starting build "ad50c50c-0135-4479-8895-161d3479b106" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743" Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Sending build context to Docker daemon 4.096kB Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b549f31133a9: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b954c5d6182: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 42697d346cd9: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5b19aac274d4: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b6999eff076d: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 238a665da098: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4f46d5590e24: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": cd2b4c9da7fd: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": d808497c1dbf: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5896cc6581b6: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a142c85897f9: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 21e67379fcf0: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": da02b2034e8d: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": c93cbaef1fbb: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b9f7a3d1124: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f9f64acbb284: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 923220995acc: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": eee4c2054a82: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ca686f029ae6: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 352854b41c7f: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4f46d5590e24: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": fdb016024c59: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a6a68ef1e3a5: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": cd2b4c9da7fd: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b8c729f4a0da: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5c74af6d0a68: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": d808497c1dbf: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dbbe6f0a4b88: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0752dfadb35a: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a142c85897f9: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f1d7e23a64f2: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5896cc6581b6: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dc3e4ad9f9ca: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 21e67379fcf0: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": da02b2034e8d: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4c3a0eae4060: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 1478f6795730: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 30cbb873dae5: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": c93cbaef1fbb: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f9f64acbb284: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": bb8628f7ef74: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b9f7a3d1124: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 923220995acc: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4ea1d2f93bf5: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 04aff6b4b34c: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0d19f32fc376: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a6a68ef1e3a5: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5b19aac274d4: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 989666b15241: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b8c729f4a0da: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": eee4c2054a82: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b6999eff076d: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5c74af6d0a68: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 67c526b96287: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 238a665da098: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f7f42c5ecb02: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7649df07cef5: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": baf75b2ea6d2: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 675fce1a7f17: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": e1be22dbee6e: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5219ed66bffc: Pulling fs layer Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": bb8628f7ef74: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": fdb016024c59: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4ea1d2f93bf5: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dbbe6f0a4b88: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 04aff6b4b34c: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0d19f32fc376: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f1d7e23a64f2: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": baf75b2ea6d2: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dc3e4ad9f9ca: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 675fce1a7f17: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": e1be22dbee6e: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4c3a0eae4060: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0752dfadb35a: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5219ed66bffc: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 1478f6795730: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ca686f029ae6: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 30cbb873dae5: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 352854b41c7f: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 989666b15241: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7649df07cef5: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f7f42c5ecb02: Waiting Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 42697d346cd9: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b549f31133a9: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b549f31133a9: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b6999eff076d: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b6999eff076d: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5b19aac274d4: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5b19aac274d4: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 238a665da098: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": cd2b4c9da7fd: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": cd2b4c9da7fd: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b954c5d6182: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b954c5d6182: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": d808497c1dbf: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": d808497c1dbf: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b549f31133a9: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a142c85897f9: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a142c85897f9: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 21e67379fcf0: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 