starting build "57035bb5-2e4f-43c9-9d5c-481a8cc1a4e9" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e" Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Sending build context to Docker daemon 4.096kB Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b549f31133a9: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cde73eda1675: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ab8fa1a1224: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 595ac4db79ee: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d6662a434482: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c1e8508a506: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 760d0b3e5670: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 595ac4db79ee: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c1e8508a506: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 760d0b3e5670: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d6662a434482: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d5f98576c68f: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cfb40a3ef9da: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d5f98576c68f: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f39fec9b1d6d: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3d463233cf5c: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cfb40a3ef9da: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f39fec9b1d6d: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4a996b1c8221: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ab1308ee9b34: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4a996b1c8221: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3d463233cf5c: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3921b178a88d: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 69ef84a4446a: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ab1308ee9b34: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3921b178a88d: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3466e0438979: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b17b3182a508: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 92c9e8d5d963: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3466e0438979: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4581be439ec0: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 69ef84a4446a: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 068b0d7c9b3a: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 0526c0380ea5: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4ff4477285dd: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6ea302d03e86: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f2b48ea4d117: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4f18d9dc5678: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 068b0d7c9b3a: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6031f97bbed0: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 92c9e8d5d963: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b17b3182a508: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cebd9caa4245: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4581be439ec0: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f2b48ea4d117: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4f18d9dc5678: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 7180a5420452: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 0526c0380ea5: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6031f97bbed0: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4ff4477285dd: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ec87d61cfb8: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6ea302d03e86: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c8ebaa3b337: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 7180a5420452: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 276751a5373a: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ff5cabec616c: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ec87d61cfb8: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 94d4a3a0f393: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c8ebaa3b337: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 276751a5373a: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8ac244d4ef00: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ff5cabec616c: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ba30b798bc71: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 94d4a3a0f393: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 57ddf6d3a128: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6bc69ad35e5b: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8ac244d4ef00: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": c835ec7b4a6e: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ba30b798bc71: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 666de0e26624: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f556cc592565: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 77ef8cd4f5b4: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 32b13e649571: Pulling fs layer Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 666de0e26624: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 77ef8cd4f5b4: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": c835ec7b4a6e: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 32b13e649571: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f556cc592565: Waiting Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ab8fa1a1224: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ab8fa1a1224: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b549f31133a9: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b549f31133a9: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d6662a434482: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d6662a434482: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 595ac4db79ee: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 595ac4db79ee: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c1e8508a506: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c1e8508a506: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d5f98576c68f: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d5f98576c68f: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cde73eda1675: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cde73eda1675: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cfb40a3ef9da: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cfb40a3ef9da: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b549f31133a9: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3d463233cf5c: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3d463233cf5c: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4a996b1c8221: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4a996b1c8221: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ab1308ee9b34: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3921b178a88d: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 69ef84a4446a: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 