starting build "06810bd6-4ef8-49b4-b0fa-7e1e6a3b7337" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13" Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Sending build context to Docker daemon 5.12kB Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": b549f31133a9: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1a70a700e51b: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 5ec7a140d578: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 45cd31fa0b07: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fd1354b8daea: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 295db833e131: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 208f1d80a9fa: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0c39573f4098: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 373d7feea1be: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9dfbb761ad25: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7e73a980bd5b: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 55443b21942a: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 02e959477e67: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7c76350aee8c: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4cc5c069dee9: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d656310073f0: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 472eaf2ce4a9: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": abf69ead4071: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 62d9d6f3f40f: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9e5991d4193f: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": deefbb57a24d: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d70ab8f8993e: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ffdd5fe5e7dd: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": e7a13d7a1408: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fe10d3037834: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 8bdf2f500f2f: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1afb13a2c790: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 60f8af360f56: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 32df48409ee3: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0cc5d9eb2b29: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 961d265260cc: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f9a1af02276f: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 6c6c87068d40: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0c39573f4098: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c8fe28369828: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 373d7feea1be: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 65858fc9b799: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f3dd0fc12e96: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9dfbb761ad25: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4fea8d9136e9: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7e73a980bd5b: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c5968ab58592: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 600059def893: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 55443b21942a: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": df837e42de07: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 472eaf2ce4a9: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 26253a131943: Pulling fs layer Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": abf69ead4071: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 02e959477e67: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7c76350aee8c: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 62d9d6f3f40f: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4cc5c069dee9: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 208f1d80a9fa: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9e5991d4193f: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d656310073f0: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": deefbb57a24d: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f9a1af02276f: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1afb13a2c790: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d70ab8f8993e: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c5968ab58592: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 6c6c87068d40: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ffdd5fe5e7dd: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 600059def893: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 60f8af360f56: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c8fe28369828: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 32df48409ee3: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": e7a13d7a1408: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": df837e42de07: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0cc5d9eb2b29: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 961d265260cc: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 26253a131943: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 65858fc9b799: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fe10d3037834: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4fea8d9136e9: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f3dd0fc12e96: Waiting Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 5ec7a140d578: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 5ec7a140d578: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fd1354b8daea: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fd1354b8daea: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 208f1d80a9fa: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 208f1d80a9fa: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0c39573f4098: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0c39573f4098: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": b549f31133a9: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 45cd31fa0b07: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 45cd31fa0b07: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7e73a980bd5b: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7e73a980bd5b: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 55443b21942a: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 55443b21942a: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 02e959477e67: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 02e959477e67: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7c76350aee8c: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1a70a700e51b: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1a70a700e51b: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d656310073f0: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d656310073f0: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4cc5c069dee9: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4cc5c069dee9: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9dfbb761ad25: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9dfbb761ad25: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 472eaf2ce4a9: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 472eaf2ce4a9: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 62d9d6f3f40f: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 62d9d6f3f40f: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": abf69ead4071: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": abf69ead4071: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9e5991d4193f: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9e5991d4193f: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": deefbb57a24d: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": deefbb57a24d: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d70ab8f8993e: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d70ab8f8993e: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ffdd5fe5e7dd: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ffdd5fe5e7dd: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": e7a13d7a1408: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": e7a13d7a1408: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fe10d3037834: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fe10d3037834: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": b549f31133a9: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 8bdf2f500f2f: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1afb13a2c790: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 60f8af360f56: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 60f8af360f56: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 32df48409ee3: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 32df48409ee3: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 961d265260cc: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 373d7feea1be: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 373d7feea1be: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0cc5d9eb2b29: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0cc5d9eb2b29: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f9a1af02276f: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f9a1af02276f: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 6c6c87068d40: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 6c6c87068d40: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c8fe28369828: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c8fe28369828: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f3dd0fc12e96: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f3dd0fc12e96: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 65858fc9b799: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 600059def893: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 600059def893: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 26253a131943: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 26253a131943: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4fea8d9136e9: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4fea8d9136e9: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c5968ab58592: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c5968ab58592: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 295db833e131: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 295db833e131: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1a70a700e51b: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": df837e42de07: Verifying Checksum Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": df837e42de07: Download complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 5ec7a140d578: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 45cd31fa0b07: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fd1354b8daea: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 295db833e131: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 