starting build "fabe4049-0e42-4c9b-afe5-84267009aa4c" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400" Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Sending build context to Docker daemon 4.096kB Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b549f31133a9: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 008b78875541: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 928200867a41: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 27b7a26b85d4: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a5e1771809e3: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 70f394e24d88: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 97282320daea: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 084e0bb7df2e: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 5c5100cceda4: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 821b83b191f6: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d81097e72e7d: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 803044b7ee78: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 691ebee164a5: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 60571253bd26: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f00f7198f32e: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 7053b8449387: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": aafc0234d757: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": cec7ed9d0583: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6eefca9e564c: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c928f0812557: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518b6ac13880: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518cb7ba5e44: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 285afb20e2bf: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a757778216ab: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6391c2b1d795: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 842cf51c9a6b: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 2fe8e3b03c01: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 49d5be5f779c: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": fb0270479a6d: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c1e518b6d49d: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d6363374623a: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c54e66c7917f: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 17a7c59b458e: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 8d71bc11c21d: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ef81f2346731: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f6feba9aabba: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 35e8dab17623: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d91eb602c335: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 5c5100cceda4: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 821b83b191f6: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b9e2e8d9e42b: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d81097e72e7d: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 803044b7ee78: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b446bfd6d011: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": cec7ed9d0583: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6eefca9e564c: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 50392ea4ebac: Pulling fs layer Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c928f0812557: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 691ebee164a5: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c54e66c7917f: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 60571253bd26: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 7053b8449387: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 17a7c59b458e: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": aafc0234d757: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518b6ac13880: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f00f7198f32e: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 8d71bc11c21d: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518cb7ba5e44: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ef81f2346731: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f6feba9aabba: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 285afb20e2bf: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a757778216ab: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b446bfd6d011: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6391c2b1d795: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 50392ea4ebac: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 35e8dab17623: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 842cf51c9a6b: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 49d5be5f779c: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d91eb602c335: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": fb0270479a6d: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b9e2e8d9e42b: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 97282320daea: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 084e0bb7df2e: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c1e518b6d49d: Waiting Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 928200867a41: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a5e1771809e3: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 97282320daea: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 97282320daea: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b549f31133a9: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b549f31133a9: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 084e0bb7df2e: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 084e0bb7df2e: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 27b7a26b85d4: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 27b7a26b85d4: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d81097e72e7d: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d81097e72e7d: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 803044b7ee78: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 803044b7ee78: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 60571253bd26: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 60571253bd26: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 691ebee164a5: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 691ebee164a5: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f00f7198f32e: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f00f7198f32e: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 7053b8449387: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 008b78875541: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 008b78875541: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 821b83b191f6: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 