69ef84a4446a: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3466e0438979: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3466e0438979: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f39fec9b1d6d: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f39fec9b1d6d: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b17b3182a508: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b17b3182a508: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4581be439ec0: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4581be439ec0: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 068b0d7c9b3a: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 068b0d7c9b3a: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 0526c0380ea5: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 0526c0380ea5: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4ff4477285dd: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6ea302d03e86: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6ea302d03e86: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f2b48ea4d117: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4f18d9dc5678: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4f18d9dc5678: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6031f97bbed0: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cebd9caa4245: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 7180a5420452: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 7180a5420452: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ec87d61cfb8: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cde73eda1675: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 760d0b3e5670: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 760d0b3e5670: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ab8fa1a1224: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 276751a5373a: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c8ebaa3b337: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c8ebaa3b337: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 94d4a3a0f393: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 94d4a3a0f393: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ff5cabec616c: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ff5cabec616c: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8ac244d4ef00: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8ac244d4ef00: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ba30b798bc71: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": c835ec7b4a6e: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6bc69ad35e5b: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6bc69ad35e5b: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 666de0e26624: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 666de0e26624: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 57ddf6d3a128: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f556cc592565: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f556cc592565: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 32b13e649571: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 595ac4db79ee: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d6662a434482: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c1e8508a506: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 77ef8cd4f5b4: Verifying Checksum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 77ef8cd4f5b4: Download complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 760d0b3e5670: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": d5f98576c68f: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cfb40a3ef9da: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f39fec9b1d6d: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3d463233cf5c: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4a996b1c8221: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ab1308ee9b34: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3921b178a88d: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 69ef84a4446a: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 3466e0438979: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": b17b3182a508: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 92c9e8d5d963: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4581be439ec0: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 068b0d7c9b3a: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 0526c0380ea5: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4ff4477285dd: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6ea302d03e86: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f2b48ea4d117: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 4f18d9dc5678: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6031f97bbed0: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": cebd9caa4245: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 7180a5420452: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 9ec87d61cfb8: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8c8ebaa3b337: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 276751a5373a: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ff5cabec616c: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 94d4a3a0f393: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 8ac244d4ef00: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ba30b798bc71: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 57ddf6d3a128: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 6bc69ad35e5b: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": c835ec7b4a6e: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 666de0e26624: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": f556cc592565: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 77ef8cd4f5b4: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": 32b13e649571: Pull complete Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Digest: sha256:c05664aa4f0d41ee402d50a19bc702d730dddd27ee56bdb8f477f1cf3fd2da69 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> cbe6eb1211ac Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Step 2/5 : RUN git clone --single-branch --depth=1 https://github.com/ethereum/go-ethereum $GOPATH/src/github.com/ethereum/go-ethereum Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> Running in 7b4e60a87be0 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Cloning into '/root/go/src/github.com/ethereum/go-ethereum'... Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Removing intermediate container 7b4e60a87be0 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> 60835ff1416a Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Step 3/5 : RUN (cd $GOPATH/src/github.com/ethereum/go-ethereum && go mod download) Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> Running in e9fc78730c85 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Removing intermediate container e9fc78730c85 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> b12fa87a1998 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Step 4/5 : RUN cp $GOPATH/src/github.com/ethereum/go-ethereum/oss-fuzz.sh $SRC/build.sh Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> Running in 76e51fd2a20e Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Removing intermediate container 76e51fd2a20e Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> 9fc1b48aaa0b Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Step 5/5 : WORKDIR $SRC/ Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> Running in bc8805dad0c2 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Removing intermediate container bc8805dad0c2 Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": ---> 1bdbc495f81d Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Successfully built 1bdbc495f81d Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Successfully tagged gcr.io/oss-fuzz/go-ethereum:latest Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/go-ethereum:latest Finished Step #1 - "build-2dfa7cd8-607d-488d-ac26-9d370492839e" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-ethereum Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileCiod7L Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/ethereum/go-ethereum/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": + cd /root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=b62756d1a3b8b09430f5b060caa7382c8117fb90 Step #2 - "srcmap": + jq_inplace /tmp/fileCiod7L '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "b62756d1a3b8b09430f5b060caa7382c8117fb90" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filebysBga Step #2 - "srcmap": + cat /tmp/fileCiod7L Step #2 - "srcmap": + jq '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "b62756d1a3b8b09430f5b060caa7382c8117fb90" }' Step #2 - "srcmap": + mv /tmp/filebysBga /tmp/fileCiod7L Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileCiod7L Step #2 - "srcmap": + rm /tmp/fileCiod7L Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/ethereum/go-ethereum": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ethereum/go-ethereum", Step #2 - "srcmap": "rev": "b62756d1a3b8b09430f5b060caa7382c8117fb90" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + coverpkg=github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + go install github.com/holiman/gofuzz-shim@latest Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.25.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 Step #3 - "compile-libfuzzer-coverage-x86_64": + repo=/root/go/src/github.com/ethereum/go-ethereum Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzAbi' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/decred/dcrd/crypto/blake256 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leanovate/gopter v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prysmaticlabs/gohashtree v0.0.1-alpha.0.20220714111606-acbb2962fb48 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dnaeon/go-vcr v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/datadriven v1.0.3-0.20230413201302-be42291fc80f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pingcap/errors v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded golang.org/x/exp v0.0.0-20230626212559-97b1e661b5df => v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=abi Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzABI/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/abi/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzABICorpus/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilEncoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEncoder/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEncoderCorpus/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzDecoder/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzDecoderCorpus/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzVmRuntime' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzVmRuntime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/runtime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzVmRuntimeCorpus/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts /root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzPrecompiledContracts' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=vm Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPrecompiledContracts/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/vm/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPrecompiledContractsCorpus/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp /root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzRlp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=types Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzRLP/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/types/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzRLPCorpus/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBlake2b' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/blake2b/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzKeystore' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPassword/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/keystore/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPasswordCorpus/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=/root/go/src/github.com/ethereum/go-ethereum/trie/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie /root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieCorpus/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie /root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzStackTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzStackTrie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzStackTrieCorpus/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_account_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzARange/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzARangeCorpus/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_storage_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzSRange/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzSRangeCorpus/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_byte_codes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzByteCodes/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzByteCodesCorpus/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_trie_nodes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrieNodes/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieNodesCorpus/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzAdd/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzAddCorpus/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMul/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMulCorpus/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Pair' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPair/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairCorpus/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTxfetcher' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/txfetcher/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1Add/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1AddCorpus/