starting build "ceb5b28d-a4e7-47f6-acac-1f45b6427233" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 4.096kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: f06ba3345198: Pulling fs layer Step #1: 1a146d566c60: Pulling fs layer Step #1: 666eb5ae0881: Pulling fs layer Step #1: bb763e75ab4f: Pulling fs layer Step #1: 565bd8b622ec: Pulling fs layer Step #1: 702ce2a62d32: Pulling fs layer Step #1: eec7c3392301: Pulling fs layer Step #1: 2d37d40c37f7: Pulling fs layer Step #1: 5a7a8e44131f: Pulling fs layer Step #1: 8fda241ee33e: Pulling fs layer Step #1: 25b26e49495b: Pulling fs layer Step #1: 612152068444: Pulling fs layer Step #1: 307cd39f1f8f: Pulling fs layer Step #1: 5286c2eaaa94: Pulling fs layer Step #1: 8847722eba2f: Pulling fs layer Step #1: 051762b332b0: Pulling fs layer Step #1: 760ccd25a46b: Pulling fs layer Step #1: 1d839ce98b35: Pulling fs layer Step #1: 666eb5ae0881: Waiting Step #1: e28f68ceea26: Pulling fs layer Step #1: eec7c3392301: Waiting Step #1: 13ba2781559d: Pulling fs layer Step #1: bb763e75ab4f: Waiting Step #1: b86eaffb40f8: Pulling fs layer Step #1: 917a4ae8818c: Pulling fs layer Step #1: ad6301776190: Pulling fs layer Step #1: 9668886db1c2: Pulling fs layer Step #1: 64f70d385d5a: Pulling fs layer Step #1: f45acc246f04: Pulling fs layer Step #1: d87b634da0b2: Pulling fs layer Step #1: fdd98cac5eb8: Pulling fs layer Step #1: 47bb444b7e8c: Pulling fs layer Step #1: 07a7427afb62: Pulling fs layer Step #1: 2d37d40c37f7: Waiting Step #1: 13ba2781559d: Waiting Step #1: 5a7a8e44131f: Waiting Step #1: 702ce2a62d32: Waiting Step #1: f45acc246f04: Waiting Step #1: 8847722eba2f: Waiting Step #1: 64f70d385d5a: Waiting Step #1: 25b26e49495b: Waiting Step #1: 07a7427afb62: Waiting Step #1: 1d839ce98b35: Waiting Step #1: 9668886db1c2: Waiting Step #1: b86eaffb40f8: Waiting Step #1: ad6301776190: Waiting Step #1: fdd98cac5eb8: Waiting Step #1: 8fda241ee33e: Waiting Step #1: d87b634da0b2: Waiting Step #1: 565bd8b622ec: Waiting Step #1: 5286c2eaaa94: Waiting Step #1: c2ff39ab15d0: Pulling fs layer Step #1: afb986d7619c: Pulling fs layer Step #1: 58d0c61f6045: Pulling fs layer Step #1: 631fabcf7a5b: Pulling fs layer Step #1: 504725fc4167: Pulling fs layer Step #1: 83bbfd99d078: Pulling fs layer Step #1: c2ff39ab15d0: Waiting Step #1: 58d0c61f6045: Waiting Step #1: 631fabcf7a5b: Waiting Step #1: afb986d7619c: Waiting Step #1: 504725fc4167: Waiting Step #1: 1a146d566c60: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: bb763e75ab4f: Verifying Checksum Step #1: bb763e75ab4f: Download complete Step #1: 666eb5ae0881: Verifying Checksum Step #1: 666eb5ae0881: Download complete Step #1: 565bd8b622ec: Verifying Checksum Step #1: 565bd8b622ec: Download complete Step #1: eec7c3392301: Verifying Checksum Step #1: eec7c3392301: Download complete Step #1: 2d37d40c37f7: Verifying Checksum Step #1: 2d37d40c37f7: Download complete Step #1: f06ba3345198: Verifying Checksum Step #1: f06ba3345198: Download complete Step #1: 8fda241ee33e: Verifying Checksum Step #1: 8fda241ee33e: Download complete Step #1: b549f31133a9: Pull complete Step #1: 25b26e49495b: Verifying Checksum Step #1: 25b26e49495b: Download complete Step #1: 612152068444: Download complete Step #1: 307cd39f1f8f: Verifying Checksum Step #1: 307cd39f1f8f: Download complete Step #1: 5286c2eaaa94: Verifying Checksum Step #1: 5286c2eaaa94: Download complete Step #1: 8847722eba2f: Verifying Checksum Step #1: 8847722eba2f: Download complete Step #1: 051762b332b0: Verifying Checksum Step #1: 051762b332b0: Download complete Step #1: 5a7a8e44131f: Verifying Checksum Step #1: 5a7a8e44131f: Download complete Step #1: 760ccd25a46b: Verifying Checksum Step #1: 760ccd25a46b: Download complete Step #1: 1d839ce98b35: Verifying Checksum Step #1: 1d839ce98b35: Download complete Step #1: e28f68ceea26: Verifying Checksum Step #1: e28f68ceea26: Download complete Step #1: 13ba2781559d: Verifying Checksum Step #1: 13ba2781559d: Download complete Step #1: b86eaffb40f8: Verifying Checksum Step #1: b86eaffb40f8: Download complete Step #1: ad6301776190: Verifying Checksum Step #1: ad6301776190: Download complete Step #1: 917a4ae8818c: Verifying Checksum Step #1: 917a4ae8818c: Download complete Step #1: 9668886db1c2: Verifying Checksum Step #1: 9668886db1c2: Download complete