ng_runtime_metrics/copy/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_metrics/copy/description.go fuzz_ng_runtime_metrics/copy/doc.go fuzz_ng_runtime_metrics/copy/histogram.go fuzz_ng_runtime_metrics/copy/sample.go fuzz_ng_runtime_metrics/copy/value.go /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_metrics/fuzz_ng.go fuzz_ng_runtime_metrics/fuzzng_unsure_test.go fuzz_ng_runtime_metrics/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/metrics/description_test.go /src/goroot/src/runtime/metrics/example_test.go /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/metrics/testdata /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/metrics/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_metrics/' /src/goroot/src/fuzz_ng_runtime_metrics/description.go /src/goroot/src/fuzz_ng_runtime_metrics/description_test.go /src/goroot/src/fuzz_ng_runtime_metrics/doc.go /src/goroot/src/fuzz_ng_runtime_metrics/example_test.go /src/goroot/src/fuzz_ng_runtime_metrics/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_metrics/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_metrics/histogram.go /src/goroot/src/fuzz_ng_runtime_metrics/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_metrics/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_metrics/sample.go /src/goroot/src/fuzz_ng_runtime_metrics/value.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_metrics/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_metrics/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_metrics /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_metrics [fuzz_ng_runtime_metrics.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_metrics [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_metrics/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_metrics_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/pprof/defs_darwin.go /src/goroot/src/runtime/pprof/defs_darwin_amd64.go /src/goroot/src/runtime/pprof/defs_darwin_arm64.go /src/goroot/src/runtime/pprof/elf.go /src/goroot/src/runtime/pprof/label.go /src/goroot/src/runtime/pprof/label_test.go /src/goroot/src/runtime/pprof/map.go /src/goroot/src/runtime/pprof/mprof_test.go /src/goroot/src/runtime/pprof/pe.go /src/goroot/src/runtime/pprof/pprof.go /src/goroot/src/runtime/pprof/pprof_norusage.go /src/goroot/src/runtime/pprof/pprof_rusage.go /src/goroot/src/runtime/pprof/pprof_test.go /src/goroot/src/runtime/pprof/pprof_windows.go /src/goroot/src/runtime/pprof/proto.go /src/goroot/src/runtime/pprof/proto_darwin.go /src/goroot/src/runtime/pprof/proto_other.go /src/goroot/src/runtime/pprof/proto_test.go /src/goroot/src/runtime/pprof/proto_windows.go /src/goroot/src/runtime/pprof/protobuf.go /src/goroot/src/runtime/pprof/protomem.go /src/goroot/src/runtime/pprof/protomem_test.go /src/goroot/src/runtime/pprof/runtime.go /src/goroot/src/r++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": untime/pprof/runtime_test.go /src/goroot/src/runtime/pprof/rusage_test.go /src/goroot/src/runtime/pprof/vminfo_darwin.go /src/goroot/src/runtime/pprof/vminfo_darwin_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 27 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_pprof '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/pprof fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Found package in /src/goroot/src/runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Array result for Profile is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Function WithLabels has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Unhandled argument &ast.Ellipsis{Ellipsis:38973, Elt:(*ast.Ident)(0xc000319140)} for Labels
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Function Label has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Function ForLabels has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Unhandled argument &ast.FuncType{Func:39694, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00033eba0), Results:(*ast.FieldList)(0xc00033ebd0)} for ForLabels
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Function SetGoroutineLabels has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Function Do has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:44 Unhandled argument &ast.FuncType{Func:1683, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000288f60), Results:(*ast.FieldList)(nil)} for Do
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_pprof.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_pprof.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/pprof: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_pprof [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_pprof.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:175:38: LabelSetResults declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:176:2: LabelSetResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:261:2: LabelSetNb declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:262:2: LabelSetResultsIndex declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_pprof/copy/elf.go fuzz_ng_runtime_pprof/copy/label.go fuzz_ng_runtime_pprof/copy/map.go fuzz_ng_runtime_pprof/copy/pe.go fuzz_ng_runtime_pprof/copy/pprof.go fuzz_ng_runtime_pprof/copy/pprof_rusage.go fuzz_ng_runtime_pprof/copy/proto.go fuzz_ng_runtime_pprof/copy/proto_other.go fuzz_ng_runtime_pprof/copy/protobuf.go fuzz_ng_runtime_pprof/copy/protomem.go fuzz_ng_runtime_pprof/copy/runtime.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_pprof/copy/elf.go fuzz_ng_runtime_pprof/copy/label.go fuzz_ng_runtime_pprof/copy/map.go fuzz_ng_runtime_pprof/copy/pe.go fuzz_ng_runtime_pprof/copy/pprof.go fuzz_ng_runtime_pprof/copy/pprof_rusage.go fuzz_ng_runtime_pprof/copy/proto.go fuzz_ng_runtime_pprof/copy/proto_other.go fuzz_ng_runtime_pprof/copy/protobuf.go fuzz_ng_runtime_pprof/copy/protomem.go fuzz_ng_runtime_pprof/copy/runtime.go /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_pprof/fuzz_ng.go fuzz_ng_runtime_pprof/fuzzng_unsure_test.go fuzz_ng_runtime_pprof/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/pprof/label_test.go /src/goroot/src/runtime/pprof/mprof_test.go /src/goroot/src/runtime/pprof/pprof_test.go /src/goroot/src/runtime/pprof/proto_test.go /src/goroot/src/runtime/pprof/protomem_test.go /src/goroot/src/runtime/pprof/runtime_test.go /src/goroot/src/runtime/pprof/rusage_test.go /src/goroot/src/runtime/pprof/vminfo_darwin_test.go /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/pprof/testdata /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_pprof/' /src/goroot/src/fuzz_ng_runtime_pprof/elf.go /src/goroot/src/fuzz_ng_runtime_pprof/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_pprof/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_pprof/label.go /src/goroot/src/fuzz_ng_runtime_pprof/label_test.go /src/goroot/src/fuzz_ng_runtime_pprof/map.go /src/goroot/src/fuzz_ng_runtime_pprof/mprof_test.go /src/goroot/src/fuzz_ng_runtime_pprof/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_pprof/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_pprof/pe.go /src/goroot/src/fuzz_ng_runtime_pprof/pprof.go /src/goroot/src/fuzz_ng_runtime_pprof/pprof_rusage.go /src/goroot/src/fuzz_ng_runtime_pprof/pprof_test.go /src/goroot/src/fuzz_ng_runtime_pprof/proto.go /src/goroot/src/fuzz_ng_runtime_pprof/proto_other.go /src/goroot/src/fuzz_ng_runtime_pprof/proto_test.go /src/goroot/src/fuzz_ng_runtime_pprof/protobuf.go /src/goroot/src/fuzz_ng_runtime_pprof/protomem.go /src/goroot/src/fuzz_ng_runtime_pprof/protomem_test.go /src/goroot/src/fuzz_ng_runtime_pprof/runtime.go /src/goroot/src/fuzz_ng_runtime_pprof/runtime_test.go /src/goroot/src/fuzz_ng_runtime_pprof/rusage_test.go /src/goroot/src/fuzz_ng_runtime_pprof/vminfo_darwin_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_pprof/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_pprof/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_pprof /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_pprof [fuzz_ng_runtime_pprof.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_pprof [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_pprof/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_pprof_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/pprof/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/pprof/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/pprof/testdata/mappingtest/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof/testdata/mappingtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof/testdata/mappingtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/pprof/testdata/mappingtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/asan/asan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_asan '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/asan fuzz_ng_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:50 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:50 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_asan.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_asan.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_runtime_asan: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_runtime_asan: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/asan: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package runtime/asan: build constraints exclude all Go files in /src/goroot/src/runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_runtime_asan/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_runtime_asan/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_runtime_asan/copy/*.go' /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_runtime_asan/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_runtime_asan/*.go' /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_runtime_asan/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/runtime/asan/*_test.go' /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/asan/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/asan/testdata /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/asan/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_asan/' /src/goroot/src/fuzz_ng_runtime_asan/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_asan/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_asan/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_asan /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_asan [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_asan/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_asan
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_runtime_asan: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_asan_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/race/doc.go /src/goroot/src/runtime/race/output_test.go /src/goroot/src/runtime/race/race.go /src/goroot/src/runtime/race/race_darwin_amd64.go /src/goroot/src/runtime/race/race_darwin_arm64.go /src/goroot/src/runtime/race/race_linux_test.go /src/goroot/src/runtime/race/race_test.go /src/goroot/src/runtime/race/race_unix_test.go /src/goroot/src/runtime/race/race_v1_amd64.go /src/goroot/src/runtime/race/race_v3_amd64.go /src/goroot/src/runtime/race/race_windows_test.go /src/goroot/src/runtime/race/sched_test.go /src/goroot/src/runtime/race/syso_test.go /src/goroot/src/runtime/race/timer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 14 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_race '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/race fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:52 Found package in /src/goroot/src/runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_race.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_race.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/race: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_race [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_race.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:17:2: "runtime/race" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_race/copy/doc.go fuzz_ng_runtime_race/copy/race_v1_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_race/copy/doc.go fuzz_ng_runtime_race/copy/race_v1_amd64.go /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_race/fuzz_ng.go fuzz_ng_runtime_race/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/race/output_test.go /src/goroot/src/runtime/race/race_linux_test.go /src/goroot/src/runtime/race/race_test.go /src/goroot/src/runtime/race/race_unix_test.go /src/goroot/src/runtime/race/race_windows_test.go /src/goroot/src/runtime/race/sched_test.go /src/goroot/src/runtime/race/syso_test.go /src/goroot/src/runtime/race/timer_test.go /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/race/testdata /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_race/' /src/goroot/src/fuzz_ng_runtime_race/doc.go /src/goroot/src/fuzz_ng_runtime_race/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_race/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_race/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_race/output_test.go /src/goroot/src/fuzz_ng_runtime_race/race_linux_test.go /src/goroot/src/fuzz_ng_runtime_race/race_test.go /src/goroot/src/fuzz_ng_runtime_race/race_unix_test.go /src/goroot/src/fuzz_ng_runtime_race/race_v1_amd64.go /src/goroot/src/fuzz_ng_runtime_race/race_windows_test.go /src/goroot/src/fuzz_ng_runtime_race/sched_test.go /src/goroot/src/fuzz_ng_runtime_race/syso_test.go /src/goroot/src/fuzz_ng_runtime_race/timer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_race/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_race/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_race /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": 	race_v1_amd64.go:9:8: use of internal package runtime/race/internal/amd64v1 not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_race/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_race
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_race_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/race/testdata/atomic_test.go /src/goroot/src/runtime/race/testdata/cgo_test.go /src/goroot/src/runtime/race/testdata/cgo_test_main.go /src/goroot/src/runtime/race/testdata/chan_test.go /src/goroot/src/runtime/race/testdata/comp_test.go /src/goroot/src/runtime/race/testdata/finalizer_test.go /src/goroot/src/runtime/race/testdata/io_test.go /src/goroot/src/runtime/race/testdata/issue12225_test.go /src/goroot/src/runtime/race/testdata/issue12664_test.go /src/goroot/src/runtime/race/testdata/issue13264_test.go /src/goroot/src/runtime/race/testdata/map_test.go /src/goroot/src/runtime/race/testdata/mop_test.go /src/goroot/src/runtime/race/testdata/mutex_test.go /src/goroot/src/runtime/race/testdata/pool_test.go /src/goroot/src/runtime/race/testdata/reflect_test.go /src/goroot/src/runtime/race/testdata/regression_test.go /src/goroot/src/runtime/race/testdata/rwmutex_test.go /src/goroot/src/runtime/race/testdata/select_test.go /src/goroot/src/runtime/race/testdata/slice_test.go /src/goroot/src/runtime/race/testdata/sync_test.go /src/goroot/src/runtime/race/testdata/waitgroup_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 21 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/race/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/race/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/race/internal/amd64v1/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race/internal/amd64v1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/race/internal/amd64v3/doc.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/race/internal/amd64v3
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/coverage/apis.go /src/goroot/src/runtime/coverage/emit.go /src/goroot/src/runtime/coverage/emitdata_test.go /src/goroot/src/runtime/coverage/hooks.go /src/goroot/src/runtime/coverage/testsupport.go /src/goroot/src/runtime/coverage/ts_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_coverage '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/coverage fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:20:54 Found package in /src/goroot/src/runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_coverage.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_coverage.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/coverage: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_coverage/copy/apis.go fuzz_ng_runtime_coverage/copy/emit.go fuzz_ng_runtime_coverage/copy/hooks.go fuzz_ng_runtime_coverage/copy/testsupport.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_coverage/copy/apis.go fuzz_ng_runtime_coverage/copy/emit.go fuzz_ng_runtime_coverage/copy/hooks.go fuzz_ng_runtime_coverage/copy/testsupport.go /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_coverage/fuzz_ng.go fuzz_ng_runtime_coverage/fuzzng_unsure_test.go fuzz_ng_runtime_coverage/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/coverage/emitdata_test.go /src/goroot/src/runtime/coverage/ts_test.go /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/coverage/testdata /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_coverage/' /src/goroot/src/fuzz_ng_runtime_coverage/apis.go /src/goroot/src/fuzz_ng_runtime_coverage/emit.go /src/goroot/src/fuzz_ng_runtime_coverage/emitdata_test.go /src/goroot/src/fuzz_ng_runtime_coverage/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_coverage/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_coverage/hooks.go /src/goroot/src/fuzz_ng_runtime_coverage/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_coverage/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_coverage/testsupport.go /src/goroot/src/fuzz_ng_runtime_coverage/ts_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_coverage/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_coverage/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_coverage /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": package fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": 	testsupport.go:20:2: use of internal package runtime/internal/atomic not allowed
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_coverage/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_coverage_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/coverage/testdata/harness.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/coverage/testdata/issue56006/repro.go /src/goroot/src/runtime/coverage/testdata/issue56006/repro_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata/issue56006
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata/issue56006
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata/issue56006
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/coverage/testdata/issue59563/repro.go /src/goroot/src/runtime/coverage/testdata/issue59563/repro_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata/issue59563
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata/issue59563
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/coverage/testdata/issue59563
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/trace/annotation.go /src/goroot/src/runtime/trace/annotation_test.go /src/goroot/src/runtime/trace/example_test.go /src/goroot/src/runtime/trace/trace.go /src/goroot/src/runtime/trace/trace_stack_test.go /src/goroot/src/runtime/trace/trace_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_trace '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/trace fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Found package in /src/goroot/src/runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Function NewTask has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Function Log has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Function Logf has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Unhandled argument &ast.Ellipsis{Ellipsis:8439, Elt:(*ast.Ident)(0xc000141900)} for Logf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Function WithRegion has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Unhandled argument &ast.FuncType{Func:9132, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000121770), Results:(*ast.FieldList)(nil)} for WithRegion
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:01 Function StartRegion has unproduced argument context.Context
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_trace.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_trace.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/trace: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_trace/copy/annotation.go fuzz_ng_runtime_trace/copy/trace.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_trace/copy/annotation.go fuzz_ng_runtime_trace/copy/trace.go /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_trace/fuzz_ng.go fuzz_ng_runtime_trace/fuzzng_unsure_test.go fuzz_ng_runtime_trace/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/trace/annotation_test.go /src/goroot/src/runtime/trace/example_test.go /src/goroot/src/runtime/trace/trace_stack_test.go /src/goroot/src/runtime/trace/trace_test.go /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/trace/testdata /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/trace/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_trace/' /src/goroot/src/fuzz_ng_runtime_trace/annotation.go /src/goroot/src/fuzz_ng_runtime_trace/annotation_test.go /src/goroot/src/fuzz_ng_runtime_trace/example_test.go /src/goroot/src/fuzz_ng_runtime_trace/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_trace/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_trace/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_trace/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_trace/trace.go /src/goroot/src/fuzz_ng_runtime_trace/trace_stack_test.go /src/goroot/src/fuzz_ng_runtime_trace/trace_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_trace/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_trace/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_trace /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_trace [fuzz_ng_runtime_trace.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:38:6: NewTask already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:38:6: other declaration of NewTask
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:73:6: Task already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:73:6: other declaration of Task
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:95:6: Log already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:95:6: other declaration of Log
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:101:6: Logf already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:101:6: other declaration of Logf
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:122:6: WithRegion already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:122:6: other declaration of WithRegion
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:152:6: StartRegion already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:152:6: other declaration of StartRegion
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:162:6: Region already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:162:6: other declaration of Region
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:180:6: IsEnabled already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/annotation.go:180:6: other declaration of IsEnabled
Step #3 - "compile-libfuzzer-coverage-x86_64": ./trace.go:121:6: Start already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/trace.go:121:6: other declaration of Start
Step #3 - "compile-libfuzzer-coverage-x86_64": ./trace.go:143:6: Stop already declared through dot-import of package trace ("runtime/trace")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/runtime/trace/trace.go:143:6: other declaration of Stop
Step #3 - "compile-libfuzzer-coverage-x86_64": ./annotation.go:38:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_trace [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_trace/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_trace_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testwintls/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwintls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwintls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwintls
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testfaketime/faketime.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testfaketime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testfaketime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testfaketime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testwinlib/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlib
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testexithooks/testexithooks.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testexithooks
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testexithooks
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testexithooks
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testwinsignal/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinsignal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinsignal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinsignal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testprog/abort.go /src/goroot/src/runtime/testdata/testprog/badtraceback.go /src/goroot/src/runtime/testdata/testprog/checkptr.go /src/goroot/src/runtime/testdata/testprog/crash.go /src/goroot/src/runtime/testdata/testprog/crashdump.go /src/goroot/src/runtime/testdata/testprog/deadlock.go /src/goroot/src/runtime/testdata/testprog/framepointer.go /src/goroot/src/runtime/testdata/testprog/gc.go /src/goroot/src/runtime/testdata/testprog/lockosthread.go /src/goroot/src/runtime/testdata/testprog/main.go /src/goroot/src/runtime/testdata/testprog/map.go /src/goroot/src/runtime/testdata/testprog/memprof.go /src/goroot/src/runtime/testdata/testprog/misc.go /src/goroot/src/runtime/testdata/testprog/numcpu_freebsd.go /src/goroot/src/runtime/testdata/testprog/panicprint.go /src/goroot/src/runtime/testdata/testprog/panicrace.go /src/goroot/src/runtime/testdata/testprog/preempt.go /src/goroot/src/runtime/testdata/testprog/segv.go /src/goroot/src/runtime/testdata/testprog/segv_linux.go /src/goroot/src/runtime/testdata/testprog/signal.go /src/goroot/src/runtime/testdata/testprog/sleep.go /src/goroot/src/runtime/testdata/testprog/stringconcat.go /src/goroot/src/runtime/testdata/testprog/syscall_windows.go /src/goroot/src/runtime/testdata/testprog/syscalls.go /src/goroot/src/runtime/testdata/testprog/syscalls_linux.go /src/goroot/src/runtime/testdata/testprog/syscalls_none.go /src/goroot/src/runtime/testdata/testprog/timeprof.go /src/goroot/src/runtime/testdata/testprog/traceback_ancestors.go /src/goroot/src/runtime/testdata/testprog/unsafe.go /src/goroot/src/runtime/testdata/testprog/vdso.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 30 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprog
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testwinlibthrow/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlibthrow
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlibthrow
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlibthrow
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testprogcgo/aprof.go /src/goroot/src/runtime/testdata/testprogcgo/bigstack_windows.go /src/goroot/src/runtime/testdata/testprogcgo/bindm.go /src/goroot/src/runtime/testdata/testprogcgo/callback.go /src/goroot/src/runtime/testdata/testprogcgo/catchpanic.go /src/goroot/src/runtime/testdata/testprogcgo/cgo.go /src/goroot/src/runtime/testdata/testprogcgo/cgonocallback.go /src/goroot/src/runtime/testdata/testprogcgo/cgonoescape.go /src/goroot/src/runtime/testdata/testprogcgo/crash.go /src/goroot/src/runtime/testdata/testprogcgo/deadlock.go /src/goroot/src/runtime/testdata/testprogcgo/destructor.go /src/goroot/src/runtime/testdata/testprogcgo/dll_windows.go /src/goroot/src/runtime/testdata/testprogcgo/dropm.go /src/goroot/src/runtime/testdata/testprogcgo/dropm_stub.go /src/goroot/src/runtime/testdata/testprogcgo/eintr.go /src/goroot/src/runtime/testdata/testprogcgo/exec.go /src/goroot/src/runtime/testdata/testprogcgo/gprof.go /src/goroot/src/runtime/testdata/testprogcgo/issue2++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": 9707.go /src/goroot/src/runtime/testdata/testprogcgo/lockosthread.go /src/goroot/src/runtime/testdata/testprogcgo/main.go /src/goroot/src/runtime/testdata/testprogcgo/needmdeadlock.go /src/goroot/src/runtime/testdata/testprogcgo/numgoroutine.go /src/goroot/src/runtime/testdata/testprogcgo/panic.go /src/goroot/src/runtime/testdata/testprogcgo/pprof.go /src/goroot/src/runtime/testdata/testprogcgo/pprof_callback.go /src/goroot/src/runtime/testdata/testprogcgo/raceprof.go /src/goroot/src/runtime/testdata/testprogcgo/racesig.go /src/goroot/src/runtime/testdata/testprogcgo/segv.go /src/goroot/src/runtime/testdata/testprogcgo/segv_linux.go /src/goroot/src/runtime/testdata/testprogcgo/sigfwd.go /src/goroot/src/runtime/testdata/testprogcgo/sigpanic.go /src/goroot/src/runtime/testdata/testprogcgo/sigstack.go /src/goroot/src/runtime/testdata/testprogcgo/sigthrow.go /src/goroot/src/runtime/testdata/testprogcgo/stack_windows.go /src/goroot/src/runtime/testdata/testprogcgo/stackswitch.go /src/goroot/src/runtime/testdata/testprogcgo/threadpanic.go /src/goroot/src/runtime/testdata/testprogcgo/threadpprof.go /src/goroot/src/runtime/testdata/testprogcgo/threadprof.go /src/goroot/src/runtime/testdata/testprogcgo/trace.go /src/goroot/src/runtime/testdata/testprogcgo/traceback.go /src/goroot/src/runtime/testdata/testprogcgo/tracebackctxt.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 41 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprogcgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprogcgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprogcgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testprogcgo/windows/win.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprogcgo/windows
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprogcgo/windows
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprogcgo/windows
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testprognet/main.go /src/goroot/src/runtime/testdata/testprognet/net.go /src/goroot/src/runtime/testdata/testprognet/signal.go /src/goroot/src/runtime/testdata/testprognet/signalexec.go /src/goroot/src/runtime/testdata/testprognet/waiters.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprognet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprognet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testprognet
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testfds/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testfds
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testfds
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testfds
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testsuid/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testsuid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testsuid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testsuid
