starting build "6f9cf659-1802-45af-b764-f8a01eb3a0a6" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6" Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Sending build context to Docker daemon 5.12kB Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b549f31133a9: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2c402b3c1c2f: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5c6561396d5: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ccd6942ed3d2: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b46e60347118: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 55ea69e41097: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5d6e860d7d3: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 11202192dc12: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b28884c93391: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4c97d1652d22: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 6a812d6be828: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e68c2fa3527c: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 935821dc4c93: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c9574a9235c8: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fc4ea0408340: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 66cdd82a217c: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c79233615af7: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4a57f2efd839: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b437320e1a60: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e39e802b3ce2: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 90cd4fbf37e0: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4d89074feeb9: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2008765f6086: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 07af864f11a4: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9c7f64f3fd89: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 19899e344280: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 8dcec2efe63d: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5d6e860d7d3: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 06ca184f6385: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": f198a0ccadfd: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 11202192dc12: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 71662828eda3: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1d13cdf70869: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b28884c93391: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1f10d96ed13c: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 943e5698151a: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": da23fb04c1a1: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9a31504a0fbc: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": d7b26aade5d3: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9bc83ab7b163: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4c97d1652d22: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e4746fff5f31: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fbc20cf0da84: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c7948c42c8f1: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 6a812d6be828: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9e65bd4fb815: Pulling fs layer Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e68c2fa3527c: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b437320e1a60: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9c7f64f3fd89: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 935821dc4c93: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c9574a9235c8: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e39e802b3ce2: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 71662828eda3: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fc4ea0408340: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 90cd4fbf37e0: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 06ca184f6385: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 66cdd82a217c: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 19899e344280: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 8dcec2efe63d: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1d13cdf70869: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 07af864f11a4: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": f198a0ccadfd: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4d89074feeb9: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1f10d96ed13c: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e4746fff5f31: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4a57f2efd839: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 943e5698151a: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9bc83ab7b163: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9a31504a0fbc: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fbc20cf0da84: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c7948c42c8f1: Waiting Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5c6561396d5: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b46e60347118: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b46e60347118: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 11202192dc12: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 11202192dc12: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5d6e860d7d3: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5d6e860d7d3: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b549f31133a9: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b549f31133a9: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ccd6942ed3d2: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ccd6942ed3d2: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 6a812d6be828: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 6a812d6be828: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e68c2fa3527c: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e68c2fa3527c: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 935821dc4c93: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 935821dc4c93: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c9574a9235c8: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c9574a9235c8: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2c402b3c1c2f: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2c402b3c1c2f: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 66cdd82a217c: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 66cdd82a217c: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fc4ea0408340: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fc4ea0408340: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c79233615af7: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c79233615af7: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4c97d1652d22: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4c97d1652d22: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4a57f2efd839: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4a57f2efd839: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b437320e1a60: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b437320e1a60: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e39e802b3ce2: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e39e802b3ce2: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 90cd4fbf37e0: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 