208f1d80a9fa: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0c39573f4098: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 373d7feea1be: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9dfbb761ad25: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7e73a980bd5b: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 55443b21942a: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 02e959477e67: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 7c76350aee8c: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4cc5c069dee9: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d656310073f0: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 472eaf2ce4a9: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": abf69ead4071: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 62d9d6f3f40f: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 9e5991d4193f: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": deefbb57a24d: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": d70ab8f8993e: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ffdd5fe5e7dd: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": e7a13d7a1408: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": fe10d3037834: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 8bdf2f500f2f: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 1afb13a2c790: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 60f8af360f56: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 32df48409ee3: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 0cc5d9eb2b29: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 961d265260cc: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f9a1af02276f: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 6c6c87068d40: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c8fe28369828: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 65858fc9b799: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": f3dd0fc12e96: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 4fea8d9136e9: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": c5968ab58592: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 600059def893: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": df837e42de07: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": 26253a131943: Pull complete Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Digest: sha256:201cab72804636b753fec6b54637e1a1802ec34645e2c685bc8a1cc17065f34e Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> e206392a2267 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Step 2/6 : RUN git clone --depth 1 https://github.com/sigstore/rekor Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> Running in 4ff6aa0a41bf Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Cloning into 'rekor'... Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Removing intermediate container 4ff6aa0a41bf Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> 9c112030308e Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Step 3/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> Running in eb2dcb649239 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Cloning into 'instrumentation'... Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Removing intermediate container eb2dcb649239 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> 910f2eabf0cb Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Step 4/6 : RUN git clone --depth=1 https://github.com/sassoftware/relic Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> Running in 400e2f7f815f Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Cloning into 'relic'... Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Removing intermediate container 400e2f7f815f Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> 64de3152e3c5 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Step 5/6 : COPY build.sh $SRC Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> 41589dad4dbc Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Step 6/6 : WORKDIR $SRC/rekor/pkg Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> Running in 6212b72c5c15 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Removing intermediate container 6212b72c5c15 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": ---> bcd78e4121f9 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Successfully built bcd78e4121f9 Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Successfully tagged gcr.io/oss-fuzz/rekor:latest Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rekor:latest Finished Step #1 - "build-42635846-8497-49d4-97b6-4dde2c2d4c13" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rekor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filer2AfZL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/relic/.git Step #2 - "srcmap": + GIT_DIR=/src/relic Step #2 - "srcmap": + cd /src/relic Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sassoftware/relic Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bdc9acbfe6a439c79e51d931bccf4d0e9e49f233 Step #2 - "srcmap": + jq_inplace /tmp/filer2AfZL '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filez1xVQa Step #2 - "srcmap": + cat /tmp/filer2AfZL Step #2 - "srcmap": + jq '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": + mv /tmp/filez1xVQa /tmp/filer2AfZL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/filer2AfZL '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file2tPBXJ Step #2 - "srcmap": + cat /tmp/filer2AfZL Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/file2tPBXJ /tmp/filer2AfZL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rekor/.git Step #2 - "srcmap": + GIT_DIR=/src/rekor Step #2 - "srcmap": + cd /src/rekor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/rekor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bb573aab48ad294657cb4f1e8e0dabe1d2a77f69 Step #2 - "srcmap": + jq_inplace /tmp/filer2AfZL '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "bb573aab48ad294657cb4f1e8e0dabe1d2a77f69" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileCoLjQf Step #2 - "srcmap": + cat /tmp/filer2AfZL Step #2 - "srcmap": + jq '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "bb573aab48ad294657cb4f1e8e0dabe1d2a77f69" }' Step #2 - "srcmap": + mv /tmp/fileCoLjQf /tmp/filer2AfZL Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filer2AfZL Step #2 - "srcmap": + rm /tmp/filer2AfZL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/relic": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sassoftware/relic", Step #2 - "srcmap": "rev": "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/rekor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/rekor", Step #2 - "srcmap": "rev": "bb573aab48ad294657cb4f1e8e0dabe1d2a77f69" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + export 'CXX=clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + CXX='clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + /src/rekor/tests/oss_fuzz.sh Step #3 - "compile-libfuzzer-address-x86_64": sed: can't read /src/rekor/pkg/pki/x509/e2e.go: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": sed: can't read /src/rekor/pkg/util/util.go: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmoiron/sqlx v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/redis/go-redis/v9 v9.18.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/protobuf-specs v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/errors v0.22.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/runtime v0.29.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/profiler v0.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/viper v1.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.36.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-chi/chi/v5 v5.2.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/DATA-DOG/go-sqlmock v1.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/loads v0.23.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-redis/redismock/v9 v9.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/strfmt v0.26.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cobra v1.10.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/release-utils v0.12.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/validate v0.25.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/spec v0.22.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/conv v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go v0.123.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230919221257-8b5d3ce2d11d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20220623050100-57a0ce2678a7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/zap v1.27.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/in-toto/in-toto-golang v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic v7.2.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/trillian v1.7.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jedisct1/go-minisign v0.0.0-20211028175153-1c139d1cc84b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore v1.10.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/veraison/go-cose v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/secure-systems-lab/go-securesystemslib v0.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic/v7 v7.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.50.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/crypto v0.48.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/transparency-dev/merkle v0.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/mod v0.33.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260217215200-42d3e9bedb6d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.79.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto v0.0.0-20260128011058-8636f8732409 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/theupdateframework/go-tuf v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/mock v1.7.0-rc.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/ini.v1 v1.67.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliercoder/go-rpm v0.0.0-20200122174316-8cb9fd9c31a8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sagikazarmark/locafero v0.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/afero v1.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cast v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/cmdutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/fileutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonname v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/loading v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/mangling v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/netutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/stringutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/typeutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/yamlutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/oklog/ulid/v2 v2.