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/testdata/testwinlibsignal/dummy.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlibsignal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlibsignal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/testdata/testwinlibsignal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/msan/msan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_msan '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/msan fuzz_ng_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:07 No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:07 Failed creating fuzz target : No files in package
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_msan.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_msan.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 38: cd: fuzz_ng_runtime_msan: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory 'cpp': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": Could not make proto path relative: ngolofuzz.proto: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 51: cd: fuzz_ng_runtime_msan: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/msan: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": package runtime/msan: build constraints exclude all Go files in /src/goroot/src/runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w 'fuzz_ng_runtime_msan/copy/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": stat fuzz_ng_runtime_msan/copy/*.go: no such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_runtime_msan/copy/*.go' /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_runtime_msan/copy/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp 'fuzz_ng_runtime_msan/*.go' /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat 'fuzz_ng_runtime_msan/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/runtime/msan/*_test.go' /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/msan/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/msan/testdata /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/msan/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_msan/' /src/goroot/src/fuzz_ng_runtime_msan/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_msan/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_msan/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_msan /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_msan [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_msan/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_msan
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 86: cd: fuzz_ng_runtime_msan: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_msan_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ngolo_helper.go (deflated 36%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/math/math.go /src/goroot/src/runtime/internal/math/math_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/math
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/syscall/defs_linux_386.go /src/goroot/src/runtime/internal/syscall/defs_linux_amd64.go /src/goroot/src/runtime/internal/syscall/defs_linux_arm.go /src/goroot/src/runtime/internal/syscall/defs_linux_arm64.go /src/goroot/src/runtime/internal/syscall/defs_linux_loong64.go /src/goroot/src/runtime/internal/syscall/defs_linux_mips64x.go /src/goroot/src/runtime/internal/syscall/defs_linux_mipsx.go /src/goroot/src/runtime/internal/syscall/defs_linux_ppc64x.go /src/goroot/src/runtime/internal/syscall/defs_linux_riscv64.go /src/goroot/src/runtime/internal/syscall/defs_linux_s390x.go /src/goroot/src/runtime/internal/syscall/syscall_linux.go /src/goroot/src/runtime/internal/syscall/syscall_linux_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 12 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/startlinetest/func_amd64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/startlinetest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/sys/consts.go /src/goroot/src/runtime/internal/sys/consts_norace.go /src/goroot/src/runtime/internal/sys/consts_race.go /src/goroot/src/runtime/internal/sys/intrinsics.go /src/goroot/src/runtime/internal/sys/intrinsics_test.go /src/goroot/src/runtime/internal/sys/nih.go /src/goroot/src/runtime/internal/sys/sys.go /src/goroot/src/runtime/internal/sys/zversion.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/sys
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/atomic/atomic_386.go /src/goroot/src/runtime/internal/atomic/atomic_amd64.go /src/goroot/src/runtime/internal/atomic/atomic_andor_generic.go /src/goroot/src/runtime/internal/atomic/atomic_andor_test.go /src/goroot/src/runtime/internal/atomic/atomic_arm.go /src/goroot/src/runtime/internal/atomic/atomic_arm64.go /src/goroot/src/runtime/internal/atomic/atomic_loong64.go /src/goroot/src/runtime/internal/atomic/atomic_mips64x.go /src/goroot/src/runtime/internal/atomic/atomic_mipsx.go /src/goroot/src/runtime/internal/atomic/atomic_ppc64x.go /src/goroot/src/runtime/internal/atomic/atomic_riscv64.go /src/goroot/src/runtime/internal/atomic/atomic_s390x.go /src/goroot/src/runtime/internal/atomic/atomic_test.go /src/goroot/src/runtime/internal/atomic/atomic_wasm.go /src/goroot/src/runtime/internal/atomic/bench_test.go /src/goroot/src/runtime/internal/atomic/doc.go /src/goroot/src/runtime/internal/atomic/stubs.go /src/goroot/src/runtime/internal/atomic/types.go /src/goroot/src/runtime/internal/atomic/types_64bit.go /src/goroot/src/runtime/internal/atomic/unaligned.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 20 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/wasitest/host_test.go /src/goroot/src/runtime/internal/wasitest/nonblock_test.go /src/goroot/src/runtime/internal/wasitest/tcpecho_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/wasitest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/internal/wasitest/testdata/nonblock.go /src/goroot/src/runtime/internal/wasitest/testdata/tcpecho.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/internal/wasitest/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/cgo/callbacks.go /src/goroot/src/runtime/cgo/callbacks_aix.go /src/goroot/src/runtime/cgo/callbacks_traceback.go /src/goroot/src/runtime/cgo/cgo.go /src/goroot/src/runtime/cgo/dragonfly.go /src/goroot/src/runtime/cgo/freebsd.go /src/goroot/src/runtime/cgo/handle.go /src/goroot/src/runtime/cgo/handle_test.go /src/goroot/src/runtime/cgo/iscgo.go /src/goroot/src/runtime/cgo/linux.go /src/goroot/src/runtime/cgo/mmap.go /src/goroot/src/runtime/cgo/netbsd.go /src/goroot/src/runtime/cgo/openbsd.go /src/goroot/src/runtime/cgo/setenv.go /src/goroot/src/runtime/cgo/sigaction.go /src/goroot/src/runtime/cgo/signal_ios_arm64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 16 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_cgo '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing runtime/cgo fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:09 Found package in /src/goroot/src/runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_cgo.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_cgo.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/cgo: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_cgo/copy/callbacks.go fuzz_ng_runtime_cgo/copy/callbacks_traceback.go fuzz_ng_runtime_cgo/copy/handle.go fuzz_ng_runtime_cgo/copy/iscgo.go fuzz_ng_runtime_cgo/copy/linux.go fuzz_ng_runtime_cgo/copy/mmap.go fuzz_ng_runtime_cgo/copy/setenv.go fuzz_ng_runtime_cgo/copy/sigaction.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_cgo/copy/callbacks.go fuzz_ng_runtime_cgo/copy/callbacks_traceback.go fuzz_ng_runtime_cgo/copy/handle.go fuzz_ng_runtime_cgo/copy/iscgo.go fuzz_ng_runtime_cgo/copy/linux.go fuzz_ng_runtime_cgo/copy/mmap.go fuzz_ng_runtime_cgo/copy/setenv.go fuzz_ng_runtime_cgo/copy/sigaction.go /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_cgo/fuzz_ng.go fuzz_ng_runtime_cgo/fuzzng_unsure_test.go fuzz_ng_runtime_cgo/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/cgo/handle_test.go /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/cgo/testdata /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/runtime/cgo/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_cgo/' /src/goroot/src/fuzz_ng_runtime_cgo/callbacks.go /src/goroot/src/fuzz_ng_runtime_cgo/callbacks_traceback.go /src/goroot/src/fuzz_ng_runtime_cgo/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_cgo/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_cgo/handle.go /src/goroot/src/fuzz_ng_runtime_cgo/handle_test.go /src/goroot/src/fuzz_ng_runtime_cgo/iscgo.go /src/goroot/src/fuzz_ng_runtime_cgo/linux.go /src/goroot/src/fuzz_ng_runtime_cgo/mmap.go /src/goroot/src/fuzz_ng_runtime_cgo/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_cgo/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_cgo/setenv.go /src/goroot/src/fuzz_ng_runtime_cgo/sigaction.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_cgo/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_cgo/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_cgo /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_cgo [fuzz_ng_runtime_cgo.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_cgo [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_cgo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_cgo_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/runtime/debug/garbage.go /src/goroot/src/runtime/debug/garbage_test.go /src/goroot/src/runtime/debug/heapdump_test.go /src/goroot/src/runtime/debug/mod.go /src/goroot/src/runtime/debug/mod_test.go /src/goroot/src/runtime/debug/panic_test.go /src/goroot/src/runtime/debug/stack.go /src/goroot/src/runtime/debug/stack_test.go /src/goroot/src/runtime/debug/stubs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 9 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^runtime_debug '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude SetMaxThreads,SetMaxStack'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude SetMaxThreads,SetMaxStack runtime/debug fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:18 Found package in /src/goroot/src/runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:18 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:18 Function ReadGCStats has unproduced argument GCStats
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:18 Function WriteHeapDump has unproduced argument uintptr
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/runtime_debug.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/runtime_debug.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/build.sh: line 49: continue: only meaningful in a `for', `while', or `until' loop
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module runtime/debug: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_runtime_debug/copy/garbage.go fuzz_ng_runtime_debug/copy/mod.go fuzz_ng_runtime_debug/copy/stack.go fuzz_ng_runtime_debug/copy/stubs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_runtime_debug/copy/garbage.go:182:1: expected declaration, found NgoloCorpusMarshal
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_debug/copy/garbage.go fuzz_ng_runtime_debug/copy/mod.go fuzz_ng_runtime_debug/copy/stack.go fuzz_ng_runtime_debug/copy/stubs.go /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_runtime_debug/fuzz_ng.go fuzz_ng_runtime_debug/fuzzng_unsure_test.go fuzz_ng_runtime_debug/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/runtime/debug/garbage_test.go /src/goroot/src/runtime/debug/heapdump_test.go /src/goroot/src/runtime/debug/mod_test.go /src/goroot/src/runtime/debug/panic_test.go /src/goroot/src/runtime/debug/stack_test.go /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/runtime/debug/testdata /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_runtime_debug/' /src/goroot/src/fuzz_ng_runtime_debug/fuzz_ng.go /src/goroot/src/fuzz_ng_runtime_debug/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_runtime_debug/garbage.go /src/goroot/src/fuzz_ng_runtime_debug/garbage_test.go /src/goroot/src/fuzz_ng_runtime_debug/heapdump_test.go /src/goroot/src/fuzz_ng_runtime_debug/mod.go /src/goroot/src/fuzz_ng_runtime_debug/mod_test.go /src/goroot/src/fuzz_ng_runtime_debug/ngolo_helper.go /src/goroot/src/fuzz_ng_runtime_debug/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_runtime_debug/panic_test.go /src/goroot/src/fuzz_ng_runtime_debug/stack.go /src/goroot/src/fuzz_ng_runtime_debug/stack_test.go /src/goroot/src/fuzz_ng_runtime_debug/stubs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_debug/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_runtime_debug/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_runtime_debug /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_runtime_debug [fuzz_ng_runtime_debug.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./garbage.go:182:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_runtime_debug [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_runtime_debug/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_runtime_debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_runtime_debug_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/debug/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/debug/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/debug/testdata/fuzz/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/debug/testdata/fuzz/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/runtime/debug/testdata/fuzz/FuzzParseBuildInfoRoundTrip/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/runtime/debug/testdata/fuzz/FuzzParseBuildInfoRoundTrip/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/testing/allocs.go /src/goroot/src/testing/allocs_test.go /src/goroot/src/testing/benchmark.go /src/goroot/src/testing/benchmark_test.go /src/goroot/src/testing/cover.go /src/goroot/src/testing/example.go /src/goroot/src/testing/export_test.go /src/goroot/src/testing/flag_test.go /src/goroot/src/testing/fuzz.go /src/goroot/src/testing/helper_test.go /src/goroot/src/testing/helperfuncs_test.go /src/goroot/src/testing/match.go /src/goroot/src/testing/match_test.go /src/goroot/src/testing/newcover.go /src/goroot/src/testing/panic_test.go /src/goroot/src/testing/run_example.go /src/goroot/src/testing/run_example_wasm.go /src/goroot/src/testing/sub_test.go /src/goroot/src/testing/testing.go /src/goroot/src/testing/testing_other.go /src/goroot/src/testing/testing_test.go /src/goroot/src/testing/testing_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 22 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^testing '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing testing fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Found package in /src/goroot/src/testing
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Type T is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Type B is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Type PB is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Type F is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled field &ast.MapType{Map:27381, Key:(*ast.Ident)(0xc000336660), Value:(*ast.ArrayType)(0xc00034e1e0)} for struct Cover
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled field &ast.MapType{Map:27418, Key:(*ast.Ident)(0xc0003366c0), Value:(*ast.ArrayType)(0xc00034e240)} for struct Cover
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled field &ast.FuncType{Func:29976, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00034f3b0), Results:(*ast.FieldList)(nil)} for struct InternalExample
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled field &ast.FuncType{Func:115502, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000411470), Results:(*ast.FieldList)(nil)} for struct InternalTest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled field &ast.FuncType{Func:3642, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000281b00), Results:(*ast.FieldList)(nil)} for struct InternalBenchmark
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled field &ast.FuncType{Func:34179, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0003668a0), Results:(*ast.FieldList)(nil)} for struct InternalFuzzTarget
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled argument &ast.FuncType{Func:1087, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000280ea0), Results:(*ast.FieldList)(nil)} for AllocsPerRun
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function StartTimer has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function StopTimer has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function ResetTimer has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function SetBytes has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function ReportAllocs has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Elapsed has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function ReportMetric has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled argument &ast.FuncType{Func:16290, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000318510), Results:(*ast.FieldList)(0xc000318570)} for RunBenchmarks
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function RunBenchmarks has unproduced array argument InternalBenchmark
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Run has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Next has unproduced recv PB
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function RunParallel has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function SetParallelism has unproduced recv B
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled argument &ast.FuncType{Func:25904, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc000330840), Results:(*ast.FieldList)(nil)} for Benchmark
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function RegisterCover has unproduced argument Cover
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled argument &ast.FuncType{Func:30192, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00034f440), Results:(*ast.FieldList)(0xc00034f4a0)} for RunExamples
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function RunExamples has unproduced array argument InternalExample
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Helper has unproduced recv F
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Fail has unproduced recv F
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Skipped has unproduced recv F
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Add has unproduced recv F
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Fuzz has unproduced recv F
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Parallel has unproduced recv T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Setenv has unproduced recv T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Run has unproduced recv T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Deadline has unproduced recv T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled argument &ast.FuncType{Func:125914, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00043b9e0), Results:(*ast.FieldList)(0xc00043ba40)} for Main
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Main has unproduced array argument InternalTest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Main has unproduced array argument InternalBenchmark
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function Main has unproduced array argument InternalExample
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function MainStart has unproduced argument testDeps
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function MainStart has unproduced array argument InternalTest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function MainStart has unproduced array argument InternalBenchmark
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function MainStart has unproduced array argument InternalFuzzTarget
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function MainStart has unproduced array argument InternalExample
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Unhandled argument &ast.FuncType{Func:134752, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0004558f0), Results:(*ast.FieldList)(0xc000455950)} for RunTests
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:24 Function RunTests has unproduced array argument InternalTest
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/testing.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/testing.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module testing: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:236:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:302:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_testing/copy/allocs.go fuzz_ng_testing/copy/benchmark.go fuzz_ng_testing/copy/cover.go fuzz_ng_testing/copy/example.go fuzz_ng_testing/copy/fuzz.go fuzz_ng_testing/copy/match.go fuzz_ng_testing/copy/newcover.go fuzz_ng_testing/copy/run_example.go fuzz_ng_testing/copy/testing.go fuzz_ng_testing/copy/testing_other.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing/copy/allocs.go fuzz_ng_testing/copy/benchmark.go fuzz_ng_testing/copy/cover.go fuzz_ng_testing/copy/example.go fuzz_ng_testing/copy/fuzz.go fuzz_ng_testing/copy/match.go fuzz_ng_testing/copy/newcover.go fuzz_ng_testing/copy/run_example.go fuzz_ng_testing/copy/testing.go fuzz_ng_testing/copy/testing_other.go /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing/fuzz_ng.go fuzz_ng_testing/fuzzng_unsure_test.go fuzz_ng_testing/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/testing/allocs_test.go /src/goroot/src/testing/benchmark_test.go /src/goroot/src/testing/export_test.go /src/goroot/src/testing/flag_test.go /src/goroot/src/testing/helper_test.go /src/goroot/src/testing/helperfuncs_test.go /src/goroot/src/testing/match_test.go /src/goroot/src/testing/panic_test.go /src/goroot/src/testing/sub_test.go /src/goroot/src/testing/testing_test.go /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/testing/testdata /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/testing/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_testing/' /src/goroot/src/fuzz_ng_testing/allocs.go /src/goroot/src/fuzz_ng_testing/allocs_test.go /src/goroot/src/fuzz_ng_testing/benchmark.go /src/goroot/src/fuzz_ng_testing/benchmark_test.go /src/goroot/src/fuzz_ng_testing/cover.go /src/goroot/src/fuzz_ng_testing/example.go /src/goroot/src/fuzz_ng_testing/export_test.go /src/goroot/src/fuzz_ng_testing/flag_test.go /src/goroot/src/fuzz_ng_testing/fuzz.go /src/goroot/src/fuzz_ng_testing/fuzz_ng.go /src/goroot/src/fuzz_ng_testing/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing/helper_test.go /src/goroot/src/fuzz_ng_testing/helperfuncs_test.go /src/goroot/src/fuzz_ng_testing/match.go /src/goroot/src/fuzz_ng_testing/match_test.go /src/goroot/src/fuzz_ng_testing/newcover.go /src/goroot/src/fuzz_ng_testing/ngolo_helper.go /src/goroot/src/fuzz_ng_testing/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_testing/panic_test.go /src/goroot/src/fuzz_ng_testing/run_example.go /src/goroot/src/fuzz_ng_testing/sub_test.go /src/goroot/src/fuzz_ng_testing/testing.go /src/goroot/src/fuzz_ng_testing/testing_other.go /src/goroot/src/fuzz_ng_testing/testing_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_testing /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_testing [fuzz_ng_testing.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./sub_test.go:735:6: makeRegexp redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./panic_test.go:156:6: other declaration of makeRegexp
Step #3 - "compile-libfuzzer-coverage-x86_64": ./benchmark_test.go:38:11: undefined: testing.PrettyPrint
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_testing [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_testing/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_testing_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo testing
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/testing/quick/quick.go /src/goroot/src/testing/quick/quick_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^testing_quick '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing testing/quick fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Found package in /src/goroot/src/testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Type CheckEqualError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Type SetupError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Type CheckError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function Value has unproduced argument reflect.Type
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function Value has unproduced argument rand.Rand
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function Error has unproduced recv SetupError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function Error has unproduced recv CheckError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function Error has unproduced recv CheckEqualError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function Check has unproduced argument Config
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:31 Function CheckEqual has unproduced argument Config
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/testing_quick.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/testing_quick.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module testing/quick: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_quick [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_quick.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:17:2: "testing/quick" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_testing_quick/copy/quick.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_quick/copy/quick.go /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_quick/fuzz_ng.go fuzz_ng_testing_quick/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/testing/quick/quick_test.go /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/testing/quick/testdata /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/testing/quick/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_testing_quick/' /src/goroot/src/fuzz_ng_testing_quick/fuzz_ng.go /src/goroot/src/fuzz_ng_testing_quick/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_quick/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_quick/quick.go /src/goroot/src/fuzz_ng_testing_quick/quick_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_quick/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_quick/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_testing_quick /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_testing_quick [fuzz_ng_testing_quick.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_testing_quick [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_testing_quick/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_testing_quick_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/testing/fstest/mapfs.go /src/goroot/src/testing/fstest/mapfs_test.go /src/goroot/src/testing/fstest/testfs.go /src/goroot/src/testing/fstest/testfs_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^testing_fstest '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing testing/fstest fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Found package in /src/goroot/src/testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Array result for fs.DirEntry is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Type MapFS is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function Open has unproduced recv MapFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function ReadFile has unproduced recv MapFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function Stat has unproduced recv MapFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function ReadDir has unproduced recv MapFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function Glob has unproduced recv MapFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function Sub has unproduced recv MapFS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Function TestFS has unproduced argument fs.FS
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:33 Unhandled argument &ast.Ellipsis{Ellipsis:1151, Elt:(*ast.Ident)(0xc000121140)} for TestFS
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/testing_fstest.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/testing_fstest.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module testing/fstest: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_fstest [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_fstest.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:17:2: "testing/fstest" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_testing_fstest/copy/mapfs.go fuzz_ng_testing_fstest/copy/testfs.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_fstest/copy/mapfs.go fuzz_ng_testing_fstest/copy/testfs.go /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_fstest/fuzz_ng.go fuzz_ng_testing_fstest/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/testing/fstest/mapfs_test.go /src/goroot/src/testing/fstest/testfs_test.go /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/testing/fstest/testdata /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/testing/fstest/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_testing_fstest/' /src/goroot/src/fuzz_ng_testing_fstest/fuzz_ng.go /src/goroot/src/fuzz_ng_testing_fstest/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_fstest/mapfs.go /src/goroot/src/fuzz_ng_testing_fstest/mapfs_test.go /src/goroot/src/fuzz_ng_testing_fstest/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_fstest/testfs.go /src/goroot/src/fuzz_ng_testing_fstest/testfs_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_fstest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_fstest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_testing_fstest /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_testing_fstest [fuzz_ng_testing_fstest.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_testing_fstest [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_testing_fstest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_testing_fstest_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/testing/slogtest/example_test.go /src/goroot/src/testing/slogtest/run_test.go /src/goroot/src/testing/slogtest/slogtest.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^testing_slogtest '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing testing/slogtest fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:36 Found package in /src/goroot/src/testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:36 Function TestHandler has unproduced argument slog.Handler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:36 Unhandled argument &ast.FuncType{Func:7201, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c50b0), Results:(*ast.FieldList)(0xc0001c5140)} for TestHandler