821b83b191f6: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": cec7ed9d0583: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": cec7ed9d0583: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": aafc0234d757: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": aafc0234d757: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c928f0812557: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c928f0812557: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518b6ac13880: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518b6ac13880: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518cb7ba5e44: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518cb7ba5e44: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a757778216ab: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a757778216ab: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 285afb20e2bf: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 285afb20e2bf: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6391c2b1d795: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6391c2b1d795: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 842cf51c9a6b: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b549f31133a9: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 2fe8e3b03c01: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 2fe8e3b03c01: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 49d5be5f779c: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 49d5be5f779c: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": fb0270479a6d: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": fb0270479a6d: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c1e518b6d49d: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c1e518b6d49d: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d6363374623a: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c54e66c7917f: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c54e66c7917f: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 17a7c59b458e: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f6feba9aabba: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 8d71bc11c21d: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 8d71bc11c21d: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 5c5100cceda4: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 5c5100cceda4: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ef81f2346731: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 50392ea4ebac: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 50392ea4ebac: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 35e8dab17623: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 35e8dab17623: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d91eb602c335: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d91eb602c335: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 70f394e24d88: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 70f394e24d88: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b446bfd6d011: Verifying Checksum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b446bfd6d011: Download complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 008b78875541: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 928200867a41: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 27b7a26b85d4: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a5e1771809e3: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 70f394e24d88: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 97282320daea: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 084e0bb7df2e: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 5c5100cceda4: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 821b83b191f6: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d81097e72e7d: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 803044b7ee78: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 691ebee164a5: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 60571253bd26: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f00f7198f32e: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 7053b8449387: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": aafc0234d757: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": cec7ed9d0583: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6eefca9e564c: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c928f0812557: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518b6ac13880: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 518cb7ba5e44: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 285afb20e2bf: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": a757778216ab: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 6391c2b1d795: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 842cf51c9a6b: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 2fe8e3b03c01: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 49d5be5f779c: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": fb0270479a6d: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c1e518b6d49d: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d6363374623a: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": c54e66c7917f: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 17a7c59b458e: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 8d71bc11c21d: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ef81f2346731: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": f6feba9aabba: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 35e8dab17623: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": d91eb602c335: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b9e2e8d9e42b: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": b446bfd6d011: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": 50392ea4ebac: Pull complete Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Digest: sha256:ea86a586d4df0bf148a6d399ba2e5acba3cc4780aef5174fea1eb6f3881848ff Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> 27f534b05774 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Step 2/5 : RUN git clone --single-branch --depth=1 https://github.com/ethereum/go-ethereum $GOPATH/src/github.com/ethereum/go-ethereum Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> Running in 67464154fdd2 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Cloning into '/root/go/src/github.com/ethereum/go-ethereum'... Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Removing intermediate container 67464154fdd2 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> 2716b8f8bcd2 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Step 3/5 : RUN (cd $GOPATH/src/github.com/ethereum/go-ethereum && go mod download) Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> Running in d3d87b39c5da Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Removing intermediate container d3d87b39c5da Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> 14d270edc5c7 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Step 4/5 : RUN cp $GOPATH/src/github.com/ethereum/go-ethereum/oss-fuzz.sh $SRC/build.sh Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> Running in 150cc2008f50 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Removing intermediate container 150cc2008f50 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> 47be41779352 Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Step 5/5 : WORKDIR $SRC/ Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> Running in 15f3e0f4c5ed Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Removing intermediate container 15f3e0f4c5ed Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": ---> 58ffc2783bbe Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Successfully built 58ffc2783bbe Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Successfully tagged gcr.io/oss-fuzz/go-ethereum:latest Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/go-ethereum:latest Finished Step #1 - "build-21a054f7-7816-40d9-bb15-e496f5f3c400" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-ethereum Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileZOqTqM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/ethereum/go-ethereum/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": + cd /root/go/src/github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ethereum/go-ethereum Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=56d201b0feb90b3e4a863349d0883c5502bc792f Step #2 - "srcmap": + jq_inplace /tmp/fileZOqTqM '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "56d201b0feb90b3e4a863349d0883c5502bc792f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileq2A7eb Step #2 - "srcmap": + cat /tmp/fileZOqTqM Step #2 - "srcmap": + jq '."/root/go/src/github.com/ethereum/go-ethereum" = { type: "git", url: "https://github.com/ethereum/go-ethereum", rev: "56d201b0feb90b3e4a863349d0883c5502bc792f" }' Step #2 - "srcmap": + mv /tmp/fileq2A7eb /tmp/fileZOqTqM Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileZOqTqM Step #2 - "srcmap": + rm /tmp/fileZOqTqM Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/ethereum/go-ethereum": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ethereum/go-ethereum", Step #2 - "srcmap": "rev": "56d201b0feb90b3e4a863349d0883c5502bc792f" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + coverpkg=github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + go install github.com/holiman/gofuzz-shim@latest Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.25.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 Step #3 - "compile-libfuzzer-coverage-x86_64": + repo=/root/go/src/github.com/ethereum/go-ethereum Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/abifuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzAbi' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/decred/dcrd/crypto/blake256 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prysmaticlabs/gohashtree v0.0.4-beta Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leanovate/gopter v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dnaeon/go-vcr v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/datadriven v1.0.3-0.20230413201302-be42291fc80f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pingcap/errors v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded golang.org/x/exp v0.0.0-20230626212559-97b1e661b5df => v0.0.0-20231006140011-7918f672742d Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/abi FuzzABI fuzzAbi github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzABI Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=abi Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzABI/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/abi/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzABICorpus/ ./fuzzabi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzAbi Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/abi/testdata/fuzzAbi_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/abi Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilEncoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzEncoder fuzzBitutilEncoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEncoder/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEncoderCorpus/ ./fuzzencoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilEncoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilEncoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/compress_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBitutilDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/common/bitutil FuzzDecoder fuzzBitutilDecoder github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzDecoder/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bitutil/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzDecoderCorpus/ ./fuzzdecoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBitutilDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/common/bitutil/testdata/fuzzBitutilDecoder_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/common/bitutil Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/runtime_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzVmRuntime' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime FuzzVmRuntime fuzzVmRuntime github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzVmRuntime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/runtime/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzVmRuntimeCorpus/ ./fuzzvmruntime_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzVmRuntime Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime/testdata/fuzzVmRuntime_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts /root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_fuzz_test.go,/root/go/src/github.com/ethereum/go-ethereum/core/vm/contracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzPrecompiledContracts' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/vm FuzzPrecompiledContracts fuzzPrecompiledContracts github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=vm Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPrecompiledContracts/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/vm/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPrecompiledContractsCorpus/ ./fuzzprecompiledcontracts_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzPrecompiledContracts Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/vm/testdata/fuzzPrecompiledContracts_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/vm Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp /root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/core/types/rlp_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzRlp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/core/types FuzzRLP fuzzRlp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzRLP Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=types Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzRLP/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/types/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzRLPCorpus/ ./fuzzrlp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzRlp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/core/types/testdata/fuzzRlp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/core/types Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/blake2b_f_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBlake2b' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Fuzz fuzzBlake2b