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/iam v1.5.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/pubsub/v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/api v0.269.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading filippo.io/edwards25519 v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/analysis v0.24.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel v1.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/shibumi/go-pathspec v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/pubsub v1.50.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/aws v1.10.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/azure v1.10.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.10.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.10.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go-awskms/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go-gcpkms/v2 v2.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go/v2 v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.step.sm/crypto v0.76.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gocloud.dev v0.45.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/pprof v0.0.0-20250602020802-c6617b811d0e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.17.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/gomega v1.25.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/testify/v2 v2.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.32.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/codahale/rfc6979 v0.0.0-20141003034818-6a90f24967eb Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.35.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260128011058-8636f8732409 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/rpmpack v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-containerregistry v0.20.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/term v0.40.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/compress v1.18.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.22.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/testify/enable/yaml/v2 v2.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliercoder/badio v0.0.0-20160213150051-ce5280129e9e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonutils/fixtures_test v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sourcegraph/conc v0.3.1-0.20240121214520-5f936abd7ae8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.34.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.41.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.32.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.49.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jellydator/ttlcache/v3 v3.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/kms v1.25.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/vault/api v1.22.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fatih/color v1.18.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-colorable v0.1.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/storage v1.57.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliergopher/cpio v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/pgzip v1.2.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ulikunitz/xz v0.5.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zalando/go-keyring v0.2.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/atomic v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zeebo/xxh3 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/smithy-go v1.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.19.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.17 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/signin v1.0.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.30.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.13 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.41.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.17 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/wire v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.20.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.92.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/longrunning v0.8.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/hcl v1.0.1-vault-7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.14.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.einride.tech/aip v0.79.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/nxadm/tail v1.4.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/alessio/shellescape v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/danieljoos/wincred v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/auth v0.18.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.54.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.37.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.0.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.17 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20240903120638-7835f813f4da Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-replayers/grpcreplay v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-replayers/httpreplay v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.17 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.32.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.4.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.9.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.19.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/natefinch/atomic v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.36.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.54.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.54.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.30.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20250820121507-0af2bda4dd1d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gonum.org/v1/gonum v0.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.14.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20251210132809-ee656c7534f5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/martian/v3 v3.3.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/logging v1.13.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/trace v1.11.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.63.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spiffe/go-spiffe/v2 v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cel.dev/expr v0.25.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.63.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/keybase/go-keychain v0.0.1 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/pki/factory_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/pki/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild960435077/ossFuzzOverlayFile.json1851804485 -o FuzzKeys.a ./main.2038921911.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1952070181/ossFuzzOverlayFile.json32455877 -o FuzzCreateEntryIDFromParts.a ./main.630333871.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4019264307/ossFuzzOverlayFile.json619586777 -o FuzzGetUUIDFromIDString.a ./main.202297833.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild757945271/ossFuzzOverlayFile.json129124197 -o FuzzGetTreeIDFromIDString.a ./main.2789665675.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2618850882/ossFuzzOverlayFile.json925155477 -o FuzzPadToTreeIDLen.a ./main.3769892580.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2071275637/ossFuzzOverlayFile.json340278562 -o FuzzReturnEntryIDString.a ./main.2433743991.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1827502591/ossFuzzOverlayFile.json1464541682 -o FuzzTreeID.a ./main.4204810193.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2015459411/ossFuzzOverlayFile.json997887917 -o FuzzValidateUUID.a ./main.3845120170.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2466990325/ossFuzzOverlayFile.json30397975 -o FuzzValidateTreeID.a ./main.996336768.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1012408631/ossFuzzOverlayFile.json2507450929 -o FuzzValidateEntryID.a ./main.1732191333.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/file_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/memory_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/signer_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/tink_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4144217220/ossFuzzOverlayFile.json975482256 -o FuzzNewFile.a ./main.1642365488.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4233857561/ossFuzzOverlayFile.json2895165146 -o FuzzCoseCreateProposedEntry.a ./main.2104724850.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3893282771/ossFuzzOverlayFile.json3347743334 -o FuzzCoseUnmarshalAndCanonicalize.a ./main.106614444.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild484639626/ossFuzzOverlayFile.json1840937573 -o FuzzCoseDecodeEntryDirectMapAndRaw.a ./main.1855893505.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/hashedrekord_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1027338788/ossFuzzOverlayFile.json4103551429 -o FuzzHashedRekord.a ./main.1201872171.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2902095775/ossFuzzOverlayFile.json2595863466 -o FuzzHashedRekordCreateProposedEntry.a ./main.2436006562.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3164654930/ossFuzzOverlayFile.json1352662843 -o FuzzHashedRekordUnmarshalAndCanonicalize.a ./main.1902968636.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4008656065/ossFuzzOverlayFile.json2494066292 -o FuzzHashedRekordDecodeEntryDirectMapAndRaw.a ./main.1789059580.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/alpine_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/apk_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3118709314/ossFuzzOverlayFile.json166896815 -o FuzzPackageUnmarshal.a ./main.3079270599.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild745027256/ossFuzzOverlayFile.json746187473 -o FuzzAlpineCreateProposedEntry.a ./main.597471514.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild786113666/ossFuzzOverlayFile.json416081514 -o FuzzAlpineUnmarshalAndCanonicalize.a ./main.324713554.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2005251485/ossFuzzOverlayFile.json2728290908 -o FuzzAlpineDecodeEntryDirectMapAndRaw.a ./main.1912632918.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/jar_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3366823463/ossFuzzOverlayFile.json3223342881 -o FuzzJarUnmarshal.a ./main.3346317575.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild41806862/ossFuzzOverlayFile.json438995368 -o FuzzJarCreateProposedEntry.a ./main.405187478.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild823388280/ossFuzzOverlayFile.json2687311306 -o FuzzJarUnmarshalAndCanonicalize.a ./main.2178377071.