90cd4fbf37e0: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4d89074feeb9: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4d89074feeb9: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2008765f6086: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2008765f6086: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9c7f64f3fd89: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9c7f64f3fd89: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b549f31133a9: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 07af864f11a4: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 19899e344280: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 8dcec2efe63d: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 06ca184f6385: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 06ca184f6385: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": f198a0ccadfd: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": f198a0ccadfd: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1f10d96ed13c: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1f10d96ed13c: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1d13cdf70869: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1d13cdf70869: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 943e5698151a: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 943e5698151a: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b28884c93391: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b28884c93391: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 71662828eda3: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 71662828eda3: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": da23fb04c1a1: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": da23fb04c1a1: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9a31504a0fbc: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9a31504a0fbc: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": d7b26aade5d3: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fbc20cf0da84: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9e65bd4fb815: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9e65bd4fb815: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9bc83ab7b163: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9bc83ab7b163: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e4746fff5f31: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 55ea69e41097: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 55ea69e41097: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2c402b3c1c2f: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c7948c42c8f1: Verifying Checksum Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c7948c42c8f1: Download complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5c6561396d5: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ccd6942ed3d2: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b46e60347118: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 55ea69e41097: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e5d6e860d7d3: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 11202192dc12: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b28884c93391: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4c97d1652d22: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 6a812d6be828: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e68c2fa3527c: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 935821dc4c93: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c9574a9235c8: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fc4ea0408340: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 66cdd82a217c: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c79233615af7: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4a57f2efd839: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": b437320e1a60: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e39e802b3ce2: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 90cd4fbf37e0: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 4d89074feeb9: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 2008765f6086: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 07af864f11a4: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9c7f64f3fd89: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 19899e344280: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 8dcec2efe63d: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 06ca184f6385: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": f198a0ccadfd: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 71662828eda3: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1d13cdf70869: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 1f10d96ed13c: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 943e5698151a: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": da23fb04c1a1: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9a31504a0fbc: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": d7b26aade5d3: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9bc83ab7b163: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": e4746fff5f31: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": fbc20cf0da84: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": c7948c42c8f1: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": 9e65bd4fb815: Pull complete Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Digest: sha256:4e1ebbd689975e9b579680757948ae482a0a4fc812536b698b3ec1240061fd24 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> d22c7eb38d12 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Step 2/6 : RUN git clone --depth 1 https://github.com/sigstore/rekor Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> Running in 13e3917dd268 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Cloning into 'rekor'... Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Removing intermediate container 13e3917dd268 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> 8469be0b2cb6 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Step 3/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> Running in 41d0c1d7844e Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Cloning into 'instrumentation'... Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Removing intermediate container 41d0c1d7844e Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> 6441166ff39b Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Step 4/6 : RUN git clone --depth=1 https://github.com/sassoftware/relic Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> Running in d43b9e2a7088 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Cloning into 'relic'... Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Removing intermediate container d43b9e2a7088 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> 8bc7bbe49d19 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Step 5/6 : COPY build.sh $SRC Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> e6b6a29471e9 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Step 6/6 : WORKDIR $SRC/rekor/pkg Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> Running in 4874fc930526 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Removing intermediate container 4874fc930526 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": ---> 3dd612fd8b79 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Successfully built 3dd612fd8b79 Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Successfully tagged gcr.io/oss-fuzz/rekor:latest Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rekor:latest Finished Step #1 - "build-19b54cc5-6f8e-4ae2-bd85-45ed005f3db6" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rekor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filelyl8DN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/relic/.git Step #2 - "srcmap": + GIT_DIR=/src/relic