github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/blake2b/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBlake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b/testdata/fuzzBlake2b_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/crypto/blake2b Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/keystore_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzKeystore' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore FuzzPassword fuzzKeystore github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPassword Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPassword/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/keystore/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPasswordCorpus/ ./fuzzpassword_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzKeystore Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore/testdata/fuzzKeystore_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/accounts/keystore Step #3 - "compile-libfuzzer-coverage-x86_64": + pkg=/root/go/src/github.com/ethereum/go-ethereum/trie/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie /root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzTrie fuzzTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieCorpus/ ./fuzztrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie /root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/trie//stacktrie_fuzzer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//iterator_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//trie_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//database_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//tracer_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//proof_test.go,/root/go/src/github.com/ethereum/go-ethereum/trie//sync_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzStackTrie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/trie FuzzStackTrie fuzzStackTrie github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=trie Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzStackTrie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/trie/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzStackTrieCorpus/ ./fuzzstacktrie_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzStackTrie Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/trie/testdata/fuzzStackTrie_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/trie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_account_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzARange fuzz_account_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzARange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzARange/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzARangeCorpus/ ./fuzzarange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_account_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_account_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_storage_range' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzSRange fuzz_storage_range github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzSRange Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzSRange/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzSRangeCorpus/ ./fuzzsrange_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_storage_range Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_storage_range_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_byte_codes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzByteCodes fuzz_byte_codes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzByteCodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzByteCodes/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzByteCodesCorpus/ ./fuzzbytecodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_byte_codes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_byte_codes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/handler_fuzzing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_trie_nodes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap FuzzTrieNodes fuzz_trie_nodes github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTrieNodes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=snap Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTrieNodes/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/snap/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTrieNodesCorpus/ ./fuzztrienodes_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_trie_nodes Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap/testdata/fuzz_trie_nodes_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/snap Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzAdd fuzzBn256Add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzAdd Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzAdd/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzAddCorpus/ ./fuzzadd_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Mul' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzMul fuzzBn256Mul github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMul Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMul/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMulCorpus/ ./fuzzmul_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Mul Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Mul_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256Pair' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzPair fuzzBn256Pair github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPair Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPair/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairCorpus/ ./fuzzpair_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256Pair Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256Pair_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzUnmarshalG1 fuzzBn256UnmarshalG1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzUnmarshalG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256UnmarshalG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256UnmarshalG1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256UnmarshalG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzUnmarshalG1 fuzzBn256UnmarshalG1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzUnmarshalG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256UnmarshalG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzunmarshalg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzUnmarshalG1/ ./fuzzunmarshalg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzunmarshalg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzUnmarshalG1Corpus/ ./fuzzunmarshalg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256UnmarshalG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256UnmarshalG1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256UnmarshalG1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzUnmarshalG2 fuzzBn256UnmarshalG2 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzUnmarshalG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256UnmarshalG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/bn256_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzBn256UnmarshalG2' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzBn256UnmarshalG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 FuzzUnmarshalG2 