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2347288026/ossFuzzOverlayFile.json358293018 -o FuzzJarDecodeEntryDirectMapAndRaw.a ./main.1673467244.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild12379467/ossFuzzOverlayFile.json1849114666 -o FuzzIntotoCreateProposedEntry_v001.a ./main.1626881917.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild751592737/ossFuzzOverlayFile.json3838762650 -o FuzzIntotoUnmarshalAndCanonicalize_v001.a ./main.369230496.go] Step #3 - "compile-libfuzzer-address-x86_64": Could not find the function: func FuzzIntotoDecodeEntryDirectMapAndRaw(f *testing.F) Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1238069368/ossFuzzOverlayFile.json350347975 -o FuzzIntotoCreateProposedEntry_v002.a ./main.3315439612.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4188978824/ossFuzzOverlayFile.json1550921278 -o FuzzIntotoUnmarshalAndCanonicalize_v002.a ./main.1845991219.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2744959790/ossFuzzOverlayFile.json2096642988 -o FuzzIntotoDecodeEntryDirectMapAndRaw.a ./main.3247094579.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild304144407/ossFuzzOverlayFile.json703323010 -o FuzzTufCreateProposedEntry.a ./main.1201126230.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3705263560/ossFuzzOverlayFile.json4001970920 -o FuzzTufUnmarshalAndCanonicalize.a ./main.3214520833.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1929292598/ossFuzzOverlayFile.json1234045816 -o FuzzTufDecodeEntryDirectMapAndRaw.a ./main.876563010.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2830756904/ossFuzzOverlayFile.json1673923586 -o FuzzRfc3161CreateProposedEntry.a ./main.3887435308.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4056706084/ossFuzzOverlayFile.json4238990219 -o FuzzRfc3161UnmarshalAndCanonicalize.a ./main.3480233153.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3877120760/ossFuzzOverlayFile.json4111797145 -o FuzzRfc3161DecodeEntryDirectMapAndRaw.a ./main.4282081299.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild255592474/ossFuzzOverlayFile.json500141215 -o FuzzRpmCreateProposedEntry.a ./main.3419936277.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2958306351/ossFuzzOverlayFile.json2201201730 -o FuzzRpmUnmarshalAndCanonicalize.a ./main.355504687.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1725967554/ossFuzzOverlayFile.json2865111824 -o FuzzRpmDecodeEntryDirectMapAndRaw.a ./main.3138230173.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2446984234/ossFuzzOverlayFile.json2902589515 -o FuzzHelmCreateProposedEntry.a ./main.2410546066.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3504971147/ossFuzzOverlayFile.json2721574894 -o FuzzHelmUnmarshalAndCanonicalize.a ./main.3159434035.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1170129313/ossFuzzOverlayFile.json3759344013 -o FuzzHelmProvenanceUnmarshal.a ./main.2239483400.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3003260389/ossFuzzOverlayFile.json3790354601 -o FuzzHelmDecodeEntryDirectMapAndRaw.a ./main.519633578.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3884357168/ossFuzzOverlayFile.json2591775095 -o FuzzRekordCreateProposedEntry.a ./main.2237458970.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1482577402/ossFuzzOverlayFile.json1429920198 -o FuzzRekordUnmarshalAndCanonicalize.a ./main.3722628447.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1668503240/ossFuzzOverlayFile.json1222404454 -o FuzzRekordDecodeEntryDirectMapAndRaw.a ./main.2267865984.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1193767619/ossFuzzOverlayFile.json102982228 -o FuzzDSSECreateProposedEntry.a ./main.43414650.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3712327768/ossFuzzOverlayFile.json143789591 -o FuzzDSSEUnmarshalAndCanonicalize.a ./main.700287950.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1219098857/ossFuzzOverlayFile.json2626924951 -o FuzzDSSEDecodeEntryDirectMapAndRaw.a ./main.3422837748.go] Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cloudflare/circl v1.3.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zalando/go-keyring v0.2.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading al.essio.dev/pkg/shellescape v1.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/danieljoos/wincred v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/zipslicer Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/binpatch Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs7 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/config Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/certloader Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/x509tools Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/signers/sigerrors Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/passprompt Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/binpatch in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/x509tools in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/signers/sigerrors in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/passprompt in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs7 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs9 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/config in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/certloader in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/zipslicer in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4030386350/ossFuzzOverlayFile.json1240013439 -o FuzzJarutilsVerify.a ./main.776956364.go] Step #3 - "compile-libfuzzer-address-x86_64": adding: src/rekor/tests/fuzz-testdata/seeds/alpine/FuzzPackageUnmarshal/FuzzPackageUnmarshal_seed1 (deflated 98%) Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 1a70a700e51b: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 5ec7a140d578: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 1e0fe4959069: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d63bcbc62f26: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6a5609c5c1c0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1e8c78cfcd54: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b06b50192334: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 014e9c89bb5e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 36d5fd28e48c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f6d623093aa7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b07a3205ca24: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6668e294a0c7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6f616e998855: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a404991d2a11: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": edf26a4cb3c2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d7456d315cc5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2ea1ff6edc79: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a16d23edabbe: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 55eb476db63b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8b2c76936d57: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b4a707dea67b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8bb24d9182ed: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": efaf85b8d1e6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c3d3dea6036e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 54638a343e14: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": eceab4a97493: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 9935b13ed3b2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a16d23edabbe: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 36d5fd28e48c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a404991d2a11: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 55eb476db63b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8b2c76936d57: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": edf26a4cb3c2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f6d623093aa7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d7456d315cc5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b4a707dea67b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8bb24d9182ed: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2ea1ff6edc79: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6668e294a0c7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6f616e998855: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c3d3dea6036e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 54638a343e14: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9935b13ed3b2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": eceab4a97493: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": efaf85b8d1e6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b06b50192334: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b06b50192334: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6a5609c5c1c0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6a5609c5c1c0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1e0fe4959069: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1e0fe4959069: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d63bcbc62f26: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d63bcbc62f26: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1e8c78cfcd54: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1e8c78cfcd54: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f6d623093aa7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f6d623093aa7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 36d5fd28e48c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1e0fe4959069: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a404991d2a11: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b07a3205ca24: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b07a3205ca24: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": edf26a4cb3c2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": edf26a4cb3c2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6f616e998855: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6f616e998855: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2ea1ff6edc79: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d63bcbc62f26: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 014e9c89bb5e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 014e9c89bb5e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 55eb476db63b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 55eb476db63b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8b2c76936d57: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6a5609c5c1c0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": efaf85b8d1e6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": efaf85b8d1e6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8bb24d9182ed: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8bb24d9182ed: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6668e294a0c7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1e8c78cfcd54: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 