Step #2 - "srcmap": + cd /src/relic Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sassoftware/relic Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bdc9acbfe6a439c79e51d931bccf4d0e9e49f233 Step #2 - "srcmap": + jq_inplace /tmp/filelyl8DN '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileopGPka Step #2 - "srcmap": + cat /tmp/filelyl8DN Step #2 - "srcmap": + jq '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": + mv /tmp/fileopGPka /tmp/filelyl8DN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/filelyl8DN '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileXIJsBG Step #2 - "srcmap": + cat /tmp/filelyl8DN Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/fileXIJsBG /tmp/filelyl8DN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rekor/.git Step #2 - "srcmap": + GIT_DIR=/src/rekor Step #2 - "srcmap": + cd /src/rekor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/rekor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d5157644690af94138f4d4f2d419f5ec74833f65 Step #2 - "srcmap": + jq_inplace /tmp/filelyl8DN '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "d5157644690af94138f4d4f2d419f5ec74833f65" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileVmKybg Step #2 - "srcmap": + cat /tmp/filelyl8DN Step #2 - "srcmap": + jq '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "d5157644690af94138f4d4f2d419f5ec74833f65" }' Step #2 - "srcmap": + mv /tmp/fileVmKybg /tmp/filelyl8DN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filelyl8DN Step #2 - "srcmap": + rm /tmp/filelyl8DN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/relic": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sassoftware/relic", Step #2 - "srcmap": "rev": "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/rekor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/rekor", Step #2 - "srcmap": "rev": "d5157644690af94138f4d4f2d419f5ec74833f65" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + export 'CXX=clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + CXX='clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + /src/rekor/tests/oss_fuzz.sh Step #3 - "compile-libfuzzer-address-x86_64": sed: can't read /src/rekor/pkg/pki/x509/e2e.go: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": sed: can't read /src/rekor/pkg/util/util.go: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/redis/go-redis/v9 v9.18.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmoiron/sqlx v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/release-utils v0.12.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/crypto v0.49.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/runtime v0.29.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/protobuf-specs v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/profiler v0.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/errors v0.22.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-chi/chi/v5 v5.2.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/loads v0.23.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/strfmt v0.26.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/validate v0.25.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/spec v0.22.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20220623050100-57a0ce2678a7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230919221257-8b5d3ce2d11d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/conv v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic v7.2.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/trillian v1.7.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic/v7 v7.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/viper v1.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cobra v1.10.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/DATA-DOG/go-sqlmock v1.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go v0.123.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-redis/redismock/v9 v9.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.36.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/zap v1.27.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/in-toto/in-toto-golang v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.20.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/veraison/go-cose v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore v1.10.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/secure-systems-lab/go-securesystemslib v0.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.52.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/transparency-dev/merkle v0.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jedisct1/go-minisign v0.0.0-20211028175153-1c139d1cc84b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260319201613-d00831a3d3e7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.79.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto v0.0.0-20260316180232-0b37fe3546d5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/mock v1.7.0-rc.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/ini.v1 v1.67.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/theupdateframework/go-tuf v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/mod v0.33.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliercoder/go-rpm v0.0.0-20200122174316-8cb9fd9c31a8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/typeutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be Step #3 - "compile-libfuzzer-address-x86_64": go: downloading filippo.io/edwards25519 v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/oklog/ulid/v2 v2.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sagikazarmark/locafero v0.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/afero v1.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cast v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/cmdutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/fileutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonname v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/loading v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/mangling v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/netutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/stringutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/yamlutils v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/analysis v0.24.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/iam v1.5.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/pubsub/v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/api v0.274.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel v1.42.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.42.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.42.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/aws v1.10.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/azure v1.10.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.10.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.10.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go-awskms/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go-gcpkms/v2 v2.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/pubsub v1.50.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go/v2 v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.step.sm/crypto v0.76.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/testify/v2 v2.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.32.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/gomega v1.25.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/pprof v0.0.0-20250602020802-c6617b811d0e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.36.