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:36 Function Run has unproduced argument testing.T
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:36 Unhandled argument &ast.FuncType{Func:8154, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c5470), Results:(*ast.FieldList)(0xc0001c54a0)} for Run
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:36 Unhandled argument &ast.FuncType{Func:8192, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0001c5500), Results:(*ast.FieldList)(0xc0001c5560)} for Run
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/testing_slogtest.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/testing_slogtest.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module testing/slogtest: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_slogtest [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_slogtest.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:17:2: "testing/slogtest" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_testing_slogtest/copy/slogtest.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_slogtest/copy/slogtest.go /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_slogtest/fuzz_ng.go fuzz_ng_testing_slogtest/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/testing/slogtest/example_test.go /src/goroot/src/testing/slogtest/run_test.go /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/testing/slogtest/testdata /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/testing/slogtest/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_testing_slogtest/' /src/goroot/src/fuzz_ng_testing_slogtest/example_test.go /src/goroot/src/fuzz_ng_testing_slogtest/fuzz_ng.go /src/goroot/src/fuzz_ng_testing_slogtest/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_slogtest/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_slogtest/run_test.go /src/goroot/src/fuzz_ng_testing_slogtest/slogtest.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_slogtest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_slogtest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_testing_slogtest /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_testing_slogtest [fuzz_ng_testing_slogtest.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_testing_slogtest [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_testing_slogtest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_testing_slogtest_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/testing/internal/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/testing/internal/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/testing/internal/testdeps/deps.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/internal/testdeps
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/testing/iotest/example_test.go /src/goroot/src/testing/iotest/logger.go /src/goroot/src/testing/iotest/logger_test.go /src/goroot/src/testing/iotest/reader.go /src/goroot/src/testing/iotest/reader_test.go /src/goroot/src/testing/iotest/writer.go /src/goroot/src/testing/iotest/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^testing_iotest '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing testing/iotest fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:38 Found package in /src/goroot/src/testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:38 Function ErrReader has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/testing_iotest.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/testing_iotest.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module testing/iotest: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_testing_iotest/copy/logger.go fuzz_ng_testing_iotest/copy/reader.go fuzz_ng_testing_iotest/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_testing_iotest/copy/reader.go:18:1: expected declaration, found ngolo_r
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_testing_iotest/copy/reader.go:36:1: expected declaration, found ngolo_r
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_testing_iotest/copy/reader.go:54:1: expected declaration, found ngolo_r
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_testing_iotest/copy/reader.go:88:1: expected declaration, found ngolo_r
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_iotest/copy/logger.go fuzz_ng_testing_iotest/copy/reader.go fuzz_ng_testing_iotest/copy/writer.go /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_testing_iotest/fuzz_ng.go fuzz_ng_testing_iotest/fuzzng_unsure_test.go fuzz_ng_testing_iotest/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/testing/iotest/example_test.go /src/goroot/src/testing/iotest/logger_test.go /src/goroot/src/testing/iotest/reader_test.go /src/goroot/src/testing/iotest/writer_test.go /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/testing/iotest/testdata /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/testing/iotest/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_testing_iotest/' /src/goroot/src/fuzz_ng_testing_iotest/example_test.go /src/goroot/src/fuzz_ng_testing_iotest/fuzz_ng.go /src/goroot/src/fuzz_ng_testing_iotest/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_testing_iotest/logger.go /src/goroot/src/fuzz_ng_testing_iotest/logger_test.go /src/goroot/src/fuzz_ng_testing_iotest/ngolo_helper.go /src/goroot/src/fuzz_ng_testing_iotest/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_testing_iotest/reader.go /src/goroot/src/fuzz_ng_testing_iotest/reader_test.go /src/goroot/src/fuzz_ng_testing_iotest/writer.go /src/goroot/src/fuzz_ng_testing_iotest/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_iotest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_testing_iotest/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_testing_iotest /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_testing_iotest [fuzz_ng_testing_iotest.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./reader.go:18:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./reader.go:36:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./reader.go:54:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": ./reader.go:88:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_testing_iotest [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_testing_iotest/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_testing_iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_testing_iotest_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/mime/encodedword.go /src/goroot/src/mime/encodedword_test.go /src/goroot/src/mime/example_test.go /src/goroot/src/mime/grammar.go /src/goroot/src/mime/mediatype.go /src/goroot/src/mime/mediatype_test.go /src/goroot/src/mime/type.go /src/goroot/src/mime/type_dragonfly.go /src/goroot/src/mime/type_freebsd.go /src/goroot/src/mime/type_openbsd.go /src/goroot/src/mime/type_plan9.go /src/goroot/src/mime/type_test.go /src/goroot/src/mime/type_unix.go /src/goroot/src/mime/type_unix_test.go /src/goroot/src/mime/type_windows.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 15 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^mime '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing mime fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Found package in /src/goroot/src/mime
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Type WordEncoder is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Unhandled field &ast.FuncType{Func:8260, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002335f0), Results:(*ast.FieldList)(0xc000233650)} for struct WordDecoder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Function Encode has unproduced recv WordEncoder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Function Decode has unproduced recv WordDecoder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:44 Function DecodeHeader has unproduced recv WordDecoder
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/mime.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/mime.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module mime: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_mime/copy/encodedword.go fuzz_ng_mime/copy/grammar.go fuzz_ng_mime/copy/mediatype.go fuzz_ng_mime/copy/type.go fuzz_ng_mime/copy/type_unix.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_mime/copy/encodedword.go fuzz_ng_mime/copy/grammar.go fuzz_ng_mime/copy/mediatype.go fuzz_ng_mime/copy/type.go fuzz_ng_mime/copy/type_unix.go /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_mime/fuzz_ng.go fuzz_ng_mime/fuzzng_unsure_test.go fuzz_ng_mime/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/mime/encodedword_test.go /src/goroot/src/mime/example_test.go /src/goroot/src/mime/mediatype_test.go /src/goroot/src/mime/type_test.go /src/goroot/src/mime/type_unix_test.go /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/mime/testdata /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_mime/' /src/goroot/src/fuzz_ng_mime/encodedword.go /src/goroot/src/fuzz_ng_mime/encodedword_test.go /src/goroot/src/fuzz_ng_mime/example_test.go /src/goroot/src/fuzz_ng_mime/fuzz_ng.go /src/goroot/src/fuzz_ng_mime/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_mime/grammar.go /src/goroot/src/fuzz_ng_mime/mediatype.go /src/goroot/src/fuzz_ng_mime/mediatype_test.go /src/goroot/src/fuzz_ng_mime/ngolo_helper.go /src/goroot/src/fuzz_ng_mime/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_mime/type.go /src/goroot/src/fuzz_ng_mime/type_test.go /src/goroot/src/fuzz_ng_mime/type_unix.go /src/goroot/src/fuzz_ng_mime/type_unix_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_mime/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_mime/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_mime /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_mime [fuzz_ng_mime.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_mime [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_mime/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_mime_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo mime
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/mime/quotedprintable/example_test.go /src/goroot/src/mime/quotedprintable/reader.go /src/goroot/src/mime/quotedprintable/reader_test.go /src/goroot/src/mime/quotedprintable/writer.go /src/goroot/src/mime/quotedprintable/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^mime_quotedprintable '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing mime/quotedprintable fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:52 Found package in /src/goroot/src/mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/mime_quotedprintable.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/mime_quotedprintable.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module mime/quotedprintable: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_mime_quotedprintable/copy/reader.go fuzz_ng_mime_quotedprintable/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_mime_quotedprintable/copy/reader.go fuzz_ng_mime_quotedprintable/copy/writer.go /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_mime_quotedprintable/fuzz_ng.go fuzz_ng_mime_quotedprintable/fuzzng_unsure_test.go fuzz_ng_mime_quotedprintable/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/mime/quotedprintable/example_test.go /src/goroot/src/mime/quotedprintable/reader_test.go /src/goroot/src/mime/quotedprintable/writer_test.go /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/mime/quotedprintable/testdata /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/mime/quotedprintable/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_mime_quotedprintable/' /src/goroot/src/fuzz_ng_mime_quotedprintable/example_test.go /src/goroot/src/fuzz_ng_mime_quotedprintable/fuzz_ng.go /src/goroot/src/fuzz_ng_mime_quotedprintable/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_mime_quotedprintable/ngolo_helper.go /src/goroot/src/fuzz_ng_mime_quotedprintable/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_mime_quotedprintable/reader.go /src/goroot/src/fuzz_ng_mime_quotedprintable/reader_test.go /src/goroot/src/fuzz_ng_mime_quotedprintable/writer.go /src/goroot/src/fuzz_ng_mime_quotedprintable/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_mime_quotedprintable/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_mime_quotedprintable/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_mime_quotedprintable /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_mime_quotedprintable [fuzz_ng_mime_quotedprintable.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_mime_quotedprintable [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_mime_quotedprintable/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime_quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_mime_quotedprintable_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/mime/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/mime/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/mime/multipart/example_test.go /src/goroot/src/mime/multipart/formdata.go /src/goroot/src/mime/multipart/formdata_test.go /src/goroot/src/mime/multipart/multipart.go /src/goroot/src/mime/multipart/multipart_test.go /src/goroot/src/mime/multipart/readmimeheader.go /src/goroot/src/mime/multipart/writer.go /src/goroot/src/mime/multipart/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^mime_multipart '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing mime/multipart fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:58 Found package in /src/goroot/src/mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:58 Type FileHeader is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:58 Function Open has unproduced recv FileHeader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:21:58 Function CreatePart has unproduced argument textproto.MIMEHeader
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/mime_multipart.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/mime_multipart.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module mime/multipart: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_mime_multipart/copy/formdata.go fuzz_ng_mime_multipart/copy/multipart.go fuzz_ng_mime_multipart/copy/readmimeheader.go fuzz_ng_mime_multipart/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_mime_multipart/copy/formdata.go fuzz_ng_mime_multipart/copy/multipart.go fuzz_ng_mime_multipart/copy/readmimeheader.go fuzz_ng_mime_multipart/copy/writer.go /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_mime_multipart/fuzz_ng.go fuzz_ng_mime_multipart/fuzzng_unsure_test.go fuzz_ng_mime_multipart/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/mime/multipart/example_test.go /src/goroot/src/mime/multipart/formdata_test.go /src/goroot/src/mime/multipart/multipart_test.go /src/goroot/src/mime/multipart/writer_test.go /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/mime/multipart/testdata /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_mime_multipart/' /src/goroot/src/fuzz_ng_mime_multipart/example_test.go /src/goroot/src/fuzz_ng_mime_multipart/formdata.go /src/goroot/src/fuzz_ng_mime_multipart/formdata_test.go /src/goroot/src/fuzz_ng_mime_multipart/fuzz_ng.go /src/goroot/src/fuzz_ng_mime_multipart/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_mime_multipart/multipart.go /src/goroot/src/fuzz_ng_mime_multipart/multipart_test.go /src/goroot/src/fuzz_ng_mime_multipart/ngolo_helper.go /src/goroot/src/fuzz_ng_mime_multipart/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_mime_multipart/readmimeheader.go /src/goroot/src/fuzz_ng_mime_multipart/writer.go /src/goroot/src/fuzz_ng_mime_multipart/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_mime_multipart/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_mime_multipart/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_mime_multipart /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_mime_multipart [fuzz_ng_mime_multipart.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_mime_multipart [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_mime_multipart/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_mime_multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_mime_multipart_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/mime/multipart/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/mime/multipart/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/bufio/bufio.go /src/goroot/src/bufio/bufio_test.go /src/goroot/src/bufio/example_test.go /src/goroot/src/bufio/export_test.go /src/goroot/src/bufio/scan.go /src/goroot/src/bufio/scan_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^bufio '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude ScanBytes -limits NewReaderSize.size,NewWriterSize.size'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude ScanBytes -limits NewReaderSize.size,NewWriterSize.size bufio fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Found package in /src/goroot/src/bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Type SplitFunc is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:05 Function Split has unproduced argument SplitFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/bufio.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/bufio.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module bufio: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_bufio/copy/bufio.go fuzz_ng_bufio/copy/scan.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_bufio/copy/bufio.go fuzz_ng_bufio/copy/scan.go /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_bufio/fuzz_ng.go fuzz_ng_bufio/fuzzng_unsure_test.go fuzz_ng_bufio/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/bufio/bufio_test.go /src/goroot/src/bufio/example_test.go /src/goroot/src/bufio/export_test.go /src/goroot/src/bufio/scan_test.go /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/bufio/testdata /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/bufio/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_bufio/' /src/goroot/src/fuzz_ng_bufio/bufio.go /src/goroot/src/fuzz_ng_bufio/bufio_test.go /src/goroot/src/fuzz_ng_bufio/example_test.go /src/goroot/src/fuzz_ng_bufio/export_test.go /src/goroot/src/fuzz_ng_bufio/fuzz_ng.go /src/goroot/src/fuzz_ng_bufio/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_bufio/ngolo_helper.go /src/goroot/src/fuzz_ng_bufio/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_bufio/scan.go /src/goroot/src/fuzz_ng_bufio/scan_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_bufio/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_bufio/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_bufio /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_bufio [fuzz_ng_bufio.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio_test.go:138:7: minReadBufferSize redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./bufio.go:41:7: other declaration of minReadBufferSize
Step #3 - "compile-libfuzzer-coverage-x86_64": ./scan.go:29:6: Scanner already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/scan.go:29:6: other declaration of Scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ./scan.go:74:2: ErrBadReadCount already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/scan.go:74:2: other declaration of ErrBadReadCount
Step #3 - "compile-libfuzzer-coverage-x86_64": ./scan.go:89:6: NewScanner already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/scan.go:89:6: other declaration of NewScanner
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:32:6: Reader already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/bufio.go:32:6: other declaration of Reader
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:47:6: NewReaderSize already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/bufio.go:47:6: other declaration of NewReaderSize
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:589:6: NewWriterSize already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/bufio.go:586:6: other declaration of NewWriterSize
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:607:6: NewWriter already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/bufio.go:604:6: other declaration of NewWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:834:6: ReadWriter already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/bufio.go:831:6: other declaration of ReadWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:840:6: NewReadWriter already declared through dot-import of package bufio ("bufio")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bufio/bufio.go:837:6: other declaration of NewReadWriter
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bufio.go:47:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_bufio [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_bufio/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_bufio_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/hash/example_test.go /src/goroot/src/hash/hash.go /src/goroot/src/hash/marshal_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^hash '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing hash fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:13 Found package in /src/goroot/src/hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/hash.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/hash.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module hash: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "hash" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_hash/copy/hash.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash/copy/hash.go /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash/fuzz_ng.go fuzz_ng_hash/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/hash/example_test.go /src/goroot/src/hash/marshal_test.go /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/hash/testdata /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/hash/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_hash/' /src/goroot/src/fuzz_ng_hash/example_test.go /src/goroot/src/fuzz_ng_hash/fuzz_ng.go /src/goroot/src/fuzz_ng_hash/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash/hash.go /src/goroot/src/fuzz_ng_hash/marshal_test.go /src/goroot/src/fuzz_ng_hash/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_hash /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_hash [fuzz_ng_hash.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_hash [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_hash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_hash_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/hash/crc32/crc32.go /src/goroot/src/hash/crc32/crc32_amd64.go /src/goroot/src/hash/crc32/crc32_arm64.go /src/goroot/src/hash/crc32/crc32_generic.go /src/goroot/src/hash/crc32/crc32_otherarch.go /src/goroot/src/hash/crc32/crc32_ppc64le.go /src/goroot/src/hash/crc32/crc32_s390x.go /src/goroot/src/hash/crc32/crc32_test.go /src/goroot/src/hash/crc32/example_test.go /src/goroot/src/hash/crc32/gen_const_ppc64le.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^hash_crc32 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing hash/crc32 fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:16 Found package in /src/goroot/src/hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/hash_crc32.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/hash_crc32.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module hash/crc32: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_hash_crc32/copy/crc32.go fuzz_ng_hash_crc32/copy/crc32_amd64.go fuzz_ng_hash_crc32/copy/crc32_generic.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_crc32/copy/crc32.go fuzz_ng_hash_crc32/copy/crc32_amd64.go fuzz_ng_hash_crc32/copy/crc32_generic.go /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_crc32/fuzz_ng.go fuzz_ng_hash_crc32/fuzzng_unsure_test.go fuzz_ng_hash_crc32/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/hash/crc32/crc32_test.go /src/goroot/src/hash/crc32/example_test.go /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/hash/crc32/testdata /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/hash/crc32/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_hash_crc32/' /src/goroot/src/fuzz_ng_hash_crc32/crc32.go /src/goroot/src/fuzz_ng_hash_crc32/crc32_amd64.go /src/goroot/src/fuzz_ng_hash_crc32/crc32_generic.go /src/goroot/src/fuzz_ng_hash_crc32/crc32_test.go /src/goroot/src/fuzz_ng_hash_crc32/example_test.go /src/goroot/src/fuzz_ng_hash_crc32/fuzz_ng.go /src/goroot/src/fuzz_ng_hash_crc32/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash_crc32/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_crc32/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_crc32/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_crc32/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_hash_crc32 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_hash_crc32 [fuzz_ng_hash_crc32.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_hash_crc32 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_hash_crc32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_hash_crc32_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/hash/adler32/adler32.go /src/goroot/src/hash/adler32/adler32_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^hash_adler32 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing hash/adler32 fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:23 Found package in /src/goroot/src/hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/hash_adler32.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/hash_adler32.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module hash/adler32: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_hash_adler32/copy/adler32.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_adler32/copy/adler32.go /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_adler32/fuzz_ng.go fuzz_ng_hash_adler32/fuzzng_unsure_test.go fuzz_ng_hash_adler32/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/hash/adler32/adler32_test.go /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/hash/adler32/testdata /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/hash/adler32/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_hash_adler32/' /src/goroot/src/fuzz_ng_hash_adler32/adler32.go /src/goroot/src/fuzz_ng_hash_adler32/adler32_test.go /src/goroot/src/fuzz_ng_hash_adler32/fuzz_ng.go /src/goroot/src/fuzz_ng_hash_adler32/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash_adler32/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_adler32/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_adler32/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_adler32/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_hash_adler32 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_hash_adler32 [fuzz_ng_hash_adler32.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_hash_adler32 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_hash_adler32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_hash_adler32_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/hash/maphash/example_test.go /src/goroot/src/hash/maphash/maphash.go /src/goroot/src/hash/maphash/maphash_purego.go /src/goroot/src/hash/maphash/maphash_runtime.go /src/goroot/src/hash/maphash/maphash_test.go /src/goroot/src/hash/maphash/smhasher_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^hash_maphash '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing hash/maphash fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Found package in /src/goroot/src/hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Type Hash is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function WriteByte has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function Write has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function WriteString has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function Seed has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function SetSeed has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function Reset has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function Sum64 has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function Sum has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function Size has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:29 Function BlockSize has unproduced recv Hash
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/hash_maphash.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/hash_maphash.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module hash/maphash: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_maphash [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_maphash.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:189:9: undefined: NgoloFuzzOne_String
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:215:9: undefined: NgoloFuzzOne_String
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_hash_maphash/copy/maphash.go fuzz_ng_hash_maphash/copy/maphash_runtime.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_maphash/copy/maphash.go fuzz_ng_hash_maphash/copy/maphash_runtime.go /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_maphash/fuzz_ng.go fuzz_ng_hash_maphash/fuzzng_unsure_test.go fuzz_ng_hash_maphash/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/hash/maphash/example_test.go /src/goroot/src/hash/maphash/maphash_test.go /src/goroot/src/hash/maphash/smhasher_test.go /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/hash/maphash/testdata /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/hash/maphash/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_hash_maphash/' /src/goroot/src/fuzz_ng_hash_maphash/example_test.go /src/goroot/src/fuzz_ng_hash_maphash/fuzz_ng.go /src/goroot/src/fuzz_ng_hash_maphash/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash_maphash/maphash.go /src/goroot/src/fuzz_ng_hash_maphash/maphash_runtime.go /src/goroot/src/fuzz_ng_hash_maphash/maphash_test.go /src/goroot/src/fuzz_ng_hash_maphash/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_maphash/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_hash_maphash/smhasher_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_maphash/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_maphash/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_hash_maphash /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_hash_maphash [fuzz_ng_hash_maphash.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_hash_maphash [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_hash_maphash/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_hash_maphash_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/hash/fnv/fnv.go /src/goroot/src/hash/fnv/fnv_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^hash_fnv '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing hash/fnv fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:35 Found package in /src/goroot/src/hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/hash_fnv.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/hash_fnv.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module hash/fnv: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_fnv [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_fnv.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:179:43: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:182:9: undefined: NgoloFuzzOne_New32a