54638a343e14: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 54638a343e14: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b06b50192334: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c3d3dea6036e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c3d3dea6036e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9935b13ed3b2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 9935b13ed3b2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b4a707dea67b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b4a707dea67b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": eceab4a97493: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": eceab4a97493: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d7456d315cc5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d7456d315cc5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a16d23edabbe: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a16d23edabbe: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 014e9c89bb5e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 36d5fd28e48c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f6d623093aa7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b07a3205ca24: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6668e294a0c7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6f616e998855: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a404991d2a11: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": edf26a4cb3c2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d7456d315cc5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2ea1ff6edc79: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a16d23edabbe: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 55eb476db63b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8b2c76936d57: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b4a707dea67b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8bb24d9182ed: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": efaf85b8d1e6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c3d3dea6036e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 54638a343e14: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": eceab4a97493: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9935b13ed3b2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:d72d4ac9994350331dce3c136611c96fab2972aa939229a7d282a71ac1477a8c Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRpmDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzTufCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHashedRekord Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHashedRekordUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRekordCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzJarUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHashedRekordDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzCoseUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzTufUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHelmProvenanceUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHelmCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzKeys Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzCoseCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzIntotoUnmarshalAndCanonicalize_v001 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzCoseDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRpmUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRpmCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRekordUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzPadToTreeIDLen Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRfc3161CreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzDSSEDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRfc3161UnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRekordDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzJarDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHelmUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRfc3161DecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzNewFile Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzJarCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzJarutilsVerify Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzAlpineUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzIntotoDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzAlpineDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzAlpineCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzTufDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzDSSECreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHashedRekordCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzIntotoCreateProposedEntry_v001 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzJarUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzIntotoUnmarshalAndCanonicalize_v002 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzDSSEUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzIntotoCreateProposedEntry_v002 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzPackageUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzHelmDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": Retrying failed fuzz targets sequentially 9 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzRfc3161CreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString Step #4 - "build-check-libfuzzer-address-x86_64": Broken fuzz targets 8 Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzTreeID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzTreeID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzTreeID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190136 inline 8-bit counters): 190136 [0x562686868820, 0x562686896ed8), \nINFO: Loaded 1 PC tables (190136 PCs): 190136 [0x10c000100000,0x10c0003e6b80), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x562683ad34d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.4204810193.go:48 +0x1d8\npanic({0x5626852a11e0?, 0x562685df7fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008774b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008774b0, {0x10c000045a40, 0x2d})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008774b0, {0x562684e2a91c?, 0x562683a1b792?}, {0x10c0008d33f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzTreeID.FuzzTreeID.func1(0x10c0008774a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:61 +0xfd\nreflect.Value.call({0x562685239c60?, 0x562685491b60?, 0x2?}, {0x562684e093e8, 0x4}, {0x10c000841dd0, 0x2, 0x562683a27a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x562685239c60?, 0x562685491b60?, 0x56268521bca0?}, {0x10c000841dd0, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x562685239c60, 0x562685491b60}, {0x5626854791a0?, 0x10c0008774a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x562685239c60, 0x562685491b60})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzTreeID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:59\nmain.LibFuzzerFuzzTreeID({0x7b48c90e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.4204810193.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x562683926c01?)\n\t./main.4204810193.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2771==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000ad3 (pc 0x56268392a8a1 bp 0x10c0008d2f08 sp 0x10c0008d2ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x56268392a8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2771==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000056268392a8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000ad3 rsi = 0x0000000000000ad3 rbp = 0x000010c0008d2f08 rsp = 0x000010c0008d2ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000ad3 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2771==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzTreeID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190136 inline 8-bit counters): 190136 [0x55cbe1818820, 0x55cbe1846ed8), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190136 PCs): 190136 [0x10c000100000,0x10c0003e6b80), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55cbdea834d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4204810193.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55cbe02511e0?, 0x55cbe0da7fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00086b690, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00086b690, {0x10c000045b90, 0x2d}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00086b690, {0x55cbdfdda91c?, 0x55cbde9cb792?}, {0x10c0008ab3f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzTreeID.FuzzTreeID.func1(0x10c00086b680, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:61 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55cbe01e9c60?, 0x55cbe0441b60?, 0x2?}, {0x55cbdfdb93e8, 0x4}, {0x10c00085bf50, 0x2, 0x55cbde9d7a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55cbe01e9c60?, 0x55cbe0441b60?, 0x55cbe01cbca0?}, {0x10c00085bf50, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55cbe01e9c60, 0x55cbe0441b60}, {0x55cbe04291a0?, 0x10c00086b680?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55cbe01e9c60, 0x55cbe0441b60}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzTreeID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:59 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzTreeID({0x7b79d10e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4204810193.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55cbde8d6c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4204810193.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==2967==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b97 (pc 0x55cbde8da8a1 bp 0x10c0008aaf08 sp 0x10c0008aaef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55cbde8da8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2967==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055cbde8da8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000b97 rsi = 0x0000000000000b97 rbp = 0x000010c0008aaf08 rsp = 0x000010c0008aaef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000b97 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2967==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190110 inline 8-bit counters): 190110 [0x55694f57c820, 0x55694f5aaebe), \nINFO: Loaded 1 PC tables (190110 PCs): 190110 [0x10c000100000,0x10c0003e69e0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55694c7e84d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.3845120170.go:48 +0x1d8\npanic({0x55694dfb55c0?, 0x55694eb0bfe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0004c34b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0004c34b0, {0x10c000045590, 0x2d})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0004c34b0, {0x55694db3f905?, 0x55694c730792?