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gocloud.dev v0.45.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/rpmpack v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/codahale/rfc6979 v0.0.0-20141003034818-6a90f24967eb Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/compress v1.18.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.42.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.22.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/testify/enable/yaml/v2 v2.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260316180232-0b37fe3546d5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/shibumi/go-pathspec v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-containerregistry v0.20.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/term v0.41.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliercoder/badio v0.0.0-20160213150051-ce5280129e9e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sourcegraph/conc v0.3.1-0.20240121214520-5f936abd7ae8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.35.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonutils/fixtures_test v0.25.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.41.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.32.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.50.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jellydator/ttlcache/v3 v3.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/kms v1.26.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/vault/api v1.22.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fatih/color v1.18.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-colorable v0.1.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/storage v1.57.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.42.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.42.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliergopher/cpio v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/pgzip v1.2.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ulikunitz/xz v0.5.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zalando/go-keyring v0.2.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/atomic v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zeebo/xxh3 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/smithy-go v1.24.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/wire v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.20.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.92.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.19.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.18 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/signin v1.0.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.30.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.15 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.41.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.18 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.einride.tech/aip v0.79.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/longrunning v0.8.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/hcl v1.0.1-vault-7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/nxadm/tail v1.4.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/alessio/shellescape v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/danieljoos/wincred v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20240903120638-7835f813f4da Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-replayers/grpcreplay v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-replayers/httpreplay v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.0.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/auth v0.18.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.54.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.37.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.32.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.4.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.9.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.18 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.19.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.18 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/natefinch/atomic v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.36.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.30.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.54.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.54.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20250820121507-0af2bda4dd1d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gonum.org/v1/gonum v0.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.14.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20251210132809-ee656c7534f5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/martian/v3 v3.3.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.63.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/logging v1.13.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/trace v1.11.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spiffe/go-spiffe/v2 v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cel.dev/expr v0.25.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.63.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/keybase/go-keychain v0.0.1 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/pki/factory_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/pki/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3170161008/ossFuzzOverlayFile.json1921168936 -o FuzzKeys.a ./main.1881008383.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild299495409/ossFuzzOverlayFile.json2310842006 -o FuzzCreateEntryIDFromParts.a ./main.2752319253.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4282930769/ossFuzzOverlayFile.json1138536931 -o FuzzGetUUIDFromIDString.a ./main.3265038485.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1178261875/ossFuzzOverlayFile.json2268987873 -o FuzzGetTreeIDFromIDString.a ./main.1207284713.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3119295511/ossFuzzOverlayFile.json2796527541 -o FuzzPadToTreeIDLen.a ./main.1060128637.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3655606491/ossFuzzOverlayFile.json3295912582 -o FuzzReturnEntryIDString.a ./main.3936677638.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1503156160/ossFuzzOverlayFile.json3497030440 -o FuzzTreeID.a ./main.2506514058.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild642832816/ossFuzzOverlayFile.json523198913 -o FuzzValidateUUID.a ./main.544188806.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild643180445/ossFuzzOverlayFile.json2409932589 -o FuzzValidateTreeID.a ./main.730112684.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3139838050/ossFuzzOverlayFile.json2618444537 -o FuzzValidateEntryID.a ./main.3457452141.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/file_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/memory_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/signer_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/tink_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2825331840/ossFuzzOverlayFile.json1323408777 -o FuzzNewFile.a ./main.4279396226.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1833263030/ossFuzzOverlayFile.json1096340395 -o FuzzCoseCreateProposedEntry.a ./main.2544726990.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2979806947/ossFuzzOverlayFile.json2519830677 -o FuzzCoseUnmarshalAndCanonicalize.a ./main.605378585.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild782680503/ossFuzzOverlayFile.json3522349097 -o FuzzCoseDecodeEntryDirectMapAndRaw.a ./main.2502151610.