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:186:9: undefined: NgoloFuzzOne_New64a
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:190:9: undefined: NgoloFuzzOne_New128a
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:199:10: a declared and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:202:9: undefined: NgoloFuzzOne_New32a
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:206:9: undefined: NgoloFuzzOne_New64a
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:210:9: undefined: NgoloFuzzOne_New128a
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_hash_fnv/copy/fnv.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_fnv/copy/fnv.go /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_fnv/fuzz_ng.go fuzz_ng_hash_fnv/fuzzng_unsure_test.go fuzz_ng_hash_fnv/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/hash/fnv/fnv_test.go /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/hash/fnv/testdata /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/hash/fnv/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_hash_fnv/' /src/goroot/src/fuzz_ng_hash_fnv/fnv.go /src/goroot/src/fuzz_ng_hash_fnv/fnv_test.go /src/goroot/src/fuzz_ng_hash_fnv/fuzz_ng.go /src/goroot/src/fuzz_ng_hash_fnv/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash_fnv/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_fnv/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_fnv/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_fnv/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_hash_fnv /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_hash_fnv [fuzz_ng_hash_fnv.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_hash_fnv [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_hash_fnv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_hash_fnv_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/hash/crc64/crc64.go /src/goroot/src/hash/crc64/crc64_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^hash_crc64 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing hash/crc64 fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:42 Found package in /src/goroot/src/hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/hash_crc64.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/hash_crc64.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module hash/crc64: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_hash_crc64/copy/crc64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_crc64/copy/crc64.go /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_hash_crc64/fuzz_ng.go fuzz_ng_hash_crc64/fuzzng_unsure_test.go fuzz_ng_hash_crc64/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/hash/crc64/crc64_test.go /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/hash/crc64/testdata /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/hash/crc64/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_hash_crc64/' /src/goroot/src/fuzz_ng_hash_crc64/crc64.go /src/goroot/src/fuzz_ng_hash_crc64/crc64_test.go /src/goroot/src/fuzz_ng_hash_crc64/fuzz_ng.go /src/goroot/src/fuzz_ng_hash_crc64/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_hash_crc64/ngolo_helper.go /src/goroot/src/fuzz_ng_hash_crc64/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_crc64/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_hash_crc64/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_hash_crc64 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_hash_crc64 [fuzz_ng_hash_crc64.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_hash_crc64 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_hash_crc64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_hash_crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_hash_crc64_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/debug/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/debug/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/pe/file.go /src/goroot/src/debug/pe/file_cgo_test.go /src/goroot/src/debug/pe/file_test.go /src/goroot/src/debug/pe/pe.go /src/goroot/src/debug/pe/section.go /src/goroot/src/debug/pe/string.go /src/goroot/src/debug/pe/symbol.go /src/goroot/src/debug/pe/symbols_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 8 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_pe '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing debug/pe fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Found package in /src/goroot/src/debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Type FormatError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Type StringTable is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Function Error has unproduced recv FormatError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Function String has unproduced recv StringTable
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:48 Function FullName has unproduced recv COFFSymbol
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_pe.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_pe.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/pe: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_pe/copy/file.go fuzz_ng_debug_pe/copy/pe.go fuzz_ng_debug_pe/copy/section.go fuzz_ng_debug_pe/copy/string.go fuzz_ng_debug_pe/copy/symbol.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_pe/copy/file.go fuzz_ng_debug_pe/copy/pe.go fuzz_ng_debug_pe/copy/section.go fuzz_ng_debug_pe/copy/string.go fuzz_ng_debug_pe/copy/symbol.go /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_pe/fuzz_ng.go fuzz_ng_debug_pe/fuzzng_unsure_test.go fuzz_ng_debug_pe/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/pe/file_cgo_test.go /src/goroot/src/debug/pe/file_test.go /src/goroot/src/debug/pe/symbols_test.go /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/pe/testdata /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_pe/' /src/goroot/src/fuzz_ng_debug_pe/file.go /src/goroot/src/fuzz_ng_debug_pe/file_cgo_test.go /src/goroot/src/fuzz_ng_debug_pe/file_test.go /src/goroot/src/fuzz_ng_debug_pe/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_pe/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_pe/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_pe/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_pe/pe.go /src/goroot/src/fuzz_ng_debug_pe/section.go /src/goroot/src/fuzz_ng_debug_pe/string.go /src/goroot/src/fuzz_ng_debug_pe/symbol.go /src/goroot/src/fuzz_ng_debug_pe/symbols_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_pe/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_pe/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_pe /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_pe [fuzz_ng_debug_pe.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_pe [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_pe/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_pe_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/debug/pe/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/debug/pe/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/macho/fat.go /src/goroot/src/debug/macho/file.go /src/goroot/src/debug/macho/file_test.go /src/goroot/src/debug/macho/macho.go /src/goroot/src/debug/macho/reloctype.go /src/goroot/src/debug/macho/reloctype_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_macho '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing debug/macho fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Found package in /src/goroot/src/debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Type LoadBytes is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Type FormatError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Function Raw has unproduced recv LoadBytes
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:22:54 Function Error has unproduced recv FormatError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_macho.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_macho.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/macho: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_macho/copy/fat.go fuzz_ng_debug_macho/copy/file.go fuzz_ng_debug_macho/copy/macho.go fuzz_ng_debug_macho/copy/reloctype.go fuzz_ng_debug_macho/copy/reloctype_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_macho/copy/fat.go fuzz_ng_debug_macho/copy/file.go fuzz_ng_debug_macho/copy/macho.go fuzz_ng_debug_macho/copy/reloctype.go fuzz_ng_debug_macho/copy/reloctype_string.go /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_macho/fuzz_ng.go fuzz_ng_debug_macho/fuzzng_unsure_test.go fuzz_ng_debug_macho/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/macho/file_test.go /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/macho/testdata /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_macho/' /src/goroot/src/fuzz_ng_debug_macho/fat.go /src/goroot/src/fuzz_ng_debug_macho/file.go /src/goroot/src/fuzz_ng_debug_macho/file_test.go /src/goroot/src/fuzz_ng_debug_macho/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_macho/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_macho/macho.go /src/goroot/src/fuzz_ng_debug_macho/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_macho/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_macho/reloctype.go /src/goroot/src/fuzz_ng_debug_macho/reloctype_string.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_macho/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_macho/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_macho /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_macho [fuzz_ng_debug_macho.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_macho [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_macho/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_macho_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/debug/macho/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/debug/macho/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/plan9obj/file.go /src/goroot/src/debug/plan9obj/file_test.go /src/goroot/src/debug/plan9obj/plan9obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_plan9obj '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing debug/plan9obj fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:02 Found package in /src/goroot/src/debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:02 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:02 Array result for Sym is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_plan9obj.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_plan9obj.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/plan9obj: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_plan9obj/copy/file.go fuzz_ng_debug_plan9obj/copy/plan9obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_plan9obj/copy/file.go fuzz_ng_debug_plan9obj/copy/plan9obj.go /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_plan9obj/fuzz_ng.go fuzz_ng_debug_plan9obj/fuzzng_unsure_test.go fuzz_ng_debug_plan9obj/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/plan9obj/file_test.go /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/plan9obj/testdata /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_plan9obj/' /src/goroot/src/fuzz_ng_debug_plan9obj/file.go /src/goroot/src/fuzz_ng_debug_plan9obj/file_test.go /src/goroot/src/fuzz_ng_debug_plan9obj/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_plan9obj/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_plan9obj/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_plan9obj/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_plan9obj/plan9obj.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_plan9obj/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_plan9obj/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_plan9obj /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_plan9obj [fuzz_ng_debug_plan9obj.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_plan9obj [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_plan9obj/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_plan9obj_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/debug/plan9obj/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/debug/plan9obj/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/gosym/pclntab.go /src/goroot/src/debug/gosym/pclntab_test.go /src/goroot/src/debug/gosym/symtab.go /src/goroot/src/debug/gosym/symtab_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_gosym '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing debug/gosym fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Found package in /src/goroot/src/debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Type UnknownFileError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Type UnknownLineError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Type DecodingError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Function Error has unproduced recv UnknownFileError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Function Error has unproduced recv UnknownLineError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:08 Function Error has unproduced recv DecodingError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_gosym.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_gosym.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/gosym: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_gosym/copy/pclntab.go fuzz_ng_debug_gosym/copy/symtab.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_gosym/copy/pclntab.go fuzz_ng_debug_gosym/copy/symtab.go /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_gosym/fuzz_ng.go fuzz_ng_debug_gosym/fuzzng_unsure_test.go fuzz_ng_debug_gosym/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/gosym/pclntab_test.go /src/goroot/src/debug/gosym/symtab_test.go /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/gosym/testdata /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_gosym/' /src/goroot/src/fuzz_ng_debug_gosym/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_gosym/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_gosym/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_gosym/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_gosym/pclntab.go /src/goroot/src/fuzz_ng_debug_gosym/pclntab_test.go /src/goroot/src/fuzz_ng_debug_gosym/symtab.go /src/goroot/src/fuzz_ng_debug_gosym/symtab_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_gosym/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_gosym/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_gosym /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_gosym [fuzz_ng_debug_gosym.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_gosym [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_gosym/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_gosym_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/gosym/testdata/main.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/gosym/testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/buildinfo/buildinfo.go /src/goroot/src/debug/buildinfo/buildinfo_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_buildinfo '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing debug/buildinfo fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:15 Found package in /src/goroot/src/debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_buildinfo.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_buildinfo.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/buildinfo: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_buildinfo/copy/buildinfo.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_buildinfo/copy/buildinfo.go /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_buildinfo/fuzz_ng.go fuzz_ng_debug_buildinfo/fuzzng_unsure_test.go fuzz_ng_debug_buildinfo/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/buildinfo/buildinfo_test.go /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/buildinfo/testdata /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/debug/buildinfo/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_buildinfo/' /src/goroot/src/fuzz_ng_debug_buildinfo/buildinfo.go /src/goroot/src/fuzz_ng_debug_buildinfo/buildinfo_test.go /src/goroot/src/fuzz_ng_debug_buildinfo/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_buildinfo/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_buildinfo/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_buildinfo/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_buildinfo/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_buildinfo/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_buildinfo /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_buildinfo [fuzz_ng_debug_buildinfo.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_buildinfo [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_buildinfo/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_buildinfo_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/elf/elf.go /src/goroot/src/debug/elf/elf_test.go /src/goroot/src/debug/elf/file.go /src/goroot/src/debug/elf/file_test.go /src/goroot/src/debug/elf/reader.go /src/goroot/src/debug/elf/symbols_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_elf '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing debug/elf fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Found package in /src/goroot/src/debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for Symbol is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for Symbol is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for ImportedSymbol is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Array result for uint64 is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Type FormatError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Type Prog is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Function Open has unproduced recv Prog
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:21 Function Error has unproduced recv FormatError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_elf.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_elf.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/elf: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_elf/copy/elf.go fuzz_ng_debug_elf/copy/file.go fuzz_ng_debug_elf/copy/reader.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_elf/copy/elf.go fuzz_ng_debug_elf/copy/file.go fuzz_ng_debug_elf/copy/reader.go /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_elf/fuzz_ng.go fuzz_ng_debug_elf/fuzzng_unsure_test.go fuzz_ng_debug_elf/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/elf/elf_test.go /src/goroot/src/debug/elf/file_test.go /src/goroot/src/debug/elf/symbols_test.go /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/elf/testdata /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_elf/' /src/goroot/src/fuzz_ng_debug_elf/elf.go /src/goroot/src/fuzz_ng_debug_elf/elf_test.go /src/goroot/src/fuzz_ng_debug_elf/file.go /src/goroot/src/fuzz_ng_debug_elf/file_test.go /src/goroot/src/fuzz_ng_debug_elf/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_elf/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_elf/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_elf/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_elf/reader.go /src/goroot/src/fuzz_ng_debug_elf/symbols_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_elf/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_elf/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_elf /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_elf [fuzz_ng_debug_elf.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_elf [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_elf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_elf_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/debug/elf/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/debug/elf/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/debug/dwarf/attr_string.go /src/goroot/src/debug/dwarf/buf.go /src/goroot/src/debug/dwarf/class_string.go /src/goroot/src/debug/dwarf/const.go /src/goroot/src/debug/dwarf/dwarf5ranges_test.go /src/goroot/src/debug/dwarf/entry.go /src/goroot/src/debug/dwarf/entry_test.go /src/goroot/src/debug/dwarf/export_test.go /src/goroot/src/debug/dwarf/line.go /src/goroot/src/debug/dwarf/line_test.go /src/goroot/src/debug/dwarf/open.go /src/goroot/src/debug/dwarf/tag_string.go /src/goroot/src/debug/dwarf/type.go /src/goroot/src/debug/dwarf/type_test.go /src/goroot/src/debug/dwarf/typeunit.go /src/goroot/src/debug/dwarf/unit.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 16 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^debug_dwarf '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude ArrayType'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude ArrayType debug/dwarf fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Found package in /src/goroot/src/debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Array result for uint64 is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Array result for LineFile is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Type DecodeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Type Offset is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Type VoidType is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Type DotDotDotType is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Error has unproduced recv DecodeError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Seek has unproduced argument Offset
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Next has unproduced argument LineEntry
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function SeekPC has unproduced argument LineEntry
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv QualType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Size has unproduced recv QualType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv ArrayType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Size has unproduced recv ArrayType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv VoidType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv PtrType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv StructType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Defn has unproduced recv StructType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv EnumType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv FuncType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv DotDotDotType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function String has unproduced recv TypedefType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Size has unproduced recv TypedefType
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:31 Function Type has unproduced argument Offset
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/debug_dwarf.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/debug_dwarf.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module debug/dwarf: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_debug_dwarf/copy/attr_string.go fuzz_ng_debug_dwarf/copy/buf.go fuzz_ng_debug_dwarf/copy/class_string.go fuzz_ng_debug_dwarf/copy/const.go fuzz_ng_debug_dwarf/copy/entry.go fuzz_ng_debug_dwarf/copy/line.go fuzz_ng_debug_dwarf/copy/open.go fuzz_ng_debug_dwarf/copy/tag_string.go fuzz_ng_debug_dwarf/copy/type.go fuzz_ng_debug_dwarf/copy/typeunit.go fuzz_ng_debug_dwarf/copy/unit.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_dwarf/copy/attr_string.go fuzz_ng_debug_dwarf/copy/buf.go fuzz_ng_debug_dwarf/copy/class_string.go fuzz_ng_debug_dwarf/copy/const.go fuzz_ng_debug_dwarf/copy/entry.go fuzz_ng_debug_dwarf/copy/line.go fuzz_ng_debug_dwarf/copy/open.go fuzz_ng_debug_dwarf/copy/tag_string.go fuzz_ng_debug_dwarf/copy/type.go fuzz_ng_debug_dwarf/copy/typeunit.go fuzz_ng_debug_dwarf/copy/unit.go /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_debug_dwarf/fuzz_ng.go fuzz_ng_debug_dwarf/fuzzng_unsure_test.go fuzz_ng_debug_dwarf/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/debug/dwarf/dwarf5ranges_test.go /src/goroot/src/debug/dwarf/entry_test.go /src/goroot/src/debug/dwarf/export_test.go /src/goroot/src/debug/dwarf/line_test.go /src/goroot/src/debug/dwarf/type_test.go /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/debug/dwarf/testdata /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_debug_dwarf/' /src/goroot/src/fuzz_ng_debug_dwarf/attr_string.go /src/goroot/src/fuzz_ng_debug_dwarf/buf.go /src/goroot/src/fuzz_ng_debug_dwarf/class_string.go /src/goroot/src/fuzz_ng_debug_dwarf/const.go /src/goroot/src/fuzz_ng_debug_dwarf/dwarf5ranges_test.go /src/goroot/src/fuzz_ng_debug_dwarf/entry.go /src/goroot/src/fuzz_ng_debug_dwarf/entry_test.go /src/goroot/src/fuzz_ng_debug_dwarf/export_test.go /src/goroot/src/fuzz_ng_debug_dwarf/fuzz_ng.go /src/goroot/src/fuzz_ng_debug_dwarf/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_debug_dwarf/line.go /src/goroot/src/fuzz_ng_debug_dwarf/line_test.go /src/goroot/src/fuzz_ng_debug_dwarf/ngolo_helper.go /src/goroot/src/fuzz_ng_debug_dwarf/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_debug_dwarf/open.go /src/goroot/src/fuzz_ng_debug_dwarf/tag_string.go /src/goroot/src/fuzz_ng_debug_dwarf/type.go /src/goroot/src/fuzz_ng_debug_dwarf/type_test.go /src/goroot/src/fuzz_ng_debug_dwarf/typeunit.go /src/goroot/src/fuzz_ng_debug_dwarf/unit.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_dwarf/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_debug_dwarf/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_debug_dwarf /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_debug_dwarf [fuzz_ng_debug_dwarf.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:28:2: AttrVisibility already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:28:2: other declaration of AttrVisibility
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:41:2: AttrReturnAddr already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:41:2: other declaration of AttrReturnAddr
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:43:2: AttrStrideSize already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:43:2: other declaration of AttrStrideSize
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:105:2: AttrDataBitOffset already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:105:2: other declaration of AttrDataBitOffset
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:112:2: AttrRank already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:112:2: other declaration of AttrRank
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:132:2: AttrCallDataValue already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:132:2: other declaration of AttrCallDataValue
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:235:2: TagSetType already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:235:2: other declaration of TagSetType
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:238:2: TagAccessDeclaration already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/const.go:238:2: other declaration of TagAccessDeclaration
Step #3 - "compile-libfuzzer-coverage-x86_64": ./type.go:281:6: EnumType already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/type.go:281:6: other declaration of EnumType
Step #3 - "compile-libfuzzer-coverage-x86_64": ./type.go:310:6: FuncType already declared through dot-import of package dwarf ("debug/dwarf")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/debug/dwarf/type.go:310:6: other declaration of FuncType
Step #3 - "compile-libfuzzer-coverage-x86_64": ./const.go:238:2: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_debug_dwarf [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_debug_dwarf/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_debug_dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_debug_dwarf_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/debug/dwarf/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/debug/dwarf/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/expvar/expvar.go /src/goroot/src/expvar/expvar_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^expvar '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing expvar fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:39 Found package in /src/goroot/src/expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:39 Type Func is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:39 Unhandled argument &ast.FuncType{Func:5806, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002f48a0), Results:(*ast.FieldList)(nil)} for MapNgdotDo
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:39 Function Value has unproduced recv Func
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:39 Function String has unproduced recv Func
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:39 Unhandled argument &ast.FuncType{Func:7911, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0002f5500), Results:(*ast.FieldList)(nil)} for Do
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/expvar.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/expvar.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module expvar: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_expvar/copy/expvar.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_expvar/copy/expvar.go /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_expvar/fuzz_ng.go fuzz_ng_expvar/fuzzng_unsure_test.go fuzz_ng_expvar/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/expvar/expvar_test.go /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/expvar/testdata /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/expvar/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_expvar/' /src/goroot/src/fuzz_ng_expvar/expvar.go /src/goroot/src/fuzz_ng_expvar/expvar_test.go /src/goroot/src/fuzz_ng_expvar/fuzz_ng.go /src/goroot/src/fuzz_ng_expvar/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_expvar/ngolo_helper.go /src/goroot/src/fuzz_ng_expvar/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_expvar/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_expvar/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_expvar /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_expvar [fuzz_ng_expvar.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_expvar [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_expvar/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_expvar_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/encoding.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 1 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:46 Found package in /src/goroot/src/encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": ngolofuzz.proto:8:3: Expected type name.