fuzzBn256UnmarshalG2 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzUnmarshalG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzBn256UnmarshalG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzunmarshalg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzUnmarshalG2/ ./fuzzunmarshalg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bn256/ ./fuzzunmarshalg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzUnmarshalG2Corpus/ ./fuzzunmarshalg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzBn256UnmarshalG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256UnmarshalG2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256/testdata/fuzzBn256UnmarshalG2_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bn256 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/txfetcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzTxfetcher' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Fuzz fuzzTxfetcher github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/txfetcher/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzTxfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher/testdata/fuzzTxfetcher_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/txfetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1Add/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1AddCorpus/ ./fuzzg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1MultiExp/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1MultiExpCorpus/ ./fuzzg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2Add/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2AddCorpus/ ./fuzzg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2MultiExp/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2MultiExpCorpus/ ./fuzzg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzPairing fuzz_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzPairing/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzPairingCorpus/ ./fuzzpairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG1/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG1Corpus/ ./fuzzmapg1_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_map_g2' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzMapG2 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzMapG2/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzMapG2Corpus/ ./fuzzmapg2_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_map_g2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": Found seed corpus: /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_map_g2_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1Add/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1AddCorpus/ ./fuzzcrossg1add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g1_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG1MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG1MultiExp/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG1MultiExpCorpus/ ./fuzzcrossg1multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g1_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g1_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_add' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2Add Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2Add/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2AddCorpus/ ./fuzzcrossg2add_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_add Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_add_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_g2_multiexp' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossG2MultiExp fuzz_cross_g2_multiexp github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossG2MultiExp Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossG2MultiExp/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossG2MultiExpCorpus/ ./fuzzcrossg2multiexp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_g2_multiexp Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_g2_multiexp_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_cross_pairing' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzCrossPairing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzCrossPairing/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCrossPairingCorpus/ ./fuzzcrosspairing_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_cross_pairing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_cross_pairing_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g1_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG1SubgroupChecks fuzz_g1_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG1SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG1SubgroupChecks/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG1SubgroupChecksCorpus/ ./fuzzg1subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g1_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g1_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/bls12381_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_g2_subgroup_checks' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 FuzzG2SubgroupChecks fuzz_g2_subgroup_checks github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzG2SubgroupChecks Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzG2SubgroupChecks/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/bls12381/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzG2SubgroupChecksCorpus/ ./fuzzg2subgroupchecks_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_g2_subgroup_checks Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381/testdata/fuzz_g2_subgroup_checks_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/bls12381 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/secp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzzSecp256k1' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1 github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + function=Fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/Fuzz/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/secp256k1/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzCorpus/ ./fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzzSecp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1/testdata/fuzzSecp256k1_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/tests/fuzzers/secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzer github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + package=github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + file=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/handler_test.go,/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/peer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building fuzz_eth_protocol_handlers' Step #3 - "compile-libfuzzer-coverage-x86_64": Building fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/holiman/gofuzz-shim/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/holiman/gofuzz-shim v0.0.0-20240509121320-c1eff0bcb432 Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage == *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + coverbuild /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth FuzzEthProtocolHandlers fuzz_eth_protocol_handlers github.com/ethereum/go-ethereum/... Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzEthProtocolHandlers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + tags= Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ 4 -eq 4 ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags github.com/ethereum/go-ethereum/...' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -d/ -f 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ rev Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=eth Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /root/go/ossfuzz_coverage_runner.go ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzEthProtocolHandlers/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/eth/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzEthProtocolHandlersCorpus/ ./fuzzethprotocolhandlers_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fuzz_eth_protocol_handlers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Step #3 - "compile-libfuzzer-coverage-x86_64": + corpusfile=/root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth/testdata/fuzz_eth_protocol_handlers_seed_corpus.zip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/ethereum/go-ethereum/eth/protocols/eth Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 008b78875541: Already exists Step #4: 928200867a41: Already exists Step #4: e7cd04c0c651: Pulling fs layer Step #4: 2e730abeb9a2: Pulling fs layer Step #4: 7cb36f62a147: Pulling fs layer Step #4: 5fc815f8f116: Pulling fs layer Step #4: 66351cb039d1: Pulling fs layer Step #4: ee161dad15dd: Pulling fs layer Step #4: df4ad2b82919: Pulling fs layer Step #4: e6f50db343a4: Pulling fs layer Step #4: 1633885ce418: Pulling fs layer Step #4: 8838d43ac745: Pulling fs layer Step #4: 4b8a05eb7225: Pulling fs layer Step #4: 1b081b11f788: Pulling fs layer Step #4: 69d5a41678e3: Pulling fs layer Step #4: c03a704cb7e7: Pulling fs layer Step #4: 0445055a93fc: Pulling fs layer Step #4: b344c7fa3b43: Pulling fs layer Step #4: 107622352030: Pulling fs layer Step #4: 77a39b7d8a1b: Pulling fs layer Step #4: f92d6f2459f0: Pulling fs layer Step #4: 8838d43ac745: Waiting Step #4: df4ad2b82919: Waiting Step #4: b5bafa58a602: Pulling fs layer Step #4: e6f50db343a4: Waiting Step #4: 4b8a05eb7225: Waiting Step #4: 5ca1715a5de7: Pulling fs layer Step #4: c03a704cb7e7: Waiting Step #4: 1633885ce418: Waiting Step #4: 7b998ee89cc2: Pulling fs layer Step #4: 32c73a5c2cdc: Pulling fs layer Step #4: afe53b633b2b: Pulling fs layer Step #4: 1b081b11f788: Waiting Step #4: 69d5a41678e3: Waiting Step #4: b344c7fa3b43: Waiting Step #4: 107622352030: Waiting Step #4: 77a39b7d8a1b: Waiting Step #4: 7b998ee89cc2: Waiting Step #4: f92d6f2459f0: Waiting Step #4: 32c73a5c2cdc: Waiting Step #4: b5bafa58a602: Waiting Step #4: afe53b633b2b: Waiting Step #4: 5ca1715a5de7: Waiting Step #4: 0445055a93fc: Waiting Step #4: 66351cb039d1: Verifying Checksum Step #4: 66351cb039d1: Download complete Step #4: 7cb36f62a147: Verifying Checksum Step #4: 7cb36f62a147: Download complete Step #4: 5fc815f8f116: Download complete Step #4: e6f50db343a4: Download complete Step #4: 1633885ce418: Verifying Checksum Step #4: 1633885ce418: Download complete Step #4: e7cd04c0c651: Verifying Checksum Step #4: e7cd04c0c651: Download complete Step #4: 1b081b11f788: Download complete Step #4: e7cd04c0c651: Pull complete Step #4: 4b8a05eb7225: Download complete Step #4: ee161dad15dd: Verifying Checksum Step #4: ee161dad15dd: Download complete Step #4: 69d5a41678e3: Verifying Checksum Step #4: 69d5a41678e3: Download complete Step #4: 0445055a93fc: Verifying Checksum Step #4: 0445055a93fc: Download complete Step #4: 2e730abeb9a2: Verifying Checksum Step #4: 2e730abeb9a2: Download complete Step #4: 107622352030: Verifying Checksum Step #4: 107622352030: Download complete Step #4: 8838d43ac745: Download complete Step #4: 77a39b7d8a1b: Download complete Step #4: df4ad2b82919: Download complete Step #4: 2e730abeb9a2: Pull complete Step #4: b5bafa58a602: Verifying Checksum Step #4: b5bafa58a602: Download complete Step #4: 5ca1715a5de7: Download complete Step #4: 7cb36f62a147: Pull complete Step #4: afe53b633b2b: Download complete Step #4: 7b998ee89cc2: Verifying Checksum Step #4: 7b998ee89cc2: Download complete Step #4: 32c73a5c2cdc: Verifying Checksum Step #4: 32c73a5c2cdc: Download complete Step #4: 5fc815f8f116: Pull complete Step #4: 66351cb039d1: Pull complete Step #4: f92d6f2459f0: Verifying Checksum Step #4: f92d6f2459f0: Download complete Step #4: c03a704cb7e7: Verifying Checksum Step #4: c03a704cb7e7: Download complete Step #4: b344c7fa3b43: Verifying Checksum Step #4: b344c7fa3b43: Download complete Step #4: ee161dad15dd: Pull complete Step #4: df4ad2b82919: Pull complete Step #4: e6f50db343a4: Pull complete Step #4: 1633885ce418: Pull complete Step #4: 8838d43ac745: Pull complete Step #4: 4b8a05eb7225: Pull complete Step #4: 1b081b11f788: Pull complete Step #4: 69d5a41678e3: Pull complete Step #4: c03a704cb7e7: Pull complete Step #4: 0445055a93fc: Pull complete Step #4: b344c7fa3b43: Pull complete Step #4: 107622352030: Pull complete Step #4: 77a39b7d8a1b: Pull complete Step #4: f92d6f2459f0: Pull complete Step #4: b5bafa58a602: Pull complete Step #4: 5ca1715a5de7: Pull complete Step #4: 7b998ee89cc2: Pull complete Step #4: 32c73a5c2cdc: Pull complete Step #4: afe53b633b2b: Pull complete Step #4: Digest: sha256:a06a1dccaef5db5b29674ec3d533d88af07a0c874ca3bbb7efd1a37f18b38713 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/12/11 07:11:37 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2025/12/11 07:11:37 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/12/11 07:11:37 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: 63e5bc7682b8: Already exists Step #6: 2d8843b6fd75: Already exists Step #6: 069f9fef7429: Already exists Step #6: 6d3892323374: Already exists Step #6: 7111427d8489: Already exists Step #6: 134676fbdbfc: Already exists Step #6: 16d1ee2e1334: Pulling fs layer Step #6: da8ed20acc09: Pulling fs layer Step #6: da8ed20acc09: Download complete Step #6: 16d1ee2e1334: Verifying Checksum Step #6: 16d1ee2e1334: Download complete Step #6: 16d1ee2e1334: Pull complete Step #6: da8ed20acc09: Pull complete Step #6: Digest: sha256:cc3b6a148de154f2a6d992a1b0a3876e8e4c9996e71c2a3c8f505eee3fc0448d Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 2.2 KiB/ 4.9 KiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 2.2 KiB/ 4.9 KiB] 46% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Step #9: ***** NOTICE ***** Step #9: Step #9: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #9: platforms, can be found at Step #9: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #9: Step #9: Suggested alternative images include: Step #9: Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #9: Step #9: Please note that the `gsutil` entrypoint must be specified when using these Step #9: images. Step #9: Step #9: ***** END OF NOTICE ***** Step #9: Step #9: CommandException: No URLs matched. Do the files you're operating on exist? Finished Step #9 ERROR ERROR: build step 9 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1