}, {0x10c0004f13f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateUUID.FuzzValidateUUID.func1(0x10c0004c34a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:69 +0xfd\nreflect.Value.call({0x55694df4e040?, 0x55694e1a5f40?, 0x2?}, {0x55694db1e3e8, 0x4}, {0x10c00049bc80, 0x2, 0x55694c73ca6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55694df4e040?, 0x55694e1a5f40?, 0x55694df30080?}, {0x10c00049bc80, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55694df4e040, 0x55694e1a5f40}, {0x55694e18d580?, 0x10c0004c34a0?, 0x0?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55694df4e040, 0x55694e1a5f40})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateUUID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:67\nmain.LibFuzzerFuzzValidateUUID({0x7bf487ae1090?, 0x10c0000028c0?, 0x0?})\n\t./main.3845120170.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55694c63bc01?)\n\t./main.3845120170.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2594==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000a22 (pc 0x55694c63f8a1 bp 0x10c0004f0f08 sp 0x10c0004f0ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55694c63f8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2594==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055694c63f8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000a22 rsi = 0x0000000000000a22 rbp = 0x000010c0004f0f08 rsp = 0x000010c0004f0ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000a22 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2594==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzValidateUUID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190110 inline 8-bit counters): 190110 [0x55e745772820, 0x55e7457a0ebe), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190110 PCs): 190110 [0x10c000100000,0x10c0003e69e0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55e7429de4d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3845120170.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55e7441ab5c0?, 0x55e744d01fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00095a010, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00095a010, {0x10c000916960, 0x2d}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00095a010, {0x55e743d35905?, 0x55e742926792?}, {0x10c0009613f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateUUID.FuzzValidateUUID.func1(0x10c00095a000, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:69 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55e744144040?, 0x55e74439bf40?, 0x2?}, {0x55e743d143e8, 0x4}, {0x10c00090a750, 0x2, 0x55e742932a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55e744144040?, 0x55e74439bf40?, 0x55e744126080?}, {0x10c00090a750, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55e744144040, 0x55e74439bf40}, {0x55e744383580?, 0x10c00095a000?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55e744144040, 0x55e74439bf40}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateUUID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:67 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateUUID({0x7b3c22ce1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3845120170.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55e742831c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3845120170.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3027==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000bd3 (pc 0x55e7428358a1 bp 0x10c000960f08 sp 0x10c000960ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55e7428358a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3027==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055e7428358a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000bd3 rsi = 0x0000000000000bd3 rbp = 0x000010c000960f08 rsp = 0x000010c000960ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000bd3 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3027==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190138 inline 8-bit counters): 190138 [0x563f2d7df820, 0x563f2d80deda), \nINFO: Loaded 1 PC tables (190138 PCs): 190138 [0x10c000100000,0x10c0003e6ba0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x563f2aa4a4d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.630333871.go:48 +0x1d8\npanic({0x563f2c2181c0?, 0x563f2cd6efe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0004e94b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0004e94b0, {0x10c0007f9440, 0x36})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0004e94b0, {0x563f2bdbfeab?, 0x0?}, {0x10c0005ab3c0?, 0x0?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzCreateEntryIDFromParts.FuzzCreateEntryIDFromParts.func1(0x10c0004e94a0, {0x0, 0x0}, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:21 +0x15c\nreflect.Value.call({0x563f2c1df0c0?, 0x563f2c408b40?, 0x3?}, {0x563f2bd803e8, 0x4}, {0x10c000a17e00, 0x3, 0x563f2a99ea6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x563f2c1df0c0?, 0x563f2c408b40?, 0x563f2c192c80?}, {0x10c000a17e00, 0x3, 0x3})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x563f2c1df0c0, 0x563f2c408b40}, {0x563f2c3f0180?, 0x10c0004e94a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x563f2c1df0c0, 0x563f2c408b40})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzCreateEntryIDFromParts(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:19\nmain.LibFuzzerFuzzCreateEntryIDFromParts({0x7b755cee1090?, 0x10c0000028c0?, 0x0?})\n\t./main.630333871.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x563f2a89dc01?)\n\t./main.630333871.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2675==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000a73 (pc 0x563f2a8a18a1 bp 0x10c0005aaed8 sp 0x10c0005aaec0 T0)\nSCARINESS: 10 (signal)\n #0 0x563f2a8a18a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2675==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000563f2a8a18a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000a73 rsi = 0x0000000000000a73 rbp = 0x000010c0005aaed8 rsp = 0x000010c0005aaec0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000a73 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2675==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzCreateEntryIDFromParts -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190138 inline 8-bit counters): 190138 [0x563ce7390820, 0x563ce73beeda), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190138 PCs): 190138 [0x10c000100000,0x10c0003e6ba0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x563ce45fb4d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.630333871.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x563ce5dc91c0?, 0x563ce691ffe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0004d94b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0004d94b0, {0x10c000049d00, 0x36}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0004d94b0, {0x563ce5970eab?, 0x0?}, {0x10c0005933c0?, 0x0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzCreateEntryIDFromParts.FuzzCreateEntryIDFromParts.func1(0x10c0004d94a0, {0x0, 0x0}, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:21 +0x15c Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x563ce5d900c0?, 0x563ce5fb9b40?, 0x3?}, {0x563ce59313e8, 0x4}, {0x10c000032640, 0x3, 0x563ce454fa6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x563ce5d900c0?, 0x563ce5fb9b40?, 0x563ce5d43c80?}, {0x10c000032640, 0x3, 0x3}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x563ce5d900c0, 0x563ce5fb9b40}, {0x563ce5fa1180?, 0x10c0004d94a0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x563ce5d900c0, 0x563ce5fb9b40}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzCreateEntryIDFromParts(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:19 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzCreateEntryIDFromParts({0x7babb86e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.630333871.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x563ce444ec01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.630333871.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3085==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c0d (pc 0x563ce44528a1 bp 0x10c000592ed8 sp 0x10c000592ec0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x563ce44528a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3085==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000563ce44528a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c0d rsi = 0x0000000000000c0d rbp = 0x000010c000592ed8 rsp = 0x000010c000592ec0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c0d r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3085==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190112 inline 8-bit counters): 190112 [0x5593ca298820, 0x5593ca2c6ec0), \nINFO: Loaded 1 PC tables (190112 PCs): 190112 [0x10c000100000,0x10c0003e6a00), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5593c75044d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.996336768.go:48 +0x1d8\npanic({0x5593c8cd15a0?, 0x5593c9827fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008cf4b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008cf4b0, {0x10c0000b5880, 0x40})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008cf4b0, {0x5593c885fb0f?, 0x5593c744c792?}, {0x10c0009133f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateTreeID.FuzzValidateTreeID.func1(0x10c0008cf4a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:77 +0xfd\nreflect.Value.call({0x5593c8c6a020?, 0x5593c8ec1f20?, 0x2?}, {0x5593c883a3e8, 0x4}, {0x10c0007a9aa0, 0x2, 0x5593c7458a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x5593c8c6a020?, 0x5593c8ec1f20?, 0x5593c8c4c060?}, {0x10c0007a9aa0, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x5593c8c6a020, 0x5593c8ec1f20}, {0x5593c8ea9560?, 0x10c0008cf4a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x5593c8c6a020, 0x5593c8ec1f20})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateTreeID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:75\nmain.LibFuzzerFuzzValidateTreeID({0x7b697b2e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.996336768.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x5593c7357c01?)\n\t./main.996336768.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2718==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000a9e (pc 0x5593c735b8a1 bp 0x10c000912f08 sp 0x10c000912ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x5593c735b8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2718==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x00005593c735b8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000a9e rsi = 0x0000000000000a9e rbp = 0x000010c000912f08 rsp = 0x000010c000912ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000a9e r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2718==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzValidateTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190112 inline 8-bit counters): 190112 [0x55c86f629820, 0x55c86f657ec0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190112 PCs): 190112 [0x10c000100000,0x10c0003e6a00), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55c86c8954d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.996336768.