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: error: no such file or directory: 'cpp/ngolofuzz.pb.cc'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/lpm/ngolofuzz.cc:1:10: fatal error: 'ngolofuzz.pb.h' file not found
Step #3 - "compile-libfuzzer-coverage-x86_64": #include "ngolofuzz.pb.h"
Step #3 - "compile-libfuzzer-coverage-x86_64":          ^~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 error generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding [github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:10:2: "encoding" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:11:2: "fmt" imported and not used
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:120:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:141:10: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:162:23: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_ng.go:185:24: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding/copy/encoding.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding/copy/encoding.go /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding/fuzz_ng.go fuzz_ng_encoding/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp '/src/goroot/src/encoding/*_test.go' /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/*_test.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/testdata /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding/' /src/goroot/src/fuzz_ng_encoding/encoding.go /src/goroot/src/fuzz_ng_encoding/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding/ngolo_helper.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding [fuzz_ng_encoding.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:17: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:15:42: undefined: isNgoloFuzzOne_Item
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:16: undefined: NgoloFuzzList
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ngolo_helper.go:16:39: undefined: NgoloFuzzOne
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/csv/example_test.go /src/goroot/src/encoding/csv/fuzz.go /src/goroot/src/encoding/csv/reader.go /src/goroot/src/encoding/csv/reader_test.go /src/goroot/src/encoding/csv/writer.go /src/goroot/src/encoding/csv/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 6 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_csv '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/csv fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Found package in /src/goroot/src/encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Array result for string is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Type ParseError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Function Error has unproduced recv ParseError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Function Unwrap has unproduced recv ParseError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:49 Function WriteAll has unproduced argument string
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_csv.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_csv.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/csv: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_csv/copy/reader.go fuzz_ng_encoding_csv/copy/writer.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_csv/copy/reader.go fuzz_ng_encoding_csv/copy/writer.go /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_csv/fuzz_ng.go fuzz_ng_encoding_csv/fuzzng_unsure_test.go fuzz_ng_encoding_csv/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/csv/example_test.go /src/goroot/src/encoding/csv/reader_test.go /src/goroot/src/encoding/csv/writer_test.go /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/csv/testdata /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/csv/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_csv/' /src/goroot/src/fuzz_ng_encoding_csv/example_test.go /src/goroot/src/fuzz_ng_encoding_csv/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_csv/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_csv/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_csv/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_csv/reader.go /src/goroot/src/fuzz_ng_encoding_csv/reader_test.go /src/goroot/src/fuzz_ng_encoding_csv/writer.go /src/goroot/src/fuzz_ng_encoding_csv/writer_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_csv/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_csv/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_csv /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_csv [fuzz_ng_encoding_csv.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_csv [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_csv/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_csv_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/gob/codec_test.go /src/goroot/src/encoding/gob/debug.go /src/goroot/src/encoding/gob/dec_helpers.go /src/goroot/src/encoding/gob/decgen.go /src/goroot/src/encoding/gob/decode.go /src/goroot/src/encoding/gob/decoder.go /src/goroot/src/encoding/gob/doc.go /src/goroot/src/encoding/gob/dump.go /src/goroot/src/encoding/gob/enc_helpers.go /src/goroot/src/encoding/gob/encgen.go /src/goroot/src/encoding/gob/encode.go /src/goroot/src/encoding/gob/encoder.go /src/goroot/src/encoding/gob/encoder_test.go /src/goroot/src/encoding/gob/error.go /src/goroot/src/encoding/gob/example_encdec_test.go /src/goroot/src/encoding/gob/example_interface_test.go /src/goroot/src/encoding/gob/example_test.go /src/goroot/src/encoding/gob/gobencdec_test.go /src/goroot/src/encoding/gob/timing_test.go /src/goroot/src/encoding/gob/type.go /src/goroot/src/encoding/gob/type_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 21 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_gob '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/gob fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:55 Found package in /src/goroot/src/encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:55 Function DecodeValue has unproduced argument reflect.Value
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:23:55 Function EncodeValue has unproduced argument reflect.Value
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_gob.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_gob.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/gob: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_gob/copy/dec_helpers.go fuzz_ng_encoding_gob/copy/decode.go fuzz_ng_encoding_gob/copy/decoder.go fuzz_ng_encoding_gob/copy/doc.go fuzz_ng_encoding_gob/copy/enc_helpers.go fuzz_ng_encoding_gob/copy/encode.go fuzz_ng_encoding_gob/copy/encoder.go fuzz_ng_encoding_gob/copy/error.go fuzz_ng_encoding_gob/copy/type.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_gob/copy/dec_helpers.go fuzz_ng_encoding_gob/copy/decode.go fuzz_ng_encoding_gob/copy/decoder.go fuzz_ng_encoding_gob/copy/doc.go fuzz_ng_encoding_gob/copy/enc_helpers.go fuzz_ng_encoding_gob/copy/encode.go fuzz_ng_encoding_gob/copy/encoder.go fuzz_ng_encoding_gob/copy/error.go fuzz_ng_encoding_gob/copy/type.go /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_gob/fuzz_ng.go fuzz_ng_encoding_gob/fuzzng_unsure_test.go fuzz_ng_encoding_gob/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/gob/codec_test.go /src/goroot/src/encoding/gob/encoder_test.go /src/goroot/src/encoding/gob/example_encdec_test.go /src/goroot/src/encoding/gob/example_interface_test.go /src/goroot/src/encoding/gob/example_test.go /src/goroot/src/encoding/gob/gobencdec_test.go /src/goroot/src/encoding/gob/timing_test.go /src/goroot/src/encoding/gob/type_test.go /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/gob/testdata /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/gob/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_gob/' /src/goroot/src/fuzz_ng_encoding_gob/codec_test.go /src/goroot/src/fuzz_ng_encoding_gob/dec_helpers.go /src/goroot/src/fuzz_ng_encoding_gob/decode.go /src/goroot/src/fuzz_ng_encoding_gob/decoder.go /src/goroot/src/fuzz_ng_encoding_gob/doc.go /src/goroot/src/fuzz_ng_encoding_gob/enc_helpers.go /src/goroot/src/fuzz_ng_encoding_gob/encode.go /src/goroot/src/fuzz_ng_encoding_gob/encoder.go /src/goroot/src/fuzz_ng_encoding_gob/encoder_test.go /src/goroot/src/fuzz_ng_encoding_gob/error.go /src/goroot/src/fuzz_ng_encoding_gob/example_encdec_test.go /src/goroot/src/fuzz_ng_encoding_gob/example_interface_test.go /src/goroot/src/fuzz_ng_encoding_gob/example_test.go /src/goroot/src/fuzz_ng_encoding_gob/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_gob/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_gob/gobencdec_test.go /src/goroot/src/fuzz_ng_encoding_gob/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_gob/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_gob/timing_test.go /src/goroot/src/fuzz_ng_encoding_gob/type.go /src/goroot/src/fuzz_ng_encoding_gob/type_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_gob/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_gob/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_gob /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_gob [fuzz_ng_encoding_gob.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:20:6: Vector redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./codec_test.go:1095:6: other declaration of Vector
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:27:21: v.x undefined (type Vector has no field or method x)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:27:26: v.y undefined (type Vector has no field or method y)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:27:31: v.z undefined (type Vector has no field or method z)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:35:30: v.x undefined (type *Vector has no field or method x)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:35:36: v.y undefined (type *Vector has no field or method y)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_encdec_test.go:35:42: v.z undefined (type *Vector has no field or method z)
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_interface_test.go:15:6: Point redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./codec_test.go:1105:6: other declaration of Point
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_gob [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_gob/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_gob_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/base64/base64.go /src/goroot/src/encoding/base64/base64_test.go /src/goroot/src/encoding/base64/example_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_base64 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/base64 fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:02 Found package in /src/goroot/src/encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:02 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:02 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:02 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:02 Type CorruptInputError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:02 Function Error has unproduced recv CorruptInputError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_base64.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_base64.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/base64: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_base64/copy/base64.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_base64/copy/base64.go /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_base64/fuzz_ng.go fuzz_ng_encoding_base64/fuzzng_unsure_test.go fuzz_ng_encoding_base64/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/base64/base64_test.go /src/goroot/src/encoding/base64/example_test.go /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/base64/testdata /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/base64/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_base64/' /src/goroot/src/fuzz_ng_encoding_base64/base64.go /src/goroot/src/fuzz_ng_encoding_base64/base64_test.go /src/goroot/src/fuzz_ng_encoding_base64/example_test.go /src/goroot/src/fuzz_ng_encoding_base64/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_base64/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_base64/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_base64/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_base64/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_base64/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_base64 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_base64 [fuzz_ng_encoding_base64.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_base64 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_base64/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_base64_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/json/bench_test.go /src/goroot/src/encoding/json/decode.go /src/goroot/src/encoding/json/decode_test.go /src/goroot/src/encoding/json/encode.go /src/goroot/src/encoding/json/encode_test.go /src/goroot/src/encoding/json/example_marshaling_test.go /src/goroot/src/encoding/json/example_test.go /src/goroot/src/encoding/json/example_text_marshaling_test.go /src/goroot/src/encoding/json/fold.go /src/goroot/src/encoding/json/fold_test.go /src/goroot/src/encoding/json/fuzz_test.go /src/goroot/src/encoding/json/indent.go /src/goroot/src/encoding/json/number_test.go /src/goroot/src/encoding/json/scanner.go /src/goroot/src/encoding/json/scanner_test.go /src/goroot/src/encoding/json/stream.go /src/goroot/src/encoding/json/stream_test.go /src/goroot/src/encoding/json/tables.go /src/goroot/src/encoding/json/tagkey_test.go /src/goroot/src/encoding/json/tags.go /src/goroot/src/encoding/json/tags_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 21 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_json '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/json fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Found package in /src/goroot/src/encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type UnmarshalFieldError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type Delim is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type InvalidUnmarshalError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type Number is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type UnsupportedTypeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type RawMessage is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type UnmarshalTypeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type UnsupportedValueError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type InvalidUTF8Error is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type MarshalerError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Type SyntaxError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv UnmarshalTypeError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv UnmarshalFieldError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv InvalidUnmarshalError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function String has unproduced recv Number
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Float64 has unproduced recv Number
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Int64 has unproduced recv Number
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv UnsupportedTypeError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv UnsupportedValueError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv InvalidUTF8Error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv MarshalerError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Unwrap has unproduced recv MarshalerError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function HTMLEscape has unproduced argument bytes.Buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Compact has unproduced argument bytes.Buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Indent has unproduced argument bytes.Buffer
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function Error has unproduced recv SyntaxError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function MarshalJSON has unproduced recv RawMessage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function UnmarshalJSON has unproduced recv RawMessage
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:10 Function String has unproduced recv Delim
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_json.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_json.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/json: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_json/copy/decode.go fuzz_ng_encoding_json/copy/encode.go fuzz_ng_encoding_json/copy/fold.go fuzz_ng_encoding_json/copy/indent.go fuzz_ng_encoding_json/copy/scanner.go fuzz_ng_encoding_json/copy/stream.go fuzz_ng_encoding_json/copy/tables.go fuzz_ng_encoding_json/copy/tags.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_json/copy/decode.go fuzz_ng_encoding_json/copy/encode.go fuzz_ng_encoding_json/copy/fold.go fuzz_ng_encoding_json/copy/indent.go fuzz_ng_encoding_json/copy/scanner.go fuzz_ng_encoding_json/copy/stream.go fuzz_ng_encoding_json/copy/tables.go fuzz_ng_encoding_json/copy/tags.go /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_json/fuzz_ng.go fuzz_ng_encoding_json/fuzzng_unsure_test.go fuzz_ng_encoding_json/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/json/bench_test.go /src/goroot/src/encoding/json/decode_test.go /src/goroot/src/encoding/json/encode_test.go /src/goroot/src/encoding/json/example_marshaling_test.go /src/goroot/src/encoding/json/example_test.go /src/goroot/src/encoding/json/example_text_marshaling_test.go /src/goroot/src/encoding/json/fold_test.go /src/goroot/src/encoding/json/fuzz_test.go /src/goroot/src/encoding/json/number_test.go /src/goroot/src/encoding/json/scanner_test.go /src/goroot/src/encoding/json/stream_test.go /src/goroot/src/encoding/json/tagkey_test.go /src/goroot/src/encoding/json/tags_test.go /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/json/testdata /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_json/' /src/goroot/src/fuzz_ng_encoding_json/bench_test.go /src/goroot/src/fuzz_ng_encoding_json/decode.go /src/goroot/src/fuzz_ng_encoding_json/decode_test.go /src/goroot/src/fuzz_ng_encoding_json/encode.go /src/goroot/src/fuzz_ng_encoding_json/encode_test.go /src/goroot/src/fuzz_ng_encoding_json/example_marshaling_test.go /src/goroot/src/fuzz_ng_encoding_json/example_test.go /src/goroot/src/fuzz_ng_encoding_json/example_text_marshaling_test.go /src/goroot/src/fuzz_ng_encoding_json/fold.go /src/goroot/src/fuzz_ng_encoding_json/fold_test.go /src/goroot/src/fuzz_ng_encoding_json/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_json/fuzz_test.go /src/goroot/src/fuzz_ng_encoding_json/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_json/indent.go /src/goroot/src/fuzz_ng_encoding_json/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_json/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_json/number_test.go /src/goroot/src/fuzz_ng_encoding_json/scanner.go /src/goroot/src/fuzz_ng_encoding_json/scanner_test.go /src/goroot/src/fuzz_ng_encoding_json/stream.go /src/goroot/src/fuzz_ng_encoding_json/stream_test.go /src/goroot/src/fuzz_ng_encoding_json/tables.go /src/goroot/src/fuzz_ng_encoding_json/tagkey_test.go /src/goroot/src/fuzz_ng_encoding_json/tags.go /src/goroot/src/fuzz_ng_encoding_json/tags_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_json/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_json/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_json /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_json [fuzz_ng_encoding_json.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_text_marshaling_test.go:18:2: Small redeclared in this block
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./decode_test.go:1434:6: other declaration of Small
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_text_marshaling_test.go:27:8: Small (type) is not an expression
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_text_marshaling_test.go:39:7: Small (type) is not an expression
Step #3 - "compile-libfuzzer-coverage-x86_64": ./example_text_marshaling_test.go:60:10: Small (type) is not an expression
Step #3 - "compile-libfuzzer-coverage-x86_64": ./encode.go:250:7: hex already declared through import of package hex ("encoding/hex")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	./ngolo_helper.go:6:2: other declaration of hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_json [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_json/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_json
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_json_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls '/src/goroot/src/encoding/json/testdata/*.go'
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/goroot/src/encoding/json/testdata/*.go': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + continue
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/xml/atom_test.go /src/goroot/src/encoding/xml/example_marshaling_test.go /src/goroot/src/encoding/xml/example_test.go /src/goroot/src/encoding/xml/example_text_marshaling_test.go /src/goroot/src/encoding/xml/marshal.go /src/goroot/src/encoding/xml/marshal_test.go /src/goroot/src/encoding/xml/read.go /src/goroot/src/encoding/xml/read_test.go /src/goroot/src/encoding/xml/typeinfo.go /src/goroot/src/encoding/xml/xml.go /src/goroot/src/encoding/xml/xml_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 11 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_xml '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/xml fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Found package in /src/goroot/src/encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Type UnsupportedTypeError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Type UnmarshalError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Type SyntaxError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Type TagPathError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Type TokenReader is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Function Error has unproduced recv UnsupportedTypeError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Function Error has unproduced recv UnmarshalError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Function Error has unproduced recv TagPathError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Function Error has unproduced recv SyntaxError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:18 Function NewTokenDecoder has unproduced argument TokenReader
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_xml.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_xml.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/xml: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_xml/copy/marshal.go fuzz_ng_encoding_xml/copy/read.go fuzz_ng_encoding_xml/copy/typeinfo.go fuzz_ng_encoding_xml/copy/xml.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_xml/copy/marshal.go fuzz_ng_encoding_xml/copy/read.go fuzz_ng_encoding_xml/copy/typeinfo.go fuzz_ng_encoding_xml/copy/xml.go /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_xml/fuzz_ng.go fuzz_ng_encoding_xml/fuzzng_unsure_test.go fuzz_ng_encoding_xml/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/xml/atom_test.go /src/goroot/src/encoding/xml/example_marshaling_test.go /src/goroot/src/encoding/xml/example_test.go /src/goroot/src/encoding/xml/example_text_marshaling_test.go /src/goroot/src/encoding/xml/marshal_test.go /src/goroot/src/encoding/xml/read_test.go /src/goroot/src/encoding/xml/xml_test.go /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/xml/testdata /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/xml/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_xml/' /src/goroot/src/fuzz_ng_encoding_xml/atom_test.go /src/goroot/src/fuzz_ng_encoding_xml/example_marshaling_test.go /src/goroot/src/fuzz_ng_encoding_xml/example_test.go /src/goroot/src/fuzz_ng_encoding_xml/example_text_marshaling_test.go /src/goroot/src/fuzz_ng_encoding_xml/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_xml/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_xml/marshal.go /src/goroot/src/fuzz_ng_encoding_xml/marshal_test.go /src/goroot/src/fuzz_ng_encoding_xml/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_xml/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_xml/read.go /src/goroot/src/fuzz_ng_encoding_xml/read_test.go /src/goroot/src/fuzz_ng_encoding_xml/typeinfo.go /src/goroot/src/fuzz_ng_encoding_xml/xml.go /src/goroot/src/fuzz_ng_encoding_xml/xml_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_xml/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_xml/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_xml /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_xml [fuzz_ng_encoding_xml.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_xml [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_xml/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_xml_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/pem/example_test.go /src/goroot/src/encoding/pem/pem.go /src/goroot/src/encoding/pem/pem_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_pem '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/pem fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:25 Found package in /src/goroot/src/encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:25 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:25 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_pem.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_pem.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/pem: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_pem/copy/pem.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_pem/copy/pem.go /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_pem/fuzz_ng.go fuzz_ng_encoding_pem/fuzzng_unsure_test.go fuzz_ng_encoding_pem/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/pem/example_test.go /src/goroot/src/encoding/pem/pem_test.go /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/pem/testdata /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/pem/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_pem/' /src/goroot/src/fuzz_ng_encoding_pem/example_test.go /src/goroot/src/fuzz_ng_encoding_pem/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_pem/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_pem/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_pem/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_pem/pem.go /src/goroot/src/fuzz_ng_encoding_pem/pem_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_pem/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_pem/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_pem /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_pem [fuzz_ng_encoding_pem.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_pem [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_pem/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_pem_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/asn1/asn1.go /src/goroot/src/encoding/asn1/asn1_test.go /src/goroot/src/encoding/asn1/common.go /src/goroot/src/encoding/asn1/marshal.go /src/goroot/src/encoding/asn1/marshal_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 5 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_asn1 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude BitString'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude BitString encoding/asn1 fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Found package in /src/goroot/src/encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Type StructuralError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Type SyntaxError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Type ObjectIdentifier is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Function Error has unproduced recv StructuralError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Function Error has unproduced recv SyntaxError
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Function At has unproduced recv BitString
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Function RightAlign has unproduced recv BitString
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Function Equal has unproduced recv ObjectIdentifier
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:32 Function String has unproduced recv ObjectIdentifier