Step #1: 64f70d385d5a: Verifying Checksum Step #1: 64f70d385d5a: Download complete Step #1: f45acc246f04: Verifying Checksum Step #1: f45acc246f04: Download complete Step #1: 702ce2a62d32: Verifying Checksum Step #1: 702ce2a62d32: Download complete Step #1: d87b634da0b2: Verifying Checksum Step #1: d87b634da0b2: Download complete Step #1: fdd98cac5eb8: Verifying Checksum Step #1: fdd98cac5eb8: Download complete Step #1: 07a7427afb62: Download complete Step #1: 47bb444b7e8c: Verifying Checksum Step #1: 47bb444b7e8c: Download complete Step #1: c2ff39ab15d0: Download complete Step #1: afb986d7619c: Verifying Checksum Step #1: afb986d7619c: Download complete Step #1: 58d0c61f6045: Download complete Step #1: 631fabcf7a5b: Download complete Step #1: 83bbfd99d078: Download complete Step #1: f06ba3345198: Pull complete Step #1: 1a146d566c60: Pull complete Step #1: 504725fc4167: Verifying Checksum Step #1: 504725fc4167: Download complete Step #1: 666eb5ae0881: Pull complete Step #1: bb763e75ab4f: Pull complete Step #1: 565bd8b622ec: Pull complete Step #1: 702ce2a62d32: Pull complete Step #1: eec7c3392301: Pull complete Step #1: 2d37d40c37f7: Pull complete Step #1: 5a7a8e44131f: Pull complete Step #1: 8fda241ee33e: Pull complete Step #1: 25b26e49495b: Pull complete Step #1: 612152068444: Pull complete Step #1: 307cd39f1f8f: Pull complete Step #1: 5286c2eaaa94: Pull complete Step #1: 8847722eba2f: Pull complete Step #1: 051762b332b0: Pull complete Step #1: 760ccd25a46b: Pull complete Step #1: 1d839ce98b35: Pull complete Step #1: e28f68ceea26: Pull complete Step #1: 13ba2781559d: Pull complete Step #1: b86eaffb40f8: Pull complete Step #1: 917a4ae8818c: Pull complete Step #1: ad6301776190: Pull complete Step #1: 9668886db1c2: Pull complete Step #1: 64f70d385d5a: Pull complete Step #1: f45acc246f04: Pull complete Step #1: d87b634da0b2: Pull complete Step #1: fdd98cac5eb8: Pull complete Step #1: 47bb444b7e8c: Pull complete Step #1: 07a7427afb62: Pull complete Step #1: c2ff39ab15d0: Pull complete Step #1: afb986d7619c: Pull complete Step #1: 58d0c61f6045: Pull complete Step #1: 631fabcf7a5b: Pull complete Step #1: 504725fc4167: Pull complete Step #1: 83bbfd99d078: Pull complete Step #1: Digest: sha256:98616f371934cbdd901131b29a36cd636ddcd407aa622d9a29bd96f1d2631630 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 3e5bf6bb3e5b Step #1: Step 2/5 : RUN git clone --single-branch --depth=1 https://github.com/ethereum/go-ethereum $GOPATH/src/github.com/ethereum/go-ethereum Step #1: ---> Running in 55e2918bd831 Step #1: Cloning into '/root/go/src/github.com/ethereum/go-ethereum'... Step #1: Removing intermediate container 55e2918bd831 Step #1: ---> 6e1c6525c798 Step #1: Step 3/5 : RUN (cd $GOPATH/src/github.com/ethereum/go-ethereum && go mod download) Step #1: ---> Running in 472577f3afed Step #1: Removing intermediate container 472577f3afed Step #1: ---> f072cab9a8d2 Step #1: Step 4/5 : RUN cp $GOPATH/src/github.com/ethereum/go-ethereum/oss-fuzz.sh $SRC/build.sh Step #1: ---> Running in 399581a99dc3 Step #1: Removing intermediate container 399581a99dc3 Step #1: ---> f2f718e1a43c Step #1: Step 5/5 : WORKDIR $SRC/ Step #1: ---> Running in 1fd7d6abe930 Step #1: Removing intermediate container 1fd7d6abe930 Step #1: ---> 789783fbdbdc Step #1: Successfully built 789783fbdbdc Step #1: Successfully tagged gcr.io/oss-fuzz/go-ethereum:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-ethereum Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileXMBHmO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/ethereum/go-ethereum/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": + cd /root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=68de26e34649e50c1f8f8a858a686c38274848b6 Step #2 - "srcmap": + jq_inplace /tmp/fileXMBHmO '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "68de26e34649e50c1f8f8a858a686c38274848b6" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileo33qBc Step #2 - "srcmap": + cat /tmp/fileXMBHmO Step #2 - "srcmap": + jq '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "68de26e34649e50c1f8f8a858a686c38274848b6" }' Step #2 - "srcmap": + mv /tmp/fileo33qBc /tmp/fileXMBHmO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileXMBHmO Step #2 - "srcmap": + rm /tmp/fileXMBHmO Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/ethereum/go-ethereum": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ethereum/go-ethereum", Step #2 - "srcmap": "rev": "68de26e34649e50c1f8f8a858a686c38274848b6" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + coverpkg=github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + go install github.com/holiman/gofuzz-shim@latest Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": + repo=/root/go/src/github.com/ethereum/go-ethereum Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzAbi' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/decred/dcrd/crypto/blake256 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leanovate/gopter v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prysmaticlabs/gohashtree v0.0.1-alpha.0.20220714111606-acbb2962fb48 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dnaeon/go-vcr v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/datadriven v1.0.3-0.20230413201302-be42291fc80f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pingcap/errors v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=abi Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzABI/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/abi/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzABICorpus/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilEncoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEncoder/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEncoderCorpus/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzDecoder/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzDecoderCorpus/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzVmRuntime' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzVmRuntime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/runtime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzVmRuntimeCorpus/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts /root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzPrecompiledContracts' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=vm Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPrecompiledContracts/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/vm/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPrecompiledContractsCorpus/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp /root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzRlp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=types Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzRLP/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/types/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzRLPCorpus/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBlake2b' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/blake2b/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzKeystore' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPassword/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/keystore/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPasswordCorpus/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=/root/go/src/github.com/ethereum/go-ethereum/trie/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie /root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieCorpus/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie /root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzStackTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzStackTrie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzStackTrieCorpus/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_account_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzARange/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzARangeCorpus/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_storage_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzSRange/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzSRangeCorpus/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_byte_codes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzByteCodes/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzByteCodesCorpus/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_trie_nodes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrieNodes/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieNodesCorpus/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzAdd/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzAddCorpus/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMul/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMulCorpus/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Pair' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPair/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairCorpus/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTxfetcher' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/txfetcher/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1Add/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1AddCorpus/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Mul fuzz_cross_g1_mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Mul fuzz_cross_g1_mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1Mul/ ./fuzzcrossg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1MulCorpus/ ./fuzzcrossg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Mul fuzz_g1_mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Mul fuzz_g1_mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1Mul/ ./fuzzg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1MulCorpus/ ./fuzzg1mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1MultiExp/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1MultiExpCorpus/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2Add/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2AddCorpus/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Mul fuzz_cross_g2_mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Mul fuzz_cross_g2_mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2Mul/ ./fuzzcrossg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2MulCorpus/ ./fuzzcrossg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Mul fuzz_g2_mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Mul fuzz_g2_mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2Mul/ ./fuzzg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2MulCorpus/ ./fuzzg2mul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2MultiExp/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2MultiExpCorpus/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPairing/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairingCorpus/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG1/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG1Corpus/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g2' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG2/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG2Corpus/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1Add/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1AddCorpus/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1MultiExp/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1MultiExpCorpus/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2Add/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2AddCorpus/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2MultiExp/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2MultiExpCorpus/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossPairing/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossPairingCorpus/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1SubgroupChecks/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1SubgroupChecksCorpus/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2SubgroupChecks/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2SubgroupChecksCorpus/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzSecp256k1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/secp256k1/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_eth_protocol_handlers' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=eth Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEthProtocolHandlers/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/eth/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEthProtocolHandlersCorpus/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f06ba3345198: Already exists Step #4: 1a146d566c60: Already exists Step #4: 2c421456df1a: Pulling fs layer Step #4: 8e924a918fff: Pulling fs layer Step #4: 4ea2384aac43: Pulling fs layer Step #4: bef7147026a0: Pulling fs layer Step #4: 54fb50ba92dd: Pulling fs layer Step #4: 6fb92c94b5d3: Pulling