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55c86e0625a0?, 0x55c86ebb8fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00054cb50, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00054cb50, {0x10c0009bad40, 0x40}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00054cb50, {0x55c86dbf0b0f?, 0x55c86c7dd792?}, {0x10c0004973f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateTreeID.FuzzValidateTreeID.func1(0x10c00054cb40, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:77 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55c86dffb020?, 0x55c86e252f20?, 0x2?}, {0x55c86dbcb3e8, 0x4}, {0x10c0009d9560, 0x2, 0x55c86c7e9a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55c86dffb020?, 0x55c86e252f20?, 0x55c86dfdd060?}, {0x10c0009d9560, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55c86dffb020, 0x55c86e252f20}, {0x55c86e23a560?, 0x10c00054cb40?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55c86dffb020, 0x55c86e252f20}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateTreeID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:75 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateTreeID({0x7b43ad2e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.996336768.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55c86c6e8c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.996336768.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3145==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c49 (pc 0x55c86c6ec8a1 bp 0x10c000496f08 sp 0x10c000496ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55c86c6ec8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3145==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055c86c6ec8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c49 rsi = 0x0000000000000c49 rbp = 0x000010c000496f08 rsp = 0x000010c000496ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c49 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3145==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190131 inline 8-bit counters): 190131 [0x55df9157f820, 0x55df915aded3), \nINFO: Loaded 1 PC tables (190131 PCs): 190131 [0x10c000100000,0x10c0003e6b30), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55df8e7ea4d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.2789665675.go:48 +0x1d8\npanic({0x55df8ffb8260?, 0x55df90b0efe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008c94b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008c94b0, {0x10c00099f780, 0x31})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008c94b0, {0x55df8fb49d2d?, 0x55df8e732792?}, {0x10c0008f73f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzGetTreeIDFromIDString.FuzzGetTreeIDFromIDString.func1(0x10c0008c94a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:37 +0xf6\nreflect.Value.call({0x55df8ff50ce0?, 0x55df901a8be0?, 0x2?}, {0x55df8fb203e8, 0x4}, {0x10c00089fc80, 0x2, 0x55df8e73ea6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55df8ff50ce0?, 0x55df901a8be0?, 0x55df8ff32d20?}, {0x10c00089fc80, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55df8ff50ce0, 0x55df901a8be0}, {0x55df90190220?, 0x10c0008c94a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55df8ff50ce0, 0x55df901a8be0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzGetTreeIDFromIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:35\nmain.LibFuzzerFuzzGetTreeIDFromIDString({0x7be386ae1090?, 0x10c0000028c0?, 0x0?})\n\t./main.2789665675.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55df8e63dc01?)\n\t./main.2789665675.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2831==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b0f (pc 0x55df8e6418a1 bp 0x10c0008f6f08 sp 0x10c0008f6ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55df8e6418a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2831==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055df8e6418a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b0f rsi = 0x0000000000000b0f rbp = 0x000010c0008f6f08 rsp = 0x000010c0008f6ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b0f r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2831==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzGetTreeIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190131 inline 8-bit counters): 190131 [0x55efb505d820, 0x55efb508bed3), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190131 PCs): 190131 [0x10c000100000,0x10c0003e6b30), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55efb22c84d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2789665675.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55efb3a96260?, 0x55efb45ecfe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008daf10, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008daf10, {0x10c0008ee9c0, 0x31}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008daf10, {0x55efb3627d2d?, 0x55efb2210792?}, {0x10c0004673f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetTreeIDFromIDString.FuzzGetTreeIDFromIDString.func1(0x10c0008daf00, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:37 +0xf6 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55efb3a2ece0?, 0x55efb3c86be0?, 0x2?}, {0x55efb35fe3e8, 0x4}, {0x10c0008ec720, 0x2, 0x55efb221ca6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55efb3a2ece0?, 0x55efb3c86be0?, 0x55efb3a10d20?}, {0x10c0008ec720, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55efb3a2ece0, 0x55efb3c86be0}, {0x55efb3c6e220?, 0x10c0008daf00?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55efb3a2ece0, 0x55efb3c86be0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzGetTreeIDFromIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:35 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetTreeIDFromIDString({0x7bd86dce1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2789665675.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55efb211bc01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2789665675.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3263==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000cbf (pc 0x55efb211f8a1 bp 0x10c000466f08 sp 0x10c000466ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55efb211f8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3263==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055efb211f8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000cbf rsi = 0x0000000000000cbf rbp = 0x000010c000466f08 rsp = 0x000010c000466ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000cbf r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3263==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190125 inline 8-bit counters): 190125 [0x55db51350820, 0x55db5137eecd), \nINFO: Loaded 1 PC tables (190125 PCs): 190125 [0x10c000100000,0x10c0003e6ad0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55db4e5bb4d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.1732191333.go:48 +0x1d8\npanic({0x55db4fd893a0?, 0x55db508dffe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008deb50, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008deb50, {0x10c0005fb320, 0x30})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008deb50, {0x55db4f918765?, 0x55db4e503792?}, {0x10c0008053f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateEntryID.FuzzValidateEntryID.func1(0x10c0008deb40, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:85 +0xfd\nreflect.Value.call({0x55db4fd21e20?, 0x55db4ff79d20?, 0x2?}, {0x55db4f8f13e8, 0x4}, {0x10c0008ad5f0, 0x2, 0x55db4e50fa6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55db4fd21e20?, 0x55db4ff79d20?, 0x55db4fd03e60?}, {0x10c0008ad5f0, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55db4fd21e20, 0x55db4ff79d20}, {0x55db4ff61360?, 0x10c0008deb40?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55db4fd21e20, 0x55db4ff79d20})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateEntryID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:83\nmain.LibFuzzerFuzzValidateEntryID({0x7c0dbd8e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.1732191333.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55db4e40ec01?)\n\t./main.1732191333.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2855==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b27 (pc 0x55db4e4128a1 bp 0x10c000804f08 sp 0x10c000804ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55db4e4128a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2855==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055db4e4128a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b27 rsi = 0x0000000000000b27 rbp = 0x000010c000804f08 rsp = 0x000010c000804ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b27 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2855==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzValidateEntryID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190125 inline 8-bit counters): 190125 [0x556a26abc820, 0x556a26aeaecd), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190125 PCs): 190125 [0x10c000100000,0x10c0003e6ad0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x556a23d274d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1732191333.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x556a254f53a0?, 0x556a2604bfe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c000950010, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c000950010, {0x10c000926330, 0x30}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c000950010, {0x556a25084765?, 0x556a23c6f792?}, {0x10c0009573f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateEntryID.FuzzValidateEntryID.func1(0x10c000950000, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:85 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x556a2548de20?, 0x556a256e5d20?, 0x2?}, {0x556a2505d3e8, 0x4}, {0x10c00090e0c0, 0x2, 0x556a23c7ba6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x556a2548de20?, 0x556a256e5d20?, 0x556a2546fe60?}, {0x10c00090e0c0, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x556a2548de20, 0x556a256e5d20}, {0x556a256cd360?, 0x10c000950000?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x556a2548de20, 0x556a256e5d20}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateEntryID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:83 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateEntryID({0x7c14e58e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1732191333.