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_asn1.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_asn1.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/asn1: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_asn1/copy/asn1.go fuzz_ng_encoding_asn1/copy/common.go fuzz_ng_encoding_asn1/copy/marshal.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_asn1/copy/asn1.go fuzz_ng_encoding_asn1/copy/common.go fuzz_ng_encoding_asn1/copy/marshal.go /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_asn1/fuzz_ng.go fuzz_ng_encoding_asn1/fuzzng_unsure_test.go fuzz_ng_encoding_asn1/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/asn1/asn1_test.go /src/goroot/src/encoding/asn1/marshal_test.go /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/asn1/testdata /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/asn1/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_asn1/' /src/goroot/src/fuzz_ng_encoding_asn1/asn1.go /src/goroot/src/fuzz_ng_encoding_asn1/asn1_test.go /src/goroot/src/fuzz_ng_encoding_asn1/common.go /src/goroot/src/fuzz_ng_encoding_asn1/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_asn1/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_asn1/marshal.go /src/goroot/src/fuzz_ng_encoding_asn1/marshal_test.go /src/goroot/src/fuzz_ng_encoding_asn1/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_asn1/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_asn1/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_asn1/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_asn1 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_asn1 [fuzz_ng_encoding_asn1.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_asn1 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_asn1/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_asn1_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/hex/example_test.go /src/goroot/src/encoding/hex/hex.go /src/goroot/src/encoding/hex/hex_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_hex '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/hex fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:38 Found package in /src/goroot/src/encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:38 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:38 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:38 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:38 Type InvalidByteError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:38 Function Error has unproduced recv InvalidByteError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_hex.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_hex.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/hex: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_hex/copy/hex.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_hex/copy/hex.go /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_hex/fuzz_ng.go fuzz_ng_encoding_hex/fuzzng_unsure_test.go fuzz_ng_encoding_hex/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/hex/example_test.go /src/goroot/src/encoding/hex/hex_test.go /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/hex/testdata /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/hex/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_hex/' /src/goroot/src/fuzz_ng_encoding_hex/example_test.go /src/goroot/src/fuzz_ng_encoding_hex/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_hex/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_hex/hex.go /src/goroot/src/fuzz_ng_encoding_hex/hex_test.go /src/goroot/src/fuzz_ng_encoding_hex/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_hex/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_hex/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_hex/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_hex /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_hex [fuzz_ng_encoding_hex.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_hex [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_hex/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_hex_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/binary/binary.go /src/goroot/src/encoding/binary/binary_test.go /src/goroot/src/encoding/binary/example_test.go /src/goroot/src/encoding/binary/native_endian_big.go /src/goroot/src/encoding/binary/native_endian_little.go /src/goroot/src/encoding/binary/varint.go /src/goroot/src/encoding/binary/varint_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_binary '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-exclude PutUvarint,PutVarint'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -exclude PutUvarint,PutVarint encoding/binary fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Found package in /src/goroot/src/encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Type ByteOrder is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Function Read has unproduced argument ByteOrder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Function Write has unproduced argument ByteOrder
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Function ReadUvarint has unproduced argument io.ByteReader
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:45 Function ReadVarint has unproduced argument io.ByteReader
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_binary.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_binary.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/binary: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_binary/copy/binary.go fuzz_ng_encoding_binary/copy/native_endian_little.go fuzz_ng_encoding_binary/copy/varint.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_binary/copy/binary.go fuzz_ng_encoding_binary/copy/native_endian_little.go fuzz_ng_encoding_binary/copy/varint.go /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_binary/fuzz_ng.go fuzz_ng_encoding_binary/fuzzng_unsure_test.go fuzz_ng_encoding_binary/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/binary/binary_test.go /src/goroot/src/encoding/binary/example_test.go /src/goroot/src/encoding/binary/varint_test.go /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/binary/testdata /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/binary/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_binary/' /src/goroot/src/fuzz_ng_encoding_binary/binary.go /src/goroot/src/fuzz_ng_encoding_binary/binary_test.go /src/goroot/src/fuzz_ng_encoding_binary/example_test.go /src/goroot/src/fuzz_ng_encoding_binary/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_binary/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_binary/native_endian_little.go /src/goroot/src/fuzz_ng_encoding_binary/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_binary/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_binary/varint.go /src/goroot/src/fuzz_ng_encoding_binary/varint_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_binary/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_binary/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_binary /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_binary [fuzz_ng_encoding_binary.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_binary [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_binary/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_binary_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/base32/base32.go /src/goroot/src/encoding/base32/base32_test.go /src/goroot/src/encoding/base32/example_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 3 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_base32 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/base32 fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:52 Found package in /src/goroot/src/encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:52 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:52 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:52 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:52 Type CorruptInputError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:52 Function Error has unproduced recv CorruptInputError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_base32.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/encoding_base32.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/base32: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_base32/copy/base32.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_base32/copy/base32.go /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_base32/fuzz_ng.go fuzz_ng_encoding_base32/fuzzng_unsure_test.go fuzz_ng_encoding_base32/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/base32/base32_test.go /src/goroot/src/encoding/base32/example_test.go /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/base32/testdata /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/base32/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_base32/' /src/goroot/src/fuzz_ng_encoding_base32/base32.go /src/goroot/src/fuzz_ng_encoding_base32/base32_test.go /src/goroot/src/fuzz_ng_encoding_base32/example_test.go /src/goroot/src/fuzz_ng_encoding_base32/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_base32/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_base32/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_base32/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_base32/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_base32/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_base32 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_base32 [fuzz_ng_encoding_base32.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_base32 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_base32/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_base32_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/encoding/ascii85/ascii85.go /src/goroot/src/encoding/ascii85/ascii85_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 2 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^encoding_ascii85 '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing encoding/ascii85 fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:59 Found package in /src/goroot/src/encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:59 Type CorruptInputError is used as argument but not produced
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:24:59 Function Error has unproduced recv CorruptInputError
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/encoding_ascii85.py
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing/std/encoding_ascii85.py
Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 /src/ngolo-fuzzing/std/encoding_ascii85.py fuzz_ng_encoding_ascii85/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + mv fuzz_ng_encoding_ascii85/fuzz_ngp.go fuzz_ng_encoding_ascii85/fuzz_ng.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module encoding/ascii85: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_encoding_ascii85/copy/ascii85.go
Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_ng_encoding_ascii85/copy/ascii85.go:244:1: expected declaration, found ngolo_r
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_ascii85/copy/ascii85.go /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_encoding_ascii85/fuzz_ng.go fuzz_ng_encoding_ascii85/fuzzng_unsure_test.go fuzz_ng_encoding_ascii85/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/encoding/ascii85/ascii85_test.go /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/encoding/ascii85/testdata /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/encoding/ascii85/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_encoding_ascii85/' /src/goroot/src/fuzz_ng_encoding_ascii85/ascii85.go /src/goroot/src/fuzz_ng_encoding_ascii85/ascii85_test.go /src/goroot/src/fuzz_ng_encoding_ascii85/fuzz_ng.go /src/goroot/src/fuzz_ng_encoding_ascii85/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_encoding_ascii85/ngolo_helper.go /src/goroot/src/fuzz_ng_encoding_ascii85/ngolofuzz.pb.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_ascii85/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_encoding_ascii85/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_encoding_ascii85 /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_encoding_ascii85 [fuzz_ng_encoding_ascii85.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./ascii85.go:244:1: syntax error: non-declaration statement outside function body
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_encoding_ascii85 [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_encoding_ascii85/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_encoding_ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_encoding_ascii85_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/bytes/boundary_test.go /src/goroot/src/bytes/buffer.go /src/goroot/src/bytes/buffer_test.go /src/goroot/src/bytes/bytes.go /src/goroot/src/bytes/bytes_test.go /src/goroot/src/bytes/compare_test.go /src/goroot/src/bytes/example_test.go /src/goroot/src/bytes/export_test.go /src/goroot/src/bytes/reader.go /src/goroot/src/bytes/reader_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 10 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^bytes '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args='-limits Repeat.count,BufferNgdotGrow.n -exclude Next'
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing -limits Repeat.count,BufferNgdotGrow.n -exclude Next bytes fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Found package in /src/goroot/src/bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for rune is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Array result for byte is not handled
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:22472, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0000d4e10), Results:(*ast.FieldList)(0xc0000d4e40)} for ContainsFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:31363, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0000fa360), Results:(*ast.FieldList)(0xc0000fa390)} for FieldsFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:33817, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc0000fb170), Results:(*ast.FieldList)(0xc0000fb1a0)} for Map
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Function ToUpperSpecial has unproduced argument unicode.SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Function ToLowerSpecial has unproduced argument unicode.SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Function ToTitleSpecial has unproduced argument unicode.SpecialCase
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:40236, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00030f320), Results:(*ast.FieldList)(0xc00030f350)} for TrimLeftFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:40490, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00030f530), Results:(*ast.FieldList)(0xc00030f560)} for TrimRightFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:40824, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00030f800), Results:(*ast.FieldList)(0xc00030f830)} for TrimFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:41585, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00030fce0), Results:(*ast.FieldList)(0xc00030fd10)} for IndexFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:05 Unhandled argument &ast.FuncType{Func:41851, TypeParams:(*ast.FieldList)(nil), Params:(*ast.FieldList)(0xc00030fe60), Results:(*ast.FieldList)(0xc00030fe90)} for LastIndexFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/bytes.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/bytes.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module bytes: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_bytes/copy/buffer.go fuzz_ng_bytes/copy/bytes.go fuzz_ng_bytes/copy/reader.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_bytes/copy/buffer.go fuzz_ng_bytes/copy/bytes.go fuzz_ng_bytes/copy/reader.go /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_bytes/fuzz_ng.go fuzz_ng_bytes/fuzzng_unsure_test.go fuzz_ng_bytes/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/bytes/boundary_test.go /src/goroot/src/bytes/buffer_test.go /src/goroot/src/bytes/bytes_test.go /src/goroot/src/bytes/compare_test.go /src/goroot/src/bytes/example_test.go /src/goroot/src/bytes/export_test.go /src/goroot/src/bytes/reader_test.go /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/bytes/testdata /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/bytes/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_bytes/' /src/goroot/src/fuzz_ng_bytes/boundary_test.go /src/goroot/src/fuzz_ng_bytes/buffer.go /src/goroot/src/fuzz_ng_bytes/buffer_test.go /src/goroot/src/fuzz_ng_bytes/bytes.go /src/goroot/src/fuzz_ng_bytes/bytes_test.go /src/goroot/src/fuzz_ng_bytes/compare_test.go /src/goroot/src/fuzz_ng_bytes/example_test.go /src/goroot/src/fuzz_ng_bytes/export_test.go /src/goroot/src/fuzz_ng_bytes/fuzz_ng.go /src/goroot/src/fuzz_ng_bytes/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_bytes/ngolo_helper.go /src/goroot/src/fuzz_ng_bytes/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_bytes/reader.go /src/goroot/src/fuzz_ng_bytes/reader_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_bytes/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_bytes/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_bytes /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_bytes [fuzz_ng_bytes.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./buffer.go:200:7: MinRead already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/buffer.go:200:7: other declaration of MinRead
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:85:6: ContainsRune already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:85:6: other declaration of ContainsRune
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:163:6: IndexAny already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:163:6: other declaration of IndexAny
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:543:6: HasSuffix already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:543:6: other declaration of HasSuffix
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:551:6: Map already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:551:6: other declaration of Map
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:687:6: ToTitle already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:687:6: other declaration of ToTitle
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:766:6: Title already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:766:6: other declaration of Title
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:833:6: IndexFunc already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:833:6: other declaration of IndexFunc
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:922:6: Trim already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:922:6: other declaration of Trim
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:1089:6: Runes already declared through dot-import of package bytes ("bytes")
Step #3 - "compile-libfuzzer-coverage-x86_64": 	$GOROOT/src/bytes/bytes.go:1089:6: other declaration of Runes
Step #3 - "compile-libfuzzer-coverage-x86_64": ./bytes.go:766:6: too many errors
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_bytes [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_bytes/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_bytes_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ls /src/goroot/src/errors/errors.go /src/goroot/src/errors/errors_test.go /src/goroot/src/errors/example_test.go /src/goroot/src/errors/join.go /src/goroot/src/errors/join_test.go /src/goroot/src/errors/wrap.go /src/goroot/src/errors/wrap_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 7 == \0 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep internal
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep vendor
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testdata
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_package errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\//_/g'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's/\./x/'
Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg_flat=errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cat /src/ngolo-fuzzing/std/args.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^errors '
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d ' -f2-
Step #3 - "compile-libfuzzer-coverage-x86_64": + args=
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/ngolo-fuzzing/ngolo-fuzzing errors fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:16 Found package in /src/goroot/src/errors
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:16 Unhandled argument &ast.Ellipsis{Ellipsis:7973, Elt:(*ast.Ident)(0xc000204800)} for Join
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:16 Function Unwrap has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:16 Function Is has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:25:16 Function As has unproduced argument error
Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /src/ngolo-fuzzing/std/errors.py
Step #3 - "compile-libfuzzer-coverage-x86_64": ls: cannot access '/src/ngolo-fuzzing/std/errors.py': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --go_out=./ ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir cpp
Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/LPM/external.protobuf/bin/protoc --cpp_out=./cpp ngolofuzz.proto
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -DNDEBUG -stdlib=libc++ -c -I . -I /src/LPM/external.protobuf/include cpp/ngolofuzz.pb.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": clang-15: warning: -lresolv: 'linker' input unused [-Wunused-command-line-argument]
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -lresolv -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -c -Icpp -I /src/libprotobuf-mutator/ -I /src/LPM/external.protobuf/include /src/ngolo-fuzzing/lpm/ngolofuzz.cc
Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo errors
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 0 == \1 ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + GO_COV_ADD_PKG=errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . FuzzNG_unsure fuzz_ngo_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/catenacyber/ngolo-fuzzing/fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": go: module errors: not a known dependency
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/goroot/src/fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ngolo-fuzzing/corpus/ngolo_helper.go /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w fuzz_ng_errors/copy/errors.go fuzz_ng_errors/copy/join.go fuzz_ng_errors/copy/wrap.go
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_errors/copy/errors.go fuzz_ng_errors/copy/join.go fuzz_ng_errors/copy/wrap.go /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_ng_errors/fuzz_ng.go fuzz_ng_errors/fuzzng_unsure_test.go fuzz_ng_errors/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/goroot/src/errors/errors_test.go /src/goroot/src/errors/example_test.go /src/goroot/src/errors/join_test.go /src/goroot/src/errors/wrap_test.go /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/goroot/src/errors/testdata /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat '/src/goroot/src/errors/testdata': No such file or directory
Step #3 - "compile-libfuzzer-coverage-x86_64": + true
Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/^package .*/package fuzz_ng_errors/' /src/goroot/src/fuzz_ng_errors/errors.go /src/goroot/src/fuzz_ng_errors/errors_test.go /src/goroot/src/fuzz_ng_errors/example_test.go /src/goroot/src/fuzz_ng_errors/fuzz_ng.go /src/goroot/src/fuzz_ng_errors/fuzzng_unsure_test.go /src/goroot/src/fuzz_ng_errors/join.go /src/goroot/src/fuzz_ng_errors/join_test.go /src/goroot/src/fuzz_ng_errors/ngolo_helper.go /src/goroot/src/fuzz_ng_errors/ngolofuzz.pb.go /src/goroot/src/fuzz_ng_errors/wrap.go /src/goroot/src/fuzz_ng_errors/wrap_test.go
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_errors/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_NG_CORPUS_DIR=/src/ngolo-fuzzing/fuzz_ng_errors/corpus/
Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/goroot/src/fuzz_ng_errors /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy
Step #3 - "compile-libfuzzer-coverage-x86_64": + go test -mod=readonly
Step #3 - "compile-libfuzzer-coverage-x86_64": # fuzz_ng_errors [fuzz_ng_errors.test]
Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzng_unsure_test.go:63:3: undefined: FuzzNG_unsure
Step #3 - "compile-libfuzzer-coverage-x86_64": FAIL	fuzz_ng_errors [build failed]
Step #3 - "compile-libfuzzer-coverage-x86_64": + popd
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/ngolo-fuzzing
Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /src/goroot/src/fuzz_ng_errors/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd fuzz_ng_errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_ngo_errors_seed_corpus.zip corpus
Step #3 - "compile-libfuzzer-coverage-x86_64":   adding: corpus/ (stored 0%)
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo errors
Step #3 - "compile-libfuzzer-coverage-x86_64": + read pkg
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Failed packages:'
Step #3 - "compile-libfuzzer-coverage-x86_64": Failed packages:
Step #3 - "compile-libfuzzer-coverage-x86_64": + cat /src/ko.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Succesful packages:'
Step #3 - "compile-libfuzzer-coverage-x86_64": Succesful packages:
Step #3 - "compile-libfuzzer-coverage-x86_64": + cat /src/ok.txt
Step #3 - "compile-libfuzzer-coverage-x86_64": fmt
Step #3 - "compile-libfuzzer-coverage-x86_64": context
Step #3 - "compile-libfuzzer-coverage-x86_64": reflect
Step #3 - "compile-libfuzzer-coverage-x86_64": index/suffixarray
Step #3 - "compile-libfuzzer-coverage-x86_64": math
Step #3 - "compile-libfuzzer-coverage-x86_64": math/big
Step #3 - "compile-libfuzzer-coverage-x86_64": math/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": math/rand/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": math/cmplx
Step #3 - "compile-libfuzzer-coverage-x86_64": math/bits
Step #3 - "compile-libfuzzer-coverage-x86_64": arena
Step #3 - "compile-libfuzzer-coverage-x86_64": database/sql
Step #3 - "compile-libfuzzer-coverage-x86_64": database/sql/driver
Step #3 - "compile-libfuzzer-coverage-x86_64": strconv
Step #3 - "compile-libfuzzer-coverage-x86_64": slices
Step #3 - "compile-libfuzzer-coverage-x86_64": syscall
Step #3 - "compile-libfuzzer-coverage-x86_64": syscall/js
Step #3 - "compile-libfuzzer-coverage-x86_64": text/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": text/tabwriter
Step #3 - "compile-libfuzzer-coverage-x86_64": text/template
Step #3 - "compile-libfuzzer-coverage-x86_64": text/template/parse
Step #3 - "compile-libfuzzer-coverage-x86_64": regexp
Step #3 - "compile-libfuzzer-coverage-x86_64": regexp/syntax
Step #3 - "compile-libfuzzer-coverage-x86_64": time
Step #3 - "compile-libfuzzer-coverage-x86_64": time/tzdata
Step #3 - "compile-libfuzzer-coverage-x86_64": maps
Step #3 - "compile-libfuzzer-coverage-x86_64": log
Step #3 - "compile-libfuzzer-coverage-x86_64": log/slog
Step #3 - "compile-libfuzzer-coverage-x86_64": log/syslog
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/boring
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/rand
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/x509
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/x509/pkix
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/dsa
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/hmac
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/ecdsa
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/aes
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/tls
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/tls/fipsonly
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/rc4
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/sha1
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/sha512
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/subtle
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/sha256
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/cipher
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/des
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/md5
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/elliptic
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/rsa
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/ed25519
Step #3 - "compile-libfuzzer-coverage-x86_64": crypto/ecdh
Step #3 - "compile-libfuzzer-coverage-x86_64": go/constant
Step #3 - "compile-libfuzzer-coverage-x86_64": go/types
Step #3 - "compile-libfuzzer-coverage-x86_64": go/importer
Step #3 - "compile-libfuzzer-coverage-x86_64": go/token
Step #3 - "compile-libfuzzer-coverage-x86_64": go/printer
Step #3 - "compile-libfuzzer-coverage-x86_64": go/ast
Step #3 - "compile-libfuzzer-coverage-x86_64": go/scanner
Step #3 - "compile-libfuzzer-coverage-x86_64": go/parser
Step #3 - "compile-libfuzzer-coverage-x86_64": go/format
Step #3 - "compile-libfuzzer-coverage-x86_64": go/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": go/doc/comment
Step #3 - "compile-libfuzzer-coverage-x86_64": go/build
Step #3 - "compile-libfuzzer-coverage-x86_64": go/build/constraint
Step #3 - "compile-libfuzzer-coverage-x86_64": go/version
Step #3 - "compile-libfuzzer-coverage-x86_64": sort
Step #3 - "compile-libfuzzer-coverage-x86_64": strings
Step #3 - "compile-libfuzzer-coverage-x86_64": html
Step #3 - "compile-libfuzzer-coverage-x86_64": html/template
Step #3 - "compile-libfuzzer-coverage-x86_64": unsafe
Step #3 - "compile-libfuzzer-coverage-x86_64": container/list
Step #3 - "compile-libfuzzer-coverage-x86_64": container/ring
Step #3 - "compile-libfuzzer-coverage-x86_64": container/heap
Step #3 - "compile-libfuzzer-coverage-x86_64": archive/tar
Step #3 - "compile-libfuzzer-coverage-x86_64": archive/zip
Step #3 - "compile-libfuzzer-coverage-x86_64": path
Step #3 - "compile-libfuzzer-coverage-x86_64": path/filepath
Step #3 - "compile-libfuzzer-coverage-x86_64": sync
Step #3 - "compile-libfuzzer-coverage-x86_64": sync/atomic
Step #3 - "compile-libfuzzer-coverage-x86_64": net
Step #3 - "compile-libfuzzer-coverage-x86_64": net/netip
Step #3 - "compile-libfuzzer-coverage-x86_64": net/rpc
Step #3 - "compile-libfuzzer-coverage-x86_64": net/rpc/jsonrpc
Step #3 - "compile-libfuzzer-coverage-x86_64": net/url
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/httputil
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/fcgi
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/cgi
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/httptest
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/httptrace
Step #3 - "compile-libfuzzer-coverage-x86_64": net/http/cookiejar
Step #3 - "compile-libfuzzer-coverage-x86_64": net/smtp
Step #3 - "compile-libfuzzer-coverage-x86_64": net/textproto
Step #3 - "compile-libfuzzer-coverage-x86_64": net/mail
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/pack