fs layer Step #4: c9f60ffe68c0: Pulling fs layer Step #4: 100d7cf57629: Pulling fs layer Step #4: 1a83206d2d1c: Pulling fs layer Step #4: e5d8778831d6: Pulling fs layer Step #4: 68f10ea3013a: Pulling fs layer Step #4: faa35af98e5c: Pulling fs layer Step #4: 096c49e8f26a: Pulling fs layer Step #4: 07c8ea65aaed: Pulling fs layer Step #4: a2bc2be0a268: Pulling fs layer Step #4: ec057e3020b8: Pulling fs layer Step #4: 17c5bd96c4bc: Pulling fs layer Step #4: 83afd773a2a0: Pulling fs layer Step #4: a88e548936d1: Pulling fs layer Step #4: 16a7fba8bcdc: Pulling fs layer Step #4: 445a0c8d24d9: Pulling fs layer Step #4: d1515fcfffce: Pulling fs layer Step #4: c86f26bdf26e: Pulling fs layer Step #4: bef7147026a0: Waiting Step #4: 07c8ea65aaed: Waiting Step #4: a2bc2be0a268: Waiting Step #4: 54fb50ba92dd: Waiting Step #4: ec057e3020b8: Waiting Step #4: 17c5bd96c4bc: Waiting Step #4: a88e548936d1: Waiting Step #4: 6fb92c94b5d3: Waiting Step #4: c9f60ffe68c0: Waiting Step #4: 1a83206d2d1c: Waiting Step #4: 100d7cf57629: Waiting Step #4: e5d8778831d6: Waiting Step #4: d1515fcfffce: Waiting Step #4: 68f10ea3013a: Waiting Step #4: 16a7fba8bcdc: Waiting Step #4: 445a0c8d24d9: Waiting Step #4: faa35af98e5c: Waiting Step #4: 4ea2384aac43: Verifying Checksum Step #4: 4ea2384aac43: Download complete Step #4: 2c421456df1a: Download complete Step #4: 8e924a918fff: Verifying Checksum Step #4: 8e924a918fff: Download complete Step #4: 54fb50ba92dd: Verifying Checksum Step #4: 54fb50ba92dd: Download complete Step #4: 2c421456df1a: Pull complete Step #4: bef7147026a0: Verifying Checksum Step #4: bef7147026a0: Download complete Step #4: c9f60ffe68c0: Download complete Step #4: 100d7cf57629: Verifying Checksum Step #4: 100d7cf57629: Download complete Step #4: 1a83206d2d1c: Verifying Checksum Step #4: 1a83206d2d1c: Download complete Step #4: 8e924a918fff: Pull complete Step #4: 68f10ea3013a: Verifying Checksum Step #4: 68f10ea3013a: Download complete Step #4: 4ea2384aac43: Pull complete Step #4: 6fb92c94b5d3: Verifying Checksum Step #4: 6fb92c94b5d3: Download complete Step #4: faa35af98e5c: Verifying Checksum Step #4: faa35af98e5c: Download complete Step #4: 096c49e8f26a: Download complete Step #4: bef7147026a0: Pull complete Step #4: 54fb50ba92dd: Pull complete Step #4: a2bc2be0a268: Download complete Step #4: 07c8ea65aaed: Verifying Checksum Step #4: 07c8ea65aaed: Download complete Step #4: e5d8778831d6: Verifying Checksum Step #4: e5d8778831d6: Download complete Step #4: 17c5bd96c4bc: Verifying Checksum Step #4: 17c5bd96c4bc: Download complete Step #4: 83afd773a2a0: Verifying Checksum Step #4: 83afd773a2a0: Download complete Step #4: 16a7fba8bcdc: Verifying Checksum Step #4: 16a7fba8bcdc: Download complete Step #4: a88e548936d1: Verifying Checksum Step #4: a88e548936d1: Download complete Step #4: d1515fcfffce: Download complete Step #4: 445a0c8d24d9: Verifying Checksum Step #4: 445a0c8d24d9: Download complete Step #4: c86f26bdf26e: Verifying Checksum Step #4: c86f26bdf26e: Download complete Step #4: ec057e3020b8: Verifying Checksum Step #4: ec057e3020b8: Download complete Step #4: 6fb92c94b5d3: Pull complete Step #4: c9f60ffe68c0: Pull complete Step #4: 100d7cf57629: Pull complete Step #4: 1a83206d2d1c: Pull complete Step #4: e5d8778831d6: Pull complete Step #4: 68f10ea3013a: Pull complete Step #4: faa35af98e5c: Pull complete Step #4: 096c49e8f26a: Pull complete Step #4: 07c8ea65aaed: Pull complete Step #4: a2bc2be0a268: Pull complete Step #4: ec057e3020b8: Pull complete Step #4: 17c5bd96c4bc: Pull complete Step #4: 83afd773a2a0: Pull complete Step #4: a88e548936d1: Pull complete Step #4: 16a7fba8bcdc: Pull complete Step #4: 445a0c8d24d9: Pull complete Step #4: d1515fcfffce: Pull complete Step #4: c86f26bdf26e: Pull complete Step #4: Digest: sha256:e3b969e1aecb511ef0f90aaf733547de49ff8bef30316eb7361f89938a7876d9 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/02/16 06:09:56 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2025/02/16 06:09:56 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/02/16 06:09:56 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: CommandException: No URLs matched. Do the files you're operating on exist? Finished Step #9 ERROR ERROR: build step 9 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1