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x556a23b7ac01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1732191333.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3321==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000cf9 (pc 0x556a23b7e8a1 bp 0x10c000956f08 sp 0x10c000956ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x556a23b7e8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3321==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000556a23b7e8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000cf9 rsi = 0x0000000000000cf9 rbp = 0x000010c000956f08 rsp = 0x000010c000956ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000cf9 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3321==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190135 inline 8-bit counters): 190135 [0x555ea8186820, 0x555ea81b4ed7), \nINFO: Loaded 1 PC tables (190135 PCs): 190135 [0x10c000100000,0x10c0003e6b70), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x555ea53f14d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.202297833.go:48 +0x1d8\npanic({0x555ea6bbf2a0?, 0x555ea7715fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008d3690, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008d3690, {0x10c00052fe00, 0x2f})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008d3690, {0x555ea674cb27?, 0x555ea5339792?}, {0x10c0009213f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzGetUUIDFromIDString.FuzzGetUUIDFromIDString.func1(0x10c0008d3680, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:29 +0xf6\nreflect.Value.call({0x555ea6b57d20?, 0x555ea6dafc20?, 0x2?}, {0x555ea67273e8, 0x4}, {0x10c0008b1f20, 0x2, 0x555ea5345a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x555ea6b57d20?, 0x555ea6dafc20?, 0x555ea6b39d60?}, {0x10c0008b1f20, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x555ea6b57d20, 0x555ea6dafc20}, {0x555ea6d97260?, 0x10c0008d3680?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x555ea6b57d20, 0x555ea6dafc20})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzGetUUIDFromIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:27\nmain.LibFuzzerFuzzGetUUIDFromIDString({0x7c173f6e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.202297833.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x555ea5244c01?)\n\t./main.202297833.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2877==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b3d (pc 0x555ea52488a1 bp 0x10c000920f08 sp 0x10c000920ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x555ea52488a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2877==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000555ea52488a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b3d rsi = 0x0000000000000b3d rbp = 0x000010c000920f08 rsp = 0x000010c000920ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b3d r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2877==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzGetUUIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190135 inline 8-bit counters): 190135 [0x55e084199820, 0x55e0841c7ed7), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190135 PCs): 190135 [0x10c000100000,0x10c0003e6b70), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55e0814044d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.202297833.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55e082bd22a0?, 0x55e083728fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00095e010, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00095e010, {0x10c0000444b0, 0x2f}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00095e010, {0x55e08275fb27?, 0x55e08134c792?}, {0x10c0009653f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetUUIDFromIDString.FuzzGetUUIDFromIDString.func1(0x10c00095e000, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:29 +0xf6 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55e082b6ad20?, 0x55e082dc2c20?, 0x2?}, {0x55e08273a3e8, 0x4}, {0x10c000934090, 0x2, 0x55e081358a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55e082b6ad20?, 0x55e082dc2c20?, 0x55e082b4cd60?}, {0x10c000934090, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55e082b6ad20, 0x55e082dc2c20}, {0x55e082daa260?, 0x10c00095e000?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55e082b6ad20, 0x55e082dc2c20}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzGetUUIDFromIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:27 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetUUIDFromIDString({0x7b2a2c4e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.202297833.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55e081257c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.202297833.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3380==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000d34 (pc 0x55e08125b8a1 bp 0x10c000964f08 sp 0x10c000964ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55e08125b8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3380==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055e08125b8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000d34 rsi = 0x0000000000000d34 rbp = 0x000010c000964f08 rsp = 0x000010c000964ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000d34 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3380==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190138 inline 8-bit counters): 190138 [0x557feab18820, 0x557feab46eda), \nINFO: Loaded 1 PC tables (190138 PCs): 190138 [0x10c000100000,0x10c0003e6ba0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x557fe7d834d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.2433743991.go:48 +0x1d8\npanic({0x557fe95511a0?, 0x557fea0a7fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008ce010, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008ce010, {0x10c00089e5c0, 0x36})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008ce010, {0x557fe90f8eab?, 0x0?}, {0x10c0008d53c0?, 0x0?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzReturnEntryIDString.FuzzReturnEntryIDString.func1(0x10c0008ce000, {0x0, 0x0}, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:53 +0x15c\nreflect.Value.call({0x557fe95180a0?, 0x557fe9741b20?, 0x3?}, {0x557fe90b93e8, 0x4}, {0x10c0008a8050, 0x3, 0x557fe7cd7a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x557fe95180a0?, 0x557fe9741b20?, 0x557fe94cbc60?}, {0x10c0008a8050, 0x3, 0x3})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x557fe95180a0, 0x557fe9741b20}, {0x557fe9729160?, 0x10c0008ce000?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x557fe95180a0, 0x557fe9741b20})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzReturnEntryIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:51\nmain.LibFuzzerFuzzReturnEntryIDString({0x7b2c2e7e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.2433743991.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x557fe7bd6c01?)\n\t./main.2433743991.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2903==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b57 (pc 0x557fe7bda8a1 bp 0x10c0008d4ed8 sp 0x10c0008d4ec0 T0)\nSCARINESS: 10 (signal)\n #0 0x557fe7bda8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2903==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000557fe7bda8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b57 rsi = 0x0000000000000b57 rbp = 0x000010c0008d4ed8 rsp = 0x000010c0008d4ec0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b57 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2903==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpgcrkjlz3/FuzzReturnEntryIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190138 inline 8-bit counters): 190138 [0x55a8b180c820, 0x55a8b183aeda), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190138 PCs): 190138 [0x10c000100000,0x10c0003e6ba0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55a8aea774d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2433743991.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55a8b02451a0?, 0x55a8b0d9bfe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00090a010, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00090a010, {0x10c00055acc0, 0x36}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00090a010, {0x55a8afdeceab?, 0x0?}, {0x10c0009113c0?, 0x0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzReturnEntryIDString.FuzzReturnEntryIDString.func1(0x10c00090a000, {0x0, 0x0}, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:53 +0x15c Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55a8b020c0a0?, 0x55a8b0435b20?, 0x3?}, {0x55a8afdad3e8, 0x4}, {0x10c0004446e0, 0x3, 0x55a8ae9cba6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55a8b020c0a0?, 0x55a8b0435b20?, 0x55a8b01bfc60?}, {0x10c0004446e0, 0x3, 0x3}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55a8b020c0a0, 0x55a8b0435b20}, {0x55a8b041d160?, 0x10c00090a000?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55a8b020c0a0, 0x55a8b0435b20}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzReturnEntryIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:51 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzReturnEntryIDString({0x7bdac6ee1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2433743991.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55a8ae8cac01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2433743991.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3440==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000d70 (pc 0x55a8ae8ce8a1 bp 0x10c000910ed8 sp 0x10c000910ec0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55a8ae8ce8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3440==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055a8ae8ce8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000d70 rsi = 0x0000000000000d70 rbp = 0x000010c000910ed8 rsp = 0x000010c000910ec0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000d70 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3440==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ERROR: 15.686274509803921% of fuzz targets seem to be broken. See the list above for a detailed information. Step #4 - "build-check-libfuzzer-address-x86_64": ********************************************************************************\nBuild checks failed.\nTo reproduce, run:\npython infra/helper.py build_image rekor\npython infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 rekor\npython infra/helper.py check_build --sanitizer address --engine libfuzzer --architecture x86_64 rekor\n******************************************************************************** Finished Step #4 - "build-check-libfuzzer-address-x86_64" ERROR ERROR: build step 4 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1