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/covdata
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/test2json
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/tools
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/buildid
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/addr2line
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/go
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/vet
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/link
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/nm
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/trace/v2
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/distpack
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/api
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/doc
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/compile
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/gofmt
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/cover
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/dist
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/asm
Step #3 - "compile-libfuzzer-coverage-x86_64": cmd/fix
Step #3 - "compile-libfuzzer-coverage-x86_64": flag
Step #3 - "compile-libfuzzer-coverage-x86_64": os
Step #3 - "compile-libfuzzer-coverage-x86_64": os/user
Step #3 - "compile-libfuzzer-coverage-x86_64": os/exec
Step #3 - "compile-libfuzzer-coverage-x86_64": os/signal
Step #3 - "compile-libfuzzer-coverage-x86_64": plugin
Step #3 - "compile-libfuzzer-coverage-x86_64": unicode
Step #3 - "compile-libfuzzer-coverage-x86_64": unicode/utf16
Step #3 - "compile-libfuzzer-coverage-x86_64": unicode/utf8
Step #3 - "compile-libfuzzer-coverage-x86_64": io
Step #3 - "compile-libfuzzer-coverage-x86_64": io/fs
Step #3 - "compile-libfuzzer-coverage-x86_64": io/ioutil
Step #3 - "compile-libfuzzer-coverage-x86_64": image
Step #3 - "compile-libfuzzer-coverage-x86_64": image/draw
Step #3 - "compile-libfuzzer-coverage-x86_64": image/gif
Step #3 - "compile-libfuzzer-coverage-x86_64": image/png
Step #3 - "compile-libfuzzer-coverage-x86_64": image/jpeg
Step #3 - "compile-libfuzzer-coverage-x86_64": image/color
Step #3 - "compile-libfuzzer-coverage-x86_64": image/color/palette
Step #3 - "compile-libfuzzer-coverage-x86_64": embed
Step #3 - "compile-libfuzzer-coverage-x86_64": cmp
Step #3 - "compile-libfuzzer-coverage-x86_64": builtin
Step #3 - "compile-libfuzzer-coverage-x86_64": compress/lzw
Step #3 - "compile-libfuzzer-coverage-x86_64": compress/bzip2
Step #3 - "compile-libfuzzer-coverage-x86_64": compress/gzip
Step #3 - "compile-libfuzzer-coverage-x86_64": compress/zlib
Step #3 - "compile-libfuzzer-coverage-x86_64": compress/flate
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/metrics
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/pprof
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/asan
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/race
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/coverage
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/trace
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/msan
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/cgo
Step #3 - "compile-libfuzzer-coverage-x86_64": runtime/debug
Step #3 - "compile-libfuzzer-coverage-x86_64": testing
Step #3 - "compile-libfuzzer-coverage-x86_64": testing/quick
Step #3 - "compile-libfuzzer-coverage-x86_64": testing/fstest
Step #3 - "compile-libfuzzer-coverage-x86_64": testing/slogtest
Step #3 - "compile-libfuzzer-coverage-x86_64": testing/iotest
Step #3 - "compile-libfuzzer-coverage-x86_64": mime
Step #3 - "compile-libfuzzer-coverage-x86_64": mime/quotedprintable
Step #3 - "compile-libfuzzer-coverage-x86_64": mime/multipart
Step #3 - "compile-libfuzzer-coverage-x86_64": bufio
Step #3 - "compile-libfuzzer-coverage-x86_64": hash
Step #3 - "compile-libfuzzer-coverage-x86_64": hash/crc32
Step #3 - "compile-libfuzzer-coverage-x86_64": hash/adler32
Step #3 - "compile-libfuzzer-coverage-x86_64": hash/maphash
Step #3 - "compile-libfuzzer-coverage-x86_64": hash/fnv
Step #3 - "compile-libfuzzer-coverage-x86_64": hash/crc64
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/pe
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/macho
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/plan9obj
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/gosym
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/buildinfo
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/elf
Step #3 - "compile-libfuzzer-coverage-x86_64": debug/dwarf
Step #3 - "compile-libfuzzer-coverage-x86_64": expvar
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/csv
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/gob
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/base64
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/json
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/xml
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/pem
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/asn1
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/hex
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/binary
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/base32
Step #3 - "compile-libfuzzer-coverage-x86_64": encoding/ascii85
Step #3 - "compile-libfuzzer-coverage-x86_64": bytes
Step #3 - "compile-libfuzzer-coverage-x86_64": errors
Finished Step #3 - "compile-libfuzzer-coverage-x86_64"
Starting Step #4
Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner
Step #4: Using default tag: latest
Step #4: latest: Pulling from oss-fuzz-base/base-runner
Step #4: b549f31133a9: Already exists
Step #4: 800687449569: Already exists
Step #4: 67cc84ed39bf: Already exists
Step #4: 4f9c5aaef41d: Pulling fs layer
Step #4: 70a3154e11f3: Pulling fs layer
Step #4: 4fab6a53b47e: Pulling fs layer
Step #4: 2c8974b97e3f: Pulling fs layer
Step #4: fa34d2d81dbe: Pulling fs layer
Step #4: 25703bb604aa: Pulling fs layer
Step #4: c73cf34df98f: Pulling fs layer
Step #4: 52a1fd76d509: Pulling fs layer
Step #4: 6887dca9f6f7: Pulling fs layer
Step #4: 9d450e2f2926: Pulling fs layer
Step #4: caeaffc0bf5a: Pulling fs layer
Step #4: 5bddf29a1eb5: Pulling fs layer
Step #4: 5123d679bab9: Pulling fs layer
Step #4: cd3fe814a4bf: Pulling fs layer
Step #4: 52a1fd76d509: Waiting
Step #4: 6887dca9f6f7: Waiting
Step #4: 9d450e2f2926: Waiting
Step #4: caeaffc0bf5a: Waiting
Step #4: 5bddf29a1eb5: Waiting
Step #4: 5123d679bab9: Waiting
Step #4: 2c8974b97e3f: Waiting
Step #4: fa34d2d81dbe: Waiting
Step #4: cd3fe814a4bf: Waiting
Step #4: 25703bb604aa: Waiting
Step #4: c73cf34df98f: Waiting
Step #4: 4fab6a53b47e: Verifying Checksum
Step #4: 4fab6a53b47e: Download complete
Step #4: 4f9c5aaef41d: Download complete
Step #4: 70a3154e11f3: Verifying Checksum
Step #4: 70a3154e11f3: Download complete
Step #4: fa34d2d81dbe: Verifying Checksum
Step #4: fa34d2d81dbe: Download complete
Step #4: 25703bb604aa: Download complete
Step #4: c73cf34df98f: Verifying Checksum
Step #4: c73cf34df98f: Download complete
Step #4: 4f9c5aaef41d: Pull complete
Step #4: 6887dca9f6f7: Verifying Checksum
Step #4: 6887dca9f6f7: Download complete
Step #4: 52a1fd76d509: Verifying Checksum
Step #4: 52a1fd76d509: Download complete
Step #4: caeaffc0bf5a: Verifying Checksum
Step #4: caeaffc0bf5a: Download complete
Step #4: 70a3154e11f3: Pull complete
Step #4: 5bddf29a1eb5: Verifying Checksum
Step #4: 5bddf29a1eb5: Download complete
Step #4: 4fab6a53b47e: Pull complete
Step #4: 2c8974b97e3f: Verifying Checksum
Step #4: 2c8974b97e3f: Download complete
Step #4: cd3fe814a4bf: Verifying Checksum
Step #4: cd3fe814a4bf: Download complete
Step #4: 9d450e2f2926: Verifying Checksum
Step #4: 9d450e2f2926: Download complete
Step #4: 5123d679bab9: Verifying Checksum
Step #4: 5123d679bab9: Download complete
Step #4: 2c8974b97e3f: Pull complete
Step #4: fa34d2d81dbe: Pull complete
Step #4: 25703bb604aa: Pull complete
Step #4: c73cf34df98f: Pull complete
Step #4: 52a1fd76d509: Pull complete
Step #4: 6887dca9f6f7: Pull complete
Step #4: 9d450e2f2926: Pull complete
Step #4: caeaffc0bf5a: Pull complete
Step #4: 5bddf29a1eb5: Pull complete
Step #4: 5123d679bab9: Pull complete
Step #4: cd3fe814a4bf: Pull complete
Step #4: Digest: sha256:f6046c5172da95c6c285c79de830b29f4115d542fe22b864a5dbc1432da29528
Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest
Step #4: gcr.io/oss-fuzz-base/base-runner:latest
Finished Step #4
Starting Step #5
Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Finished Step #5
Starting Step #6
Step #6: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Finished Step #6
Starting Step #7
Step #7: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Step #7: Running go target fuzz_ngo_crypto_ed25519
Step #7: Running go target fuzz_ngo_crypto_aes
Step #7: Running go target fuzz_ngo_archive_zip
Step #7: Running go target fuzz_ngo_net_http_httptest
Step #7: Running go target fuzz_ngo_hash_adler32
Step #7: Running go target fuzz_ngo_net_http_cgi
Step #7: Running go target fuzz_ngo_net_http
Step #7: Running go target fuzz_ngo_crypto_ecdsa
Step #7: Running go target fuzz_ngo_net_rpc
Step #7: Running go target fuzz_ngo_log_syslog
Step #7: Running go target fuzz_ngo_debug_pe
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_strconv
Step #7: Running go target fuzz_ngo_bufio
Step #7: Running go target fuzz_ngo_mime_multipart
Step #7: Running go target fuzz_ngo_runtime
Step #7: Running go target fuzz_ngo_expvar
Step #7: Running go target fuzz_ngo_net_http_pprof
Step #7: Running go target fuzz_ngo_debug_elf
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_crypto_md5
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_go_build
Step #7: Running go target fuzz_ngo_runtime_cgo
Step #7: Running go target fuzz_ngo_net_rpc_jsonrpc
Step #7: Running go target fuzz_ngo_bytes
Step #7: Running go target fuzz_ngo_unicode_utf16
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_crypto_sha512
Step #7: Running go target fuzz_ngo_compress_bzip2
Step #7: Running go target fuzz_ngo_html
Step #7: Running go target fuzz_ngo_text_scanner
Step #7: Running go target fuzz_ngo_compress_flate
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_math_big
Step #7: Running go target fuzz_ngo_crypto_des
Step #7: Running go target fuzz_ngo_database_sql
Step #7: Running go target fuzz_ngo_encoding_pem
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_runtime_debug
Step #7: Running go target fuzz_ngo_go_token
Step #7: Running go target fuzz_ngo_container_list
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_unicode_utf8
Step #7: Running go target fuzz_ngo_context
Step #7: Running go target fuzz_ngo_net_url
Step #7: Running go target fuzz_ngo_net_mail
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_encoding_hex
Step #7: Running go target fuzz_ngo_encoding_json
Step #7: Running go target fuzz_ngo_container_ring
Step #7: Running go target fuzz_ngo_math_bits
Step #7: Running go target fuzz_ngo_image
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_regexp_syntax
Step #7: Running go target fuzz_ngo_debug_plan9obj
Step #7: Running go target fuzz_ngo_io_ioutil
Step #7: Running go target fuzz_ngo_encoding_base64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_crypto_tls
Step #7: Running go target fuzz_ngo_image_jpeg
Step #7: Running go target fuzz_ngo_index_suffixarray
Step #7: Running go target fuzz_ngo_regexp
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Error occured while running fuzz_ngo_index_suffixarray:
Step #7: --- FAIL: TestFuzzNG_unsureCorpus (3.78s)
Step #7:     fuzzng_unsure_test.go:35: Fuzz panicked in /corpus/fuzz_ngo_index_suffixarray/regressions/067ec2ce26a3646d95f6e7415aada493e0e34473 runtime error: slice bounds out of range [10:0]
Step #7: FAIL
Step #7: coverage: 44.5% of statements in github.com/catenacyber/ngolo-fuzzing/..., index/suffixarray
Step #7: Running go target fuzz_ngo_log
Step #7: Running go target fuzz_ngo_compress_gzip
Step #7: Running go target fuzz_ngo_net_smtp
Step #7: Running go target fuzz_ngo_debug_macho
Step #7: Running go target fuzz_ngo_plugin
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_runtime_trace
Step #7: Running go target fuzz_ngo_path
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_go_constant
Step #7: Running go target fuzz_ngo_hash_crc64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_path_filepath
Step #7: Running go target fuzz_ngo_crypto_rsa
Step #7: Running go target fuzz_ngo_encoding_base32
Step #7: Running go target fuzz_ngo_crypto_hmac
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_go_ast
Step #7: Running go target fuzz_ngo_crypto_x509
Step #7: Running go target fuzz_ngo_crypto_rand
Step #7: Running go target fuzz_ngo_encoding_csv
Step #7: Running go target fuzz_ngo_encoding_gob
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_image_gif
Step #7: Running go target fuzz_ngo_go_parser
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_database_sql_driver
Step #7: Running go target fuzz_ngo_unicode
Step #7: Running go target fuzz_ngo_go_version
Step #7: Running go target fuzz_ngo_crypto_sha256
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_encoding_asn1
Step #7: Running go target fuzz_ngo_testing_iotest
Step #7: Running go target fuzz_ngo_mime
Step #7: Running go target fuzz_ngo_crypto_rc4
Step #7: Running go target fuzz_ngo_os_exec
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_go_build_constraint
Step #7: Running go target fuzz_ngo_html_template
Step #7: Running go target fuzz_ngo_text_template_parse
Step #7: Running go target fuzz_ngo_compress_zlib
Step #7: Running go target fuzz_ngo_net_netip
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_hash_crc32
Step #7: Running go target fuzz_ngo_debug_dwarf
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_encoding_binary
Step #7: Running go target fuzz_ngo_crypto_elliptic
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_image_png
Step #7: Running go target fuzz_ngo_io
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_net_textproto
Step #7: Running go target fuzz_ngo_os_user
Step #7: Running go target fuzz_ngo_encoding_ascii85
Step #7: Running go target fuzz_ngo_crypto_subtle
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_archive_tar
Step #7: Running go target fuzz_ngo_debug_buildinfo
Step #7: Running go target fuzz_ngo_go_doc
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_go_format
Step #7: Running go target fuzz_ngo_encoding_xml
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_text_tabwriter
Step #7: Running go target fuzz_ngo_compress_lzw
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_text_template
Step #7: Running go target fuzz_ngo_go_doc_comment
Step #7: Running go target fuzz_ngo_debug_gosym
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_strings
Step #7: Running go target fuzz_ngo_crypto_sha1
Step #7: Running go target fuzz_ngo_runtime_coverage
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: Running go target fuzz_ngo_errors
Step #7: Running go target fuzz_ngo_mime_quotedprintable
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64
Step #7: /workspace/out/libfuzzer-coverage-x86_64/dumps
Step #7: 2023/12/01 06:46:48 Cannot parse profile at "/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_ngo_index_suffixarray.perf.cpu.prof": parsing profile: empty input file
Step #7: mv: cannot stat 'merged.data': No such file or directory
Step #7: Finished generating code coverage report for Go fuzz targets.
Finished Step #7
Starting Step #8
Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #8: CommandException: 1 files/objects could not be removed.
Finished Step #8
Starting Step #9
Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]...
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]...
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]...
Step #9: / [0/4 files][    0.0 B/ 48.7 MiB]   0% Done                                    
/ [0/4 files][    0.0 B/ 48.7 MiB]   0% Done                                    
/ [0/4 files][    0.0 B/ 48.7 MiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]...
Step #9: / [0/4 files][    0.0 B/ 48.7 MiB]   0% Done                                    
/ [1/4 files][  6.8 MiB/ 48.7 MiB]  13% Done                                    
/ [2/4 files][  6.8 MiB/ 48.7 MiB]  13% Done                                    
/ [3/4 files][ 48.7 MiB/ 48.7 MiB]  99% Done                                    
-
- [4/4 files][ 48.7 MiB/ 48.7 MiB] 100% Done                                    
Step #9: Operation completed over 4 objects/48.7 MiB.                                     
Finished Step #9
Starting Step #10
Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #10: CommandException: 1 files/objects could not be removed.
Finished Step #10
Starting Step #11
Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_pe.json [Content-Type=application/json]...
Step #11: / [0/113 files][    0.0 B/409.3 KiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_math_bits.json [Content-Type=application/json]...
Step #11: / [0/113 files][  3.2 KiB/409.3 KiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_testing_iotest.json [Content-Type=application/json]...
Step #11: / [0/113 files][  3.2 KiB/409.3 KiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_mime_quotedprintable.json [Content-Type=application/json]...
Step #11: / [0/113 files][  3.2 KiB/409.3 KiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_http_cgi.json [Content-Type=application/json]...
Step #11: / [0/113 files][  3.2 KiB/409.3 KiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_gosym.json [Content-Type=application/json]...
Step #11: / [0/113 files][ 12.9 KiB/409.3 KiB]   3% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_md5.json [Content-Type=application/json]...
Step #11: / [0/113 files][ 12.9 KiB/409.3 KiB]   3% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_build_constraint.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_build.json [Content-Type=application/json]...
Step #11: / [0/113 files][ 12.9 KiB/409.3 KiB]   3% Done                                  
/ [0/113 files][ 12.9 KiB/409.3 KiB]   3% Done                                  
/ [1/113 files][ 22.6 KiB/409.3 KiB]   5% Done                                  
/ [2/113 files][ 22.6 KiB/409.3 KiB]   5% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_bytes.json [Content-Type=application/json]...
Step #11: / [2/113 files][ 22.6 KiB/409.3 KiB]   5% Done                                  
/ [3/113 files][ 22.6 KiB/409.3 KiB]   5% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_plugin.json [Content-Type=application/json]...
Step #11: / [3/113 files][ 22.6 KiB/409.3 KiB]   5% Done                                  
/ [4/113 files][ 25.4 KiB/409.3 KiB]   6% Done                                  
/ [5/113 files][ 25.4 KiB/409.3 KiB]   6% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_text_template.json [Content-Type=application/json]...
Step #11: / [5/113 files][ 27.6 KiB/409.3 KiB]   6% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_smtp.json [Content-Type=application/json]...
Step #11: / [5/113 files][ 27.6 KiB/409.3 KiB]   6% Done                                  
/ [6/113 files][ 27.6 KiB/409.3 KiB]   6% Done                                  
/ [7/113 files][ 27.6 KiB/409.3 KiB]   6% Done                                  
/ [8/113 files][ 27.6 KiB/409.3 KiB]   6% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_sha256.json [Content-Type=application/json]...
Step #11: / [8/113 files][ 33.6 KiB/409.3 KiB]   8% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_textproto.json [Content-Type=application/json]...
Step #11: / [8/113 files][ 33.6 KiB/409.3 KiB]   8% Done                                  
/ [9/113 files][ 33.6 KiB/409.3 KiB]   8% Done                                  
/ [10/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
/ [11/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
/ [12/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
/ [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_sha512.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_json.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_runtime_cgo.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_html_template.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
/ [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_ascii85.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_runtime_debug.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_database_sql_driver.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_ed25519.json [Content-Type=application/json]...
Step #11: / [13/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
/ [14/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_url.json [Content-Type=application/json]...
Step #11: / [14/113 files][ 39.5 KiB/409.3 KiB]   9% Done                                 
/ [15/113 files][ 42.2 KiB/409.3 KiB]  10% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_archive_zip.json [Content-Type=application/json]...
Step #11: / [15/113 files][ 47.2 KiB/409.3 KiB]  11% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_rpc_jsonrpc.json [Content-Type=application/json]...
Step #11: / [15/113 files][ 47.2 KiB/409.3 KiB]  11% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_http_pprof.json [Content-Type=application/json]...
Step #11: / [15/113 files][ 51.9 KiB/409.3 KiB]  12% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_strings.json [Content-Type=application/json]...
Step #11: / [15/113 files][ 61.0 KiB/409.3 KiB]  14% Done                                 
-
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_aes.json [Content-Type=application/json]...
Step #11: - [15/113 files][ 62.9 KiB/409.3 KiB]  15% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_doc_comment.json [Content-Type=application/json]...
Step #11: - [15/113 files][ 62.9 KiB/409.3 KiB]  15% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_format.json [Content-Type=application/json]...
Step #11: - [15/113 files][ 62.9 KiB/409.3 KiB]  15% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_buildinfo.json [Content-Type=application/json]...
Step #11: - [15/113 files][ 62.9 KiB/409.3 KiB]  15% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_text_tabwriter.json [Content-Type=application/json]...
Step #11: - [15/113 files][ 64.7 KiB/409.3 KiB]  15% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_csv.json [Content-Type=application/json]...
Step #11: - [15/113 files][ 76.4 KiB/409.3 KiB]  18% Done                                 
- [16/113 files][ 76.4 KiB/409.3 KiB]  18% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_compress_gzip.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 76.4 KiB/409.3 KiB]  18% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_hash_crc32.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 76.4 KiB/409.3 KiB]  18% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_pem.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 81.9 KiB/409.3 KiB]  20% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_hash_adler32.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 81.9 KiB/409.3 KiB]  20% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_compress_flate.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 81.9 KiB/409.3 KiB]  20% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_image_gif.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 81.9 KiB/409.3 KiB]  20% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_database_sql.json [Content-Type=application/json]...
Step #11: - [16/113 files][ 81.9 KiB/409.3 KiB]  20% Done                                 
- [17/113 files][ 81.9 KiB/409.3 KiB]  20% Done                                 
- [18/113 files][ 84.6 KiB/409.3 KiB]  20% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_http.json [Content-Type=application/json]...
Step #11: - [18/113 files][ 87.4 KiB/409.3 KiB]  21% Done                                 
- [19/113 files][ 87.4 KiB/409.3 KiB]  21% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_math_big.json [Content-Type=application/json]...
Step #11: - [19/113 files][ 87.4 KiB/409.3 KiB]  21% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_unicode_utf8.json [Content-Type=application/json]...
Step #11: - [19/113 files][ 87.4 KiB/409.3 KiB]  21% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_image_jpeg.json [Content-Type=application/json]...
Step #11: - [20/113 files][ 87.4 KiB/409.3 KiB]  21% Done                                 
- [20/113 files][ 89.8 KiB/409.3 KiB]  21% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_index_suffixarray.json [Content-Type=application/json]...
Step #11: - [20/113 files][ 91.6 KiB/409.3 KiB]  22% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_ecdsa.json [Content-Type=application/json]...
Step #11: - [20/113 files][ 93.5 KiB/409.3 KiB]  22% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_text_scanner.json [Content-Type=application/json]...
Step #11: - [20/113 files][ 93.5 KiB/409.3 KiB]  22% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_hex.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_netip.json [Content-Type=application/json]...
Step #11: - [20/113 files][ 93.5 KiB/409.3 KiB]  22% Done                                 
- [20/113 files][ 93.5 KiB/409.3 KiB]  22% Done                                 
- [21/113 files][ 93.5 KiB/409.3 KiB]  22% Done                                 
- [22/113 files][ 98.1 KiB/409.3 KiB]  23% Done                                 
- [23/113 files][100.0 KiB/409.3 KiB]  24% Done                                 
- [24/113 files][100.0 KiB/409.3 KiB]  24% Done                                 
- [25/113 files][112.7 KiB/409.3 KiB]  27% Done                                 
- [26/113 files][112.7 KiB/409.3 KiB]  27% Done                                 
- [27/113 files][114.6 KiB/409.3 KiB]  27% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_rand.json [Content-Type=application/json]...
Step #11: - [27/113 files][121.4 KiB/409.3 KiB]  29% Done                                 
- [28/113 files][121.4 KiB/409.3 KiB]  29% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_unicode_utf16.json [Content-Type=application/json]...
Step #11: - [28/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
- [29/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_dwarf.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_des.json [Content-Type=application/json]...
Step #11: - [29/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
- [29/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_binary.json [Content-Type=application/json]...
Step #11: - [29/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_path_filepath.json [Content-Type=application/json]...
Step #11: - [29/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_http_httptest.json [Content-Type=application/json]...
Step #11: - [29/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
- [30/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
- [31/113 files][139.1 KiB/409.3 KiB]  33% Done                                 
- [32/113 files][142.2 KiB/409.3 KiB]  34% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_regexp_syntax.json [Content-Type=application/json]...
Step #11: - [33/113 files][142.2 KiB/409.3 KiB]  34% Done                                 
- [33/113 files][142.2 KiB/409.3 KiB]  34% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_base64.json [Content-Type=application/json]...
Step #11: - [33/113 files][145.0 KiB/409.3 KiB]  35% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_mail.json [Content-Type=application/json]...
Step #11: - [33/113 files][145.0 KiB/409.3 KiB]  35% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_x509.json [Content-Type=application/json]...
Step #11: - [33/113 files][153.2 KiB/409.3 KiB]  37% Done                                 
- [34/113 files][153.2 KiB/409.3 KiB]  37% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_hash_crc64.json [Content-Type=application/json]...
Step #11: - [34/113 files][153.2 KiB/409.3 KiB]  37% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_path.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_expvar.json [Content-Type=application/json]...
Step #11: - [34/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
- [34/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_runtime_coverage.json [Content-Type=application/json]...
Step #11: - [34/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_asn1.json [Content-Type=application/json]...
Step #11: - [34/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
- [35/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_ast.json [Content-Type=application/json]...
Step #11: - [36/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
- [36/113 files][155.1 KiB/409.3 KiB]  37% Done                                 
- [37/113 files][157.9 KiB/409.3 KiB]  38% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_rsa.json [Content-Type=application/json]...
Step #11: - [37/113 files][157.9 KiB/409.3 KiB]  38% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_token.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_log.json [Content-Type=application/json]...
Step #11: - [38/113 files][157.9 KiB/409.3 KiB]  38% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_net_rpc.json [Content-Type=application/json]...
Step #11: - [38/113 files][162.0 KiB/409.3 KiB]  39% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_xml.json [Content-Type=application/json]...
Step #11: - [39/113 files][162.0 KiB/409.3 KiB]  39% Done                                 
- [39/113 files][162.0 KiB/409.3 KiB]  39% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_runtime_trace.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_sha1.json [Content-Type=application/json]...