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1MultiExp/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1MultiExpCorpus/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2Add/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2AddCorpus/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2MultiExp/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2MultiExpCorpus/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPairing/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairingCorpus/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG1/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG1Corpus/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g2' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG2/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG2Corpus/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1Add/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1AddCorpus/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1MultiExp/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1MultiExpCorpus/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2Add/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2AddCorpus/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2MultiExp/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2MultiExpCorpus/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossPairing/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossPairingCorpus/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1SubgroupChecks/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1SubgroupChecksCorpus/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2SubgroupChecks/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2SubgroupChecksCorpus/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzSecp256k1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/secp256k1/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_eth_protocol_handlers' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=eth Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEthProtocolHandlers/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/eth/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEthProtocolHandlersCorpus/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: cde73eda1675: Already exists Step #4: 9ab8fa1a1224: Already exists Step #4: 7fb944c2626b: Pulling fs layer Step #4: 16b8b8e7a735: Pulling fs layer Step #4: 30ac2690114d: Pulling fs layer Step #4: 917802590ade: Pulling fs layer Step #4: 4efce3683cab: Pulling fs layer Step #4: fe71553d90ec: Pulling fs layer Step #4: c3cd171d66f5: Pulling fs layer Step #4: fbf4221b088e: Pulling fs layer Step #4: 1c62bf06aeba: Pulling fs layer Step #4: 0fed6a8e0990: Pulling fs layer Step #4: 0dcc98450cb9: Pulling fs layer Step #4: 602ff4a86beb: Pulling fs layer Step #4: 1e1d839208c0: Pulling fs layer Step #4: d4af253576e2: Pulling fs layer Step #4: 416b414939dc: Pulling fs layer Step #4: f5d61c14d73a: Pulling fs layer Step #4: 32c6b9b3a355: Pulling fs layer Step #4: 731ef4034f36: Pulling fs layer Step #4: 922b1ab1d770: Pulling fs layer Step #4: e99995572309: Pulling fs layer Step #4: 373eaec1aabb: Pulling fs layer Step #4: a868ce8f89db: Pulling fs layer Step #4: 785d944e1d0d: Pulling fs layer Step #4: 0fed6a8e0990: Waiting Step #4: 0dcc98450cb9: Waiting Step #4: 602ff4a86beb: Waiting Step #4: 1e1d839208c0: Waiting Step #4: d4af253576e2: Waiting Step #4: 416b414939dc: Waiting Step #4: f5d61c14d73a: Waiting Step #4: 32c6b9b3a355: Waiting Step #4: 917802590ade: Waiting Step #4: 731ef4034f36: Waiting Step #4: 922b1ab1d770: Waiting Step #4: 4efce3683cab: Waiting Step #4: e99995572309: Waiting Step #4: 373eaec1aabb: Waiting Step #4: c3cd171d66f5: Waiting Step #4: fe71553d90ec: Waiting Step #4: fbf4221b088e: Waiting Step #4: a868ce8f89db: Waiting Step #4: 7fb944c2626b: Verifying Checksum Step #4: 7fb944c2626b: Download complete Step #4: 30ac2690114d: Verifying Checksum Step #4: 30ac2690114d: Download complete Step #4: 16b8b8e7a735: Verifying Checksum Step #4: 16b8b8e7a735: Download complete Step #4: 7fb944c2626b: Pull complete Step #4: 4efce3683cab: Verifying Checksum Step #4: 4efce3683cab: Download complete Step #4: 917802590ade: Verifying Checksum Step #4: 917802590ade: Download complete Step #4: c3cd171d66f5: Verifying Checksum Step #4: c3cd171d66f5: Download complete Step #4: fbf4221b088e: Verifying Checksum Step #4: fbf4221b088e: Download complete Step #4: 16b8b8e7a735: Pull complete Step #4: 1c62bf06aeba: Verifying Checksum Step #4: 1c62bf06aeba: Download complete Step #4: 30ac2690114d: Pull complete Step #4: fe71553d90ec: Verifying Checksum Step #4: fe71553d90ec: Download complete Step #4: 0dcc98450cb9: Verifying Checksum Step #4: 0dcc98450cb9: Download complete Step #4: 602ff4a86beb: Verifying Checksum Step #4: 602ff4a86beb: Download complete Step #4: 917802590ade: Pull complete Step #4: 1e1d839208c0: Verifying Checksum Step #4: 1e1d839208c0: Download complete Step #4: 4efce3683cab: Pull complete Step #4: 416b414939dc: Download complete Step #4: d4af253576e2: Verifying Checksum Step #4: d4af253576e2: Download complete Step #4: 0fed6a8e0990: Verifying Checksum Step #4: 0fed6a8e0990: Download complete Step #4: 32c6b9b3a355: Verifying Checksum Step #4: 32c6b9b3a355: Download complete Step #4: 731ef4034f36: Verifying Checksum Step #4: 731ef4034f36: Download complete Step #4: 922b1ab1d770: Verifying Checksum Step #4: 922b1ab1d770: Download complete Step #4: e99995572309: Verifying Checksum Step #4: e99995572309: Download complete Step #4: a868ce8f89db: Verifying Checksum Step #4: a868ce8f89db: Download complete Step #4: 373eaec1aabb: Verifying Checksum Step #4: 373eaec1aabb: Download complete Step #4: fe71553d90ec: Pull complete Step #4: f5d61c14d73a: Verifying Checksum Step #4: f5d61c14d73a: Download complete Step #4: c3cd171d66f5: Pull complete Step #4: 785d944e1d0d: Verifying Checksum Step #4: 785d944e1d0d: Download complete Step #4: fbf4221b088e: Pull complete Step #4: 1c62bf06aeba: Pull complete Step #4: 0fed6a8e0990: Pull complete Step #4: 0dcc98450cb9: Pull complete Step #4: 602ff4a86beb: Pull complete Step #4: 1e1d839208c0: Pull complete Step #4: d4af253576e2: Pull complete Step #4: 416b414939dc: Pull complete Step #4: f5d61c14d73a: Pull complete Step #4: 32c6b9b3a355: Pull complete Step #4: 731ef4034f36: Pull complete Step #4: 922b1ab1d770: Pull complete Step #4: e99995572309: Pull complete Step #4: 373eaec1aabb: Pull complete Step #4: a868ce8f89db: Pull complete Step #4: 785d944e1d0d: Pull complete Step #4: Digest: sha256:99b75558b29c3a2b806f3264987609968656e62760b07d74a5ec6464fb47cf9a Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/04/25 06:52:51 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2025/04/25 06:52:51 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/04/25 06:52:51 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: CommandException: No URLs matched. Do the files you're operating on exist? Finished Step #9 ERROR ERROR: build step 9 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1