21e67379fcf0: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": da02b2034e8d: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": c93cbaef1fbb: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": c93cbaef1fbb: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b9f7a3d1124: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b9f7a3d1124: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5896cc6581b6: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5896cc6581b6: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f9f64acbb284: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 923220995acc: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 923220995acc: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": eee4c2054a82: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": eee4c2054a82: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ca686f029ae6: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ca686f029ae6: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 352854b41c7f: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 352854b41c7f: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a6a68ef1e3a5: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a6a68ef1e3a5: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": fdb016024c59: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": fdb016024c59: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5c74af6d0a68: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b8c729f4a0da: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b8c729f4a0da: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4f46d5590e24: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4f46d5590e24: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dbbe6f0a4b88: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dbbe6f0a4b88: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0752dfadb35a: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f1d7e23a64f2: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4c3a0eae4060: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4c3a0eae4060: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dc3e4ad9f9ca: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dc3e4ad9f9ca: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 1478f6795730: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 1478f6795730: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 30cbb873dae5: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 30cbb873dae5: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": bb8628f7ef74: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4ea1d2f93bf5: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4ea1d2f93bf5: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b954c5d6182: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 04aff6b4b34c: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0d19f32fc376: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0d19f32fc376: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 989666b15241: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 989666b15241: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 42697d346cd9: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7649df07cef5: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7649df07cef5: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f7f42c5ecb02: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f7f42c5ecb02: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 67c526b96287: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 67c526b96287: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": baf75b2ea6d2: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": baf75b2ea6d2: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 675fce1a7f17: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5b19aac274d4: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b6999eff076d: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 238a665da098: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": e1be22dbee6e: Verifying Checksum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": e1be22dbee6e: Download complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4f46d5590e24: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": cd2b4c9da7fd: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": d808497c1dbf: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5896cc6581b6: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a142c85897f9: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 21e67379fcf0: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": da02b2034e8d: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": c93cbaef1fbb: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7b9f7a3d1124: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f9f64acbb284: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 923220995acc: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": eee4c2054a82: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ca686f029ae6: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 352854b41c7f: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": fdb016024c59: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": a6a68ef1e3a5: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": b8c729f4a0da: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5c74af6d0a68: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dbbe6f0a4b88: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0752dfadb35a: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f1d7e23a64f2: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": dc3e4ad9f9ca: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4c3a0eae4060: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 1478f6795730: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 30cbb873dae5: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": bb8628f7ef74: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 4ea1d2f93bf5: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 04aff6b4b34c: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 0d19f32fc376: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 989666b15241: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 67c526b96287: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": f7f42c5ecb02: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 7649df07cef5: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": baf75b2ea6d2: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 675fce1a7f17: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": e1be22dbee6e: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": 5219ed66bffc: Pull complete Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Digest: sha256:1fcebfcf4b57873ee46ad8e1bffc81de3972534a933fd5a7a45852cc6f008975 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> 41f7fd4bd58d Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Step 2/5 : RUN git clone --single-branch --depth=1 https://github.com/ethereum/go-ethereum $GOPATH/src/github.com/ethereum/go-ethereum Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> Running in bf89fe4e4c89 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Cloning into '/root/go/src/github.com/ethereum/go-ethereum'... Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Removing intermediate container bf89fe4e4c89 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> 6050a75a57fd Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Step 3/5 : RUN (cd $GOPATH/src/github.com/ethereum/go-ethereum && go mod download) Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> Running in 62328546223a Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Removing intermediate container 62328546223a Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> a59ce9884daa Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Step 4/5 : RUN cp $GOPATH/src/github.com/ethereum/go-ethereum/oss-fuzz.sh $SRC/build.sh Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> Running in a6564ada36f9 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Removing intermediate container a6564ada36f9 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> 3b3dae8f9ae1 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Step 5/5 : WORKDIR $SRC/ Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> Running in db39b5896ec0 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Removing intermediate container db39b5896ec0 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": ---> 10e2891d6c10 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Successfully built 10e2891d6c10 Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Successfully tagged gcr.io/oss-fuzz/go-ethereum:latest Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/go-ethereum:latest Finished Step #1 - "build-85f9dce3-b156-4ea5-95d7-629af842c743" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-ethereum Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file4bpbCN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/ethereum/go-ethereum/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": + cd /root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=0d5de826da144cef795542a3489f899f49dee1e8 Step #2 - "srcmap": + jq_inplace /tmp/file4bpbCN '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "0d5de826da144cef795542a3489f899f49dee1e8" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filejl7I6a Step #2 - "srcmap": + cat /tmp/file4bpbCN Step #2 - "srcmap": + jq '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "0d5de826da144cef795542a3489f899f49dee1e8" }' Step #2 - "srcmap": + mv /tmp/filejl7I6a /tmp/file4bpbCN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file4bpbCN Step #2 - "srcmap": + rm /tmp/file4bpbCN Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/ethereum/go-ethereum": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ethereum/go-ethereum", Step #2 - "srcmap": "rev": "0d5de826da144cef795542a3489f899f49dee1e8" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + coverpkg=github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + go install github.com/holiman/gofuzz-shim@latest Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.25.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 Step #3 - "compile-libfuzzer-coverage-x86_64": + repo=/root/go/src/github.com/ethereum/go-ethereum Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzAbi' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/decred/dcrd/crypto/blake256 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leanovate/gopter v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prysmaticlabs/gohashtree v0.0.1-alpha.0.20220714111606-acbb2962fb48 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dnaeon/go-vcr v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/datadriven v1.0.3-0.20230413201302-be42291fc80f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pingcap/errors v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded golang.org/x/exp v0.0.0-20230626212559-97b1e661b5df => v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=abi Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzABI/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/abi/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzABICorpus/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilEncoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEncoder/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEncoderCorpus/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzDecoder/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzDecoderCorpus/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzVmRuntime' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzVmRuntime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/runtime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzVmRuntimeCorpus/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts /root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzPrecompiledContracts' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=vm Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPrecompiledContracts/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/vm/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPrecompiledContractsCorpus/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp /root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzRlp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=types Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzRLP/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/types/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzRLPCorpus/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBlake2b' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/blake2b/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzKeystore' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPassword/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/keystore/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPasswordCorpus/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=/root/go/src/github.com/ethereum/go-ethereum/trie/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie /root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieCorpus/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie /root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzStackTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzStackTrie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzStackTrieCorpus/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_account_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzARange/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzARangeCorpus/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_storage_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzSRange/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzSRangeCorpus/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_byte_codes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzByteCodes/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzByteCodesCorpus/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_trie_nodes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrieNodes/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieNodesCorpus/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzAdd/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzAddCorpus/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMul/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMulCorpus/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Pair' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPair/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairCorpus/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTxfetcher' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/txfetcher/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1Add/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1AddCorpus/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1MultiExp/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1MultiExpCorpus/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2Add/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2AddCorpus/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2MultiExp/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2MultiExpCorpus/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPairing/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairingCorpus/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG1/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG1Corpus/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g2' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG2/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG2Corpus/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1Add/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1AddCorpus/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1MultiExp/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1MultiExpCorpus/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2Add/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2AddCorpus/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2MultiExp/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2MultiExpCorpus/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossPairing/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossPairingCorpus/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1SubgroupChecks/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1SubgroupChecksCorpus/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2SubgroupChecks/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2SubgroupChecksCorpus/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzSecp256k1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/secp256k1/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_eth_protocol_handlers' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=eth Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEthProtocolHandlers/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/eth/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEthProtocolHandlersCorpus/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 7b954c5d6182: Already exists Step #4: 42697d346cd9: Already exists Step #4: 09f77b3bad54: Pulling fs layer Step #4: 5d92ce38937d: Pulling fs layer Step #4: 971e09a4a99a: Pulling fs layer Step #4: a3be303a7a23: Pulling fs layer Step #4: 29f9e5c9e821: Pulling fs layer Step #4: 3c23c5d6256f: Pulling fs layer Step #4: 964dd7552db2: Pulling fs layer Step #4: 325a1ce7fc52: Pulling fs layer Step #4: ea4bf89a09a5: Pulling fs layer Step #4: eebd7cefcdb0: Pulling fs layer Step #4: 4aaef292ee4a: Pulling fs layer Step #4: 9595f85751c3: Pulling fs layer Step #4: 89fc4dc16b08: Pulling fs layer Step #4: 267fec2025d2: Pulling fs layer Step #4: 366211f092ab: Pulling fs layer Step #4: c6dfd4a7ded3: Pulling fs layer Step #4: 9f882fe06bac: Pulling fs layer Step #4: 00beec93eae6: Pulling fs layer Step #4: 69cb1222c609: Pulling fs layer Step #4: f9a64467344b: Pulling fs layer Step #4: 488a80725a27: Pulling fs layer Step #4: 5a5751d3dcf8: Pulling fs layer Step #4: 31d07bbf8abb: Pulling fs layer Step #4: 325a1ce7fc52: Waiting Step #4: ea4bf89a09a5: Waiting Step #4: eebd7cefcdb0: Waiting Step #4: 4aaef292ee4a: Waiting Step #4: a3be303a7a23: Waiting Step #4: 9595f85751c3: Waiting Step #4: 29f9e5c9e821: Waiting Step #4: 89fc4dc16b08: Waiting Step #4: 267fec2025d2: Waiting Step #4: 366211f092ab: Waiting Step #4: c6dfd4a7ded3: Waiting Step #4: 9f882fe06bac: Waiting Step #4: 00beec93eae6: Waiting Step #4: 69cb1222c609: Waiting Step #4: f9a64467344b: Waiting Step #4: 488a80725a27: Waiting Step #4: 5a5751d3dcf8: Waiting Step #4: 31d07bbf8abb: Waiting Step #4: 964dd7552db2: Waiting Step #4: 3c23c5d6256f: Waiting Step #4: 09f77b3bad54: Verifying Checksum Step #4: 09f77b3bad54: Download complete Step #4: 971e09a4a99a: Verifying Checksum Step #4: 971e09a4a99a: Download complete Step #4: 5d92ce38937d: Verifying Checksum Step #4: 5d92ce38937d: Download complete Step #4: 09f77b3bad54: Pull complete Step #4: 29f9e5c9e821: Verifying Checksum Step #4: 29f9e5c9e821: Download complete Step #4: a3be303a7a23: Verifying Checksum Step #4: a3be303a7a23: Download complete Step #4: 964dd7552db2: Download complete Step #4: 325a1ce7fc52: Verifying Checksum Step #4: 325a1ce7fc52: Download complete Step #4: 5d92ce38937d: Pull complete Step #4: ea4bf89a09a5: Download complete Step #4: 971e09a4a99a: Pull complete Step #4: 3c23c5d6256f: Verifying Checksum Step #4: 3c23c5d6256f: Download complete Step #4: 4aaef292ee4a: Verifying Checksum Step #4: 4aaef292ee4a: Download complete Step #4: a3be303a7a23: Pull complete Step #4: 9595f85751c3: Verifying Checksum Step #4: 9595f85751c3: Download complete Step #4: 29f9e5c9e821: Pull complete Step #4: 89fc4dc16b08: Verifying Checksum Step #4: 89fc4dc16b08: Download complete Step #4: 366211f092ab: Verifying Checksum Step #4: 366211f092ab: Download complete Step #4: eebd7cefcdb0: Verifying Checksum Step #4: eebd7cefcdb0: Download complete Step #4: 267fec2025d2: Verifying Checksum Step #4: 267fec2025d2: Download complete Step #4: 9f882fe06bac: Verifying Checksum Step #4: 9f882fe06bac: Download complete Step #4: 00beec93eae6: Verifying Checksum Step #4: 00beec93eae6: Download complete Step #4: 69cb1222c609: Download complete Step #4: 3c23c5d6256f: Pull complete Step #4: 488a80725a27: Verifying Checksum Step #4: 488a80725a27: Download complete Step #4: 964dd7552db2: Pull complete Step #4: f9a64467344b: Verifying Checksum Step #4: f9a64467344b: Download complete Step #4: 325a1ce7fc52: Pull complete Step #4: c6dfd4a7ded3: Verifying Checksum Step #4: c6dfd4a7ded3: Download complete Step #4: 5a5751d3dcf8: Download complete Step #4: ea4bf89a09a5: Pull complete Step #4: 31d07bbf8abb: Verifying Checksum Step #4: 31d07bbf8abb: Download complete Step #4: eebd7cefcdb0: Pull complete Step #4: 4aaef292ee4a: Pull complete Step #4: 9595f85751c3: Pull complete Step #4: 89fc4dc16b08: Pull complete Step #4: 267fec2025d2: Pull complete Step #4: 366211f092ab: Pull complete Step #4: c6dfd4a7ded3: Pull complete Step #4: 9f882fe06bac: Pull complete Step #4: 00beec93eae6: Pull complete Step #4: 69cb1222c609: Pull complete Step #4: f9a64467344b: Pull complete Step #4: 488a80725a27: Pull complete Step #4: 5a5751d3dcf8: Pull complete Step #4: 31d07bbf8abb: Pull complete Step #4: Digest: sha256:629a4ee90356753711fb3d27424bb77fd58375f74b0910eaf6d1783d7c0a1c81 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/05/08 06:44:18 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2025/05/08 06:44:18 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/05/08 06:44:18 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: CommandException: No URLs matched. Do the files you're operating on exist? Finished Step #9 ERROR ERROR: build step 9 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1