Step #11: - [39/113 files][162.0 KiB/409.3 KiB]  39% Done                                 
- [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
- [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_runtime.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_image_png.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_parser.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_io_ioutil.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_elliptic.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_log_syslog.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
- [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_elf.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_io.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
- [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_compress_zlib.json [Content-Type=application/json]...
Step #11: - [39/113 files][166.1 KiB/409.3 KiB]  40% Done                                 
- [40/113 files][168.0 KiB/409.3 KiB]  41% Done                                 
- [41/113 files][168.0 KiB/409.3 KiB]  41% Done                                 
- [41/113 files][168.0 KiB/409.3 KiB]  41% Done                                 
- [42/113 files][169.9 KiB/409.3 KiB]  41% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_base32.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_html.json [Content-Type=application/json]...
Step #11: - [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_tls.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_hmac.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_plan9obj.json [Content-Type=application/json]...
Step #11: - [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
- [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_debug_macho.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_os_user.json [Content-Type=application/json]...
Step #11: - [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
- [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
- [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_rc4.json [Content-Type=application/json]...
Step #11: - [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
- [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_image.json [Content-Type=application/json]...
Step #11: - [42/113 files][173.1 KiB/409.3 KiB]  42% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_doc.json [Content-Type=application/json]...
Step #11: - [42/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
- [43/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_unicode.json [Content-Type=application/json]...
Step #11: - [44/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
- [44/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
- [45/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_mime.json [Content-Type=application/json]...
Step #11: - [46/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
- [46/113 files][177.9 KiB/409.3 KiB]  43% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_container_list.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_crypto_subtle.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_encoding_gob.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_context.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_compress_bzip2.json [Content-Type=application/json]...
Step #11: - [46/113 files][179.7 KiB/409.3 KiB]  43% Done                                 
- [46/113 files][179.7 KiB/409.3 KiB]  43% Done                                 
- [46/113 files][181.6 KiB/409.3 KiB]  44% Done                                 
- [46/113 files][181.6 KiB/409.3 KiB]  44% Done                                 
- [46/113 files][181.6 KiB/409.3 KiB]  44% Done                                 
- [46/113 files][181.6 KiB/409.3 KiB]  44% Done                                 
- [47/113 files][183.9 KiB/409.3 KiB]  44% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_constant.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_archive_tar.json [Content-Type=application/json]...
Step #11: - [47/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_bufio.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_go_version.json [Content-Type=application/json]...
Step #11: - [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_errors.json [Content-Type=application/json]...
Step #11: - [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_container_ring.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_text_template_parse.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_compress_lzw.json [Content-Type=application/json]...
Step #11: - [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [48/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [49/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_mime_multipart.json [Content-Type=application/json]...
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_regexp.json [Content-Type=application/json]...
Step #11: - [49/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_os_exec.json [Content-Type=application/json]...
Step #11: - [49/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [49/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_ngo_strconv.json [Content-Type=application/json]...
Step #11: - [50/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [50/113 files][251.8 KiB/409.3 KiB]  61% Done                                 
- [51/113 files][256.0 KiB/409.3 KiB]  62% Done                                 
- [52/113 files][265.8 KiB/409.3 KiB]  64% Done                                 
- [53/113 files][265.8 KiB/409.3 KiB]  64% Done                                 
- [54/113 files][270.0 KiB/409.3 KiB]  65% Done                                 
- [55/113 files][278.5 KiB/409.3 KiB]  68% Done                                 
- [56/113 files][280.8 KiB/409.3 KiB]  68% Done                                 
- [57/113 files][280.8 KiB/409.3 KiB]  68% Done                                 
- [58/113 files][280.8 KiB/409.3 KiB]  68% Done                                 
- [59/113 files][283.6 KiB/409.3 KiB]  69% Done                                 
- [60/113 files][295.2 KiB/409.3 KiB]  72% Done                                 
- [61/113 files][295.2 KiB/409.3 KiB]  72% Done                                 
- [62/113 files][295.2 KiB/409.3 KiB]  72% Done                                 
- [63/113 files][295.2 KiB/409.3 KiB]  72% Done                                 
- [64/113 files][295.2 KiB/409.3 KiB]  72% Done                                 
- [65/113 files][301.5 KiB/409.3 KiB]  73% Done                                 
\
\ [66/113 files][306.5 KiB/409.3 KiB]  74% Done                                 
\ [67/113 files][306.5 KiB/409.3 KiB]  74% Done                                 
\ [68/113 files][311.9 KiB/409.3 KiB]  76% Done                                 
\ [69/113 files][314.2 KiB/409.3 KiB]  76% Done                                 
\ [70/113 files][314.2 KiB/409.3 KiB]  76% Done                                 
\ [71/113 files][314.2 KiB/409.3 KiB]  76% Done                                 
\ [72/113 files][314.2 KiB/409.3 KiB]  76% Done                                 
\ [73/113 files][314.2 KiB/409.3 KiB]  76% Done                                 
\ [74/113 files][320.2 KiB/409.3 KiB]  78% Done                                 
\ [75/113 files][336.8 KiB/409.3 KiB]  82% Done                                 
\ [76/113 files][339.1 KiB/409.3 KiB]  82% Done                                 
\ [77/113 files][339.1 KiB/409.3 KiB]  82% Done                                 
\ [78/113 files][345.0 KiB/409.3 KiB]  84% Done                                 
\ [79/113 files][354.1 KiB/409.3 KiB]  86% Done                                 
\ [80/113 files][354.1 KiB/409.3 KiB]  86% Done                                 
\ [81/113 files][362.4 KiB/409.3 KiB]  88% Done                                 
\ [82/113 files][362.4 KiB/409.3 KiB]  88% Done                                 
\ [83/113 files][364.2 KiB/409.3 KiB]  88% Done                                 
\ [84/113 files][369.8 KiB/409.3 KiB]  90% Done                                 
\ [85/113 files][369.8 KiB/409.3 KiB]  90% Done                                 
\ [86/113 files][369.8 KiB/409.3 KiB]  90% Done                                 
\ [87/113 files][369.8 KiB/409.3 KiB]  90% Done                                 
\ [88/113 files][369.8 KiB/409.3 KiB]  90% Done                                 
\ [89/113 files][373.8 KiB/409.3 KiB]  91% Done                                 
\ [90/113 files][373.8 KiB/409.3 KiB]  91% Done                                 
\ [91/113 files][379.3 KiB/409.3 KiB]  92% Done                                 
\ [92/113 files][379.3 KiB/409.3 KiB]  92% Done                                 
\ [93/113 files][379.3 KiB/409.3 KiB]  92% Done                                 
\ [94/113 files][379.3 KiB/409.3 KiB]  92% Done                                 
\ [95/113 files][379.3 KiB/409.3 KiB]  92% Done                                 
\ [96/113 files][395.5 KiB/409.3 KiB]  96% Done                                 
\ [97/113 files][395.5 KiB/409.3 KiB]  96% Done                                 
\ [98/113 files][395.5 KiB/409.3 KiB]  96% Done                                 
\ [99/113 files][395.5 KiB/409.3 KiB]  96% Done                                 
\ [100/113 files][395.5 KiB/409.3 KiB]  96% Done                                
\ [101/113 files][395.5 KiB/409.3 KiB]  96% Done                                
\ [102/113 files][395.5 KiB/409.3 KiB]  96% Done                                
\ [103/113 files][395.5 KiB/409.3 KiB]  96% Done                                
\ [104/113 files][395.5 KiB/409.3 KiB]  96% Done                                
\ [105/113 files][395.5 KiB/409.3 KiB]  96% Done                                
\ [106/113 files][400.1 KiB/409.3 KiB]  97% Done                                
\ [107/113 files][400.1 KiB/409.3 KiB]  97% Done                                
\ [108/113 files][409.3 KiB/409.3 KiB]  99% Done                                
\ [109/113 files][409.3 KiB/409.3 KiB]  99% Done                                
\ [110/113 files][409.3 KiB/409.3 KiB]  99% Done                                
\ [111/113 files][409.3 KiB/409.3 KiB]  99% Done                                
|
| [112/113 files][409.3 KiB/409.3 KiB]  99% Done                                
| [113/113 files][409.3 KiB/409.3 KiB] 100% Done                                
Step #11: Operation completed over 113 objects/409.3 KiB.                                  
Finished Step #11
Starting Step #12
Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #12: CommandException: 1 files/objects could not be removed.
Finished Step #12
Starting Step #13
Step #13: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_archive_tar.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][    0.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_compress_bzip2.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][    0.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_os_user.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][    0.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_pe.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][    0.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_runtime_cgo.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][    0.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_asn1.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][  456.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_elf.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][  456.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_ecdsa.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][  456.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_text_template_parse.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][  456.0 B/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_runtime.log [Content-Type=application/octet-stream]...
Step #13: / [0/112 files][  456.0 B/  4.8 MiB]   0% Done                                  
/ [1/112 files][  640.0 B/  4.8 MiB]   0% Done                                  
/ [2/112 files][  833.0 B/  4.8 MiB]   0% Done                                  
/ [3/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
/ [4/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_log.log [Content-Type=application/octet-stream]...
Step #13: / [4/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_runtime_coverage.log [Content-Type=application/octet-stream]...
Step #13: / [4/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_des.log [Content-Type=application/octet-stream]...
Step #13: / [4/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_macho.log [Content-Type=application/octet-stream]...
Step #13: / [4/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
/ [5/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
/ [6/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
/ [7/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_binary.log [Content-Type=application/octet-stream]...
Step #13: / [7/112 files][  4.4 KiB/  4.8 MiB]   0% Done                                  
/ [8/112 files][  4.5 KiB/  4.8 MiB]   0% Done                                  
/ [9/112 files][  4.6 KiB/  4.8 MiB]   0% Done                                  
/ [10/112 files][  4.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_image.log [Content-Type=application/octet-stream]...
Step #13: / [10/112 files][  4.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_database_sql.log [Content-Type=application/octet-stream]...
Step #13: / [10/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
/ [11/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
/ [12/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
/ [13/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_constant.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_log_syslog.log [Content-Type=application/octet-stream]...
Step #13: / [13/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
/ [13/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_build.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_smtp.log [Content-Type=application/octet-stream]...
Step #13: / [13/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
/ [13/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_rpc.log [Content-Type=application/octet-stream]...
Step #13: / [13/112 files][  4.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_plugin.log [Content-Type=application/octet-stream]...
Step #13: / [13/112 files][  5.0 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_regexp_syntax.log [Content-Type=application/octet-stream]...
Step #13: / [13/112 files][  5.1 KiB/  4.8 MiB]   0% Done                                 
/ [14/112 files][  5.1 KiB/  4.8 MiB]   0% Done                                 
/ [15/112 files][  5.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_rc4.log [Content-Type=application/octet-stream]...
Step #13: / [15/112 files][ 10.3 KiB/  4.8 MiB]   0% Done                                 
/ [16/112 files][ 10.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_math_bits.log [Content-Type=application/octet-stream]...
Step #13: / [16/112 files][ 10.4 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_rpc_jsonrpc.log [Content-Type=application/octet-stream]...
Step #13: / [16/112 files][ 10.4 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_subtle.log [Content-Type=application/octet-stream]...
Step #13: / [16/112 files][ 10.5 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_unicode_utf16.log [Content-Type=application/octet-stream]...
Step #13: / [16/112 files][ 10.5 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_textproto.log [Content-Type=application/octet-stream]...
Step #13: / [16/112 files][ 10.5 KiB/  4.8 MiB]   0% Done                                 
/ [17/112 files][ 10.5 KiB/  4.8 MiB]   0% Done                                 
/ [18/112 files][ 10.8 KiB/  4.8 MiB]   0% Done                                 
/ [19/112 files][ 10.8 KiB/  4.8 MiB]   0% Done                                 
/ [20/112 files][ 10.8 KiB/  4.8 MiB]   0% Done                                 
/ [21/112 files][ 10.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_sha256.log [Content-Type=application/octet-stream]...
Step #13: / [21/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_format.log [Content-Type=application/octet-stream]...
Step #13: / [21/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
-
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_csv.log [Content-Type=application/octet-stream]...
Step #13: - [21/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_html_template.log [Content-Type=application/octet-stream]...
Step #13: - [21/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_tls.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_version.log [Content-Type=application/octet-stream]...
Step #13: - [21/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
- [21/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
- [22/112 files][ 10.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_hash_crc32.log [Content-Type=application/octet-stream]...
Step #13: - [22/112 files][ 11.0 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_http_httptest.log [Content-Type=application/octet-stream]...
Step #13: - [22/112 files][ 11.0 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_mail.log [Content-Type=application/octet-stream]...
Step #13: - [22/112 files][ 11.0 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_build_constraint.log [Content-Type=application/octet-stream]...
Step #13: - [22/112 files][ 11.0 KiB/  4.8 MiB]   0% Done                                 
- [23/112 files][ 11.0 KiB/  4.8 MiB]   0% Done                                 
- [24/112 files][ 11.0 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_gosym.log [Content-Type=application/octet-stream]...
Step #13: - [24/112 files][ 11.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_unicode.log [Content-Type=application/octet-stream]...
Step #13: - [24/112 files][ 11.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_runtime_trace.log [Content-Type=application/octet-stream]...
Step #13: - [24/112 files][ 11.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_text_tabwriter.log [Content-Type=application/octet-stream]...
Step #13: - [24/112 files][ 11.2 KiB/  4.8 MiB]   0% Done                                 
- [25/112 files][ 11.4 KiB/  4.8 MiB]   0% Done                                 
- [26/112 files][ 11.5 KiB/  4.8 MiB]   0% Done                                 
- [27/112 files][ 11.5 KiB/  4.8 MiB]   0% Done                                 
- [28/112 files][ 11.6 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_ascii85.log [Content-Type=application/octet-stream]...
Step #13: - [28/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
- [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_md5.log [Content-Type=application/octet-stream]...
Step #13: - [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_xml.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_strconv.log [Content-Type=application/octet-stream]...
Step #13: - [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
- [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_http.log [Content-Type=application/octet-stream]...
Step #13: - [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_regexp.log [Content-Type=application/octet-stream]...
Step #13: - [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_rsa.log [Content-Type=application/octet-stream]...
Step #13: - [29/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
- [30/112 files][ 11.8 KiB/  4.8 MiB]   0% Done                                 
- [31/112 files][ 11.9 KiB/  4.8 MiB]   0% Done                                 
- [32/112 files][ 11.9 KiB/  4.8 MiB]   0% Done                                 
- [33/112 files][ 12.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_html.log [Content-Type=application/octet-stream]...
Step #13: - [33/112 files][ 12.4 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_base32.log [Content-Type=application/octet-stream]...
Step #13: - [33/112 files][ 12.4 KiB/  4.8 MiB]   0% Done                                 
- [34/112 files][ 12.5 KiB/  4.8 MiB]   0% Done                                 
- [35/112 files][ 12.5 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_container_list.log [Content-Type=application/octet-stream]...
Step #13: - [35/112 files][ 12.5 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_hmac.log [Content-Type=application/octet-stream]...
Step #13: - [35/112 files][ 12.5 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_compress_zlib.log [Content-Type=application/octet-stream]...
Step #13: - [36/112 files][ 12.6 KiB/  4.8 MiB]   0% Done                                 
- [37/112 files][ 12.6 KiB/  4.8 MiB]   0% Done                                 
- [38/112 files][ 12.6 KiB/  4.8 MiB]   0% Done                                 
- [39/112 files][ 12.6 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_parser.log [Content-Type=application/octet-stream]...
Step #13: - [39/112 files][ 12.6 KiB/  4.8 MiB]   0% Done                                 
- [40/112 files][ 12.6 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_path_filepath.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 12.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_text_template.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 12.8 KiB/  4.8 MiB]   0% Done                                 
- [40/112 files][ 13.0 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_url.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 13.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_compress_lzw.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 13.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_container_ring.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 13.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_bufio.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_runtime_debug.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_expvar.log [Content-Type=application/octet-stream]...
Step #13: - [40/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
- [41/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
- [42/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_base64.log [Content-Type=application/octet-stream]...
Step #13: - [42/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
- [43/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_image_png.log [Content-Type=application/octet-stream]...
Step #13: - [44/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
- [44/112 files][ 13.3 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_strings.log [Content-Type=application/octet-stream]...
Step #13: - [44/112 files][ 13.4 KiB/  4.8 MiB]   0% Done                                 
- [45/112 files][ 13.4 KiB/  4.8 MiB]   0% Done                                 
- [46/112 files][ 13.4 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_token.log [Content-Type=application/octet-stream]...
Step #13: - [46/112 files][ 13.5 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_aes.log [Content-Type=application/octet-stream]...
Step #13: - [46/112 files][ 13.6 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_x509.log [Content-Type=application/octet-stream]...
Step #13: - [46/112 files][ 13.6 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_netip.log [Content-Type=application/octet-stream]...
Step #13: - [46/112 files][ 13.6 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_text_scanner.log [Content-Type=application/octet-stream]...
Step #13: - [47/112 files][ 13.6 KiB/  4.8 MiB]   0% Done                                 
- [47/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_ast.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_bytes.log [Content-Type=application/octet-stream]...
Step #13: - [48/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [48/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [48/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_path.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_hash_crc64.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_io.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_testing_iotest.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_mime_quotedprintable.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_elliptic.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_plan9obj.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_http_cgi.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_index_suffixarray.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_sha512.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_json.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_gob.log [Content-Type=application/octet-stream]...
Step #13: - [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_doc.log [Content-Type=application/octet-stream]...
Step #13: - [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_context.log [Content-Type=application/octet-stream]...
Step #13: - [49/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [50/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [50/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [50/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_archive_zip.log [Content-Type=application/octet-stream]...
Step #13: - [50/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [50/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_unicode_utf8.log [Content-Type=application/octet-stream]...
Step #13: - [50/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [51/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [51/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [51/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [51/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [52/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [53/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
- [54/112 files][ 13.7 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_image_gif.log [Content-Type=application/octet-stream]...
Step #13: - [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_image_jpeg.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_io_ioutil.log [Content-Type=application/octet-stream]...
Step #13: - [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
- [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_pem.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_database_sql_driver.log [Content-Type=application/octet-stream]...
Step #13: - [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
- [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_mime.log [Content-Type=application/octet-stream]...
Step #13: - [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_compress_flate.log [Content-Type=application/octet-stream]...
Step #13: - [54/112 files][ 13.8 KiB/  4.8 MiB]   0% Done                                 
- [55/112 files][ 13.9 KiB/  4.8 MiB]   0% Done                                 
- [56/112 files][ 13.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_dwarf.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_math_big.log [Content-Type=application/octet-stream]...
Step #13: - [56/112 files][ 13.9 KiB/  4.8 MiB]   0% Done                                 
- [56/112 files][ 13.9 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_hash_adler32.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_debug_buildinfo.log [Content-Type=application/octet-stream]...
Step #13: - [56/112 files][ 14.0 KiB/  4.8 MiB]   0% Done                                 
- [56/112 files][ 14.0 KiB/  4.8 MiB]   0% Done                                 
- [57/112 files][ 14.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_sha1.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_rand.log [Content-Type=application/octet-stream]...
Step #13: - [57/112 files][ 14.1 KiB/  4.8 MiB]   0% Done                                 
- [57/112 files][ 14.1 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_go_doc_comment.log [Content-Type=application/octet-stream]...
Step #13: - [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_compress_gzip.log [Content-Type=application/octet-stream]...
Step #13: - [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_errors.log [Content-Type=application/octet-stream]...
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_os_exec.log [Content-Type=application/octet-stream]...
Step #13: - [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_net_http_pprof.log [Content-Type=application/octet-stream]...
Step #13: - [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
- [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
- [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_crypto_ed25519.log [Content-Type=application/octet-stream]...
Step #13: - [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_mime_multipart.log [Content-Type=application/octet-stream]...
Step #13: - [58/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
- [59/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_ngo_encoding_hex.log [Content-Type=application/octet-stream]...
Step #13: - [59/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
- [60/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
- [61/112 files][ 14.2 KiB/  4.8 MiB]   0% Done                                 
- [62/112 files][  2.6 MiB/  4.8 MiB]  53% Done                                 
- [63/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [64/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [65/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [66/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [67/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [68/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [69/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [70/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
- [71/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\
\ [72/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [73/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [74/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [75/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [76/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [77/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [78/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [79/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [80/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [81/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [82/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [83/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [84/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [85/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [86/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [87/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [88/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [89/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [90/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [91/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [92/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [93/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [94/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [95/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [96/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [97/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [98/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [99/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                 
\ [100/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [101/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [102/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [103/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [104/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [105/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [106/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [107/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [108/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [109/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [110/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [111/112 files][  4.8 MiB/  4.8 MiB]  99% Done                                
\ [112/112 files][  4.8 MiB/  4.8 MiB] 100% Done                                
Step #13: Operation completed over 112 objects/4.8 MiB.                                    
Finished Step #13
Starting Step #14
Step #14: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #14: Copying file:///workspace/srcmap.json [Content-Type=application/json]...
Step #14: / [0 files][    0.0 B/  673.0 B]                                                
/ [1 files][  673.0 B/  673.0 B]                                                
Step #14: Operation completed over 1 objects/673.0 B.                                      
Finished Step #14
Starting Step #15
Step #15: Already have image (with digest): gcr.io/cloud-builders/curl
Step #15:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #15:                                  Dload  Upload   Total   Spent    Left  Speed
Step #15: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100   327    0     0  100   327      0   1579 --:--:-- --:--:-- --:--:--  1579
100   327    0     0  100   327      0   1427 --:--:-- --:--:-- --:--:--  1427
Finished Step #15
PUSH
DONE