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/hashedrekord_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4235632591/ossFuzzOverlayFile.json2097034646 -o FuzzHashedRekord.a ./main.3658314845.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1024948381/ossFuzzOverlayFile.json2770379492 -o FuzzHashedRekordCreateProposedEntry.a ./main.337032319.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild659802577/ossFuzzOverlayFile.json2742107200 -o FuzzHashedRekordUnmarshalAndCanonicalize.a ./main.2640553229.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2173083779/ossFuzzOverlayFile.json3596598608 -o FuzzHashedRekordDecodeEntryDirectMapAndRaw.a ./main.1049325538.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/alpine_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/apk_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3053610082/ossFuzzOverlayFile.json2290672440 -o FuzzPackageUnmarshal.a ./main.3528766191.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1905299910/ossFuzzOverlayFile.json2275077802 -o FuzzAlpineCreateProposedEntry.a ./main.3228956008.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2297859761/ossFuzzOverlayFile.json2900995206 -o FuzzAlpineUnmarshalAndCanonicalize.a ./main.728428590.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3358234845/ossFuzzOverlayFile.json849785402 -o FuzzAlpineDecodeEntryDirectMapAndRaw.a ./main.1260166619.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/jar_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild535886779/ossFuzzOverlayFile.json1453899869 -o FuzzJarUnmarshal.a ./main.339072531.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3920395860/ossFuzzOverlayFile.json113804706 -o FuzzJarCreateProposedEntry.a ./main.2005252754.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1517257618/ossFuzzOverlayFile.json2760739958 -o FuzzJarUnmarshalAndCanonicalize.a ./main.658994074.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2987590106/ossFuzzOverlayFile.json4070550083 -o FuzzJarDecodeEntryDirectMapAndRaw.a ./main.310209577.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1629269092/ossFuzzOverlayFile.json486822966 -o FuzzIntotoCreateProposedEntry_v001.a ./main.3320250010.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3902808852/ossFuzzOverlayFile.json2375818766 -o FuzzIntotoUnmarshalAndCanonicalize_v001.a ./main.2963057963.go] Step #3 - "compile-libfuzzer-address-x86_64": Could not find the function: func FuzzIntotoDecodeEntryDirectMapAndRaw(f *testing.F) Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild933225475/ossFuzzOverlayFile.json3434054595 -o FuzzIntotoCreateProposedEntry_v002.a ./main.632764921.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1813797157/ossFuzzOverlayFile.json2161834018 -o FuzzIntotoUnmarshalAndCanonicalize_v002.a ./main.910957632.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3984090893/ossFuzzOverlayFile.json603288938 -o FuzzIntotoDecodeEntryDirectMapAndRaw.a ./main.532142248.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1419364678/ossFuzzOverlayFile.json760401660 -o FuzzTufCreateProposedEntry.a ./main.4088844728.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild858397723/ossFuzzOverlayFile.json3009034147 -o FuzzTufUnmarshalAndCanonicalize.a ./main.3608294297.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2040274456/ossFuzzOverlayFile.json387938284 -o FuzzTufDecodeEntryDirectMapAndRaw.a ./main.3460734258.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2429137280/ossFuzzOverlayFile.json214735504 -o FuzzRfc3161CreateProposedEntry.a ./main.3491969407.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4267478365/ossFuzzOverlayFile.json4040043114 -o FuzzRfc3161UnmarshalAndCanonicalize.a ./main.1824360879.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2449761919/ossFuzzOverlayFile.json248608204 -o FuzzRfc3161DecodeEntryDirectMapAndRaw.a ./main.3869845251.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3114948416/ossFuzzOverlayFile.json2161287665 -o FuzzRpmCreateProposedEntry.a ./main.1848728262.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild88574222/ossFuzzOverlayFile.json1548691123 -o FuzzRpmUnmarshalAndCanonicalize.a ./main.4176920476.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild193091293/ossFuzzOverlayFile.json936002412 -o FuzzRpmDecodeEntryDirectMapAndRaw.a ./main.2451516305.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1763486484/ossFuzzOverlayFile.json255568699 -o FuzzHelmCreateProposedEntry.a ./main.112386732.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3175675994/ossFuzzOverlayFile.json443755368 -o FuzzHelmUnmarshalAndCanonicalize.a ./main.3629335093.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1676924437/ossFuzzOverlayFile.json1366862335 -o FuzzHelmProvenanceUnmarshal.a ./main.2475615038.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3315112901/ossFuzzOverlayFile.json4065555702 -o FuzzHelmDecodeEntryDirectMapAndRaw.a ./main.3853294646.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4230639084/ossFuzzOverlayFile.json4089342388 -o FuzzRekordCreateProposedEntry.a ./main.1978488059.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1325701400/ossFuzzOverlayFile.json3021364992 -o FuzzRekordUnmarshalAndCanonicalize.a ./main.1141493601.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild601698300/ossFuzzOverlayFile.json223885005 -o FuzzRekordDecodeEntryDirectMapAndRaw.a ./main.1574938360.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3718230635/ossFuzzOverlayFile.json1726118664 -o FuzzDSSECreateProposedEntry.a ./main.2747961476.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3065729397/ossFuzzOverlayFile.json1688609262 -o FuzzDSSEUnmarshalAndCanonicalize.a ./main.1684825583.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1678458583/ossFuzzOverlayFile.json72793860 -o FuzzDSSEDecodeEntryDirectMapAndRaw.a ./main.1062997770.go] Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cloudflare/circl v1.3.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zalando/go-keyring v0.2.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading al.essio.dev/pkg/shellescape v1.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/danieljoos/wincred v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/passprompt Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/binpatch Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs7 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs9 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/zipslicer Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/config Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/certloader Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/x509tools Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/signers/sigerrors Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/binpatch in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/x509tools in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/signers/sigerrors in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/passprompt in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs7 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs9 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/config in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/certloader in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/zipslicer in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1765222355/ossFuzzOverlayFile.json3895821137 -o FuzzJarutilsVerify.a ./main.4013700544.go] Step #3 - "compile-libfuzzer-address-x86_64": adding: src/rekor/tests/fuzz-testdata/seeds/alpine/FuzzPackageUnmarshal/FuzzPackageUnmarshal_seed1 (deflated 98%) Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 2c402b3c1c2f: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": e5c6561396d5: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 1dd777c18394: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0ad3bc70d6dd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4c9b68cb5dfd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c9d5dfc94f1e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b8dbf37b8620: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": bb205a3dc9cc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c4eeab10f79e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": cca326168272: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7c199061c6a2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4c36015dfdac: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b7b768cc5428: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f1b8dd26cdbd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": dce33d072688: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": aac573a12fea: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 71d7d5a7448b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6f024dd074fa: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4ee6bcd85df9: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0a0c2a9027fe: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a5962fd4e081: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fdb83425ff4b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 12f6c061e1a1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8cc0cd0a619d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8fa4b61077eb: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": cca326168272: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d1e148e672c1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7d1810a3ce9f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 71d7d5a7448b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a5962fd4e081: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4ee6bcd85df9: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6f024dd074fa: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fdb83425ff4b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d1e148e672c1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7c199061c6a2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 12f6c061e1a1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4c36015dfdac: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0a0c2a9027fe: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b7b768cc5428: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7d1810a3ce9f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8fa4b61077eb: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f1b8dd26cdbd: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": dce33d072688: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": aac573a12fea: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c4eeab10f79e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b8dbf37b8620: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b8dbf37b8620: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1dd777c18394: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0ad3bc70d6dd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0ad3bc70d6dd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c9d5dfc94f1e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c9d5dfc94f1e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c4eeab10f79e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c4eeab10f79e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": cca326168272: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c9b68cb5dfd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4c9b68cb5dfd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1dd777c18394: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7c199061c6a2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7c199061c6a2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f1b8dd26cdbd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f1b8dd26cdbd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": dce33d072688: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b7b768cc5428: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b7b768cc5428: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0ad3bc70d6dd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 71d7d5a7448b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 71d7d5a7448b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4ee6bcd85df9: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4ee6bcd85df9: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c9b68cb5dfd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0a0c2a9027fe: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0a0c2a9027fe: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bb205a3dc9cc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": bb205a3dc9cc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c9d5dfc94f1e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 12f6c061e1a1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 12f6c061e1a1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c36015dfdac: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4c36015dfdac: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b8dbf37b8620: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fdb83425ff4b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8fa4b61077eb: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8fa4b61077eb: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7d1810a3ce9f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7d1810a3ce9f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8cc0cd0a619d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8cc0cd0a619d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": aac573a12fea: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": aac573a12fea: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a5962fd4e081: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a5962fd4e081: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d1e148e672c1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d1e148e672c1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6f024dd074fa: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6f024dd074fa: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bb205a3dc9cc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c4eeab10f79e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": cca326168272: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7c199061c6a2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c36015dfdac: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b7b768cc5428: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f1b8dd26cdbd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": dce33d072688: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": aac573a12fea: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 71d7d5a7448b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6f024dd074fa: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4ee6bcd85df9: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0a0c2a9027fe: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a5962fd4e081: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fdb83425ff4b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 12f6c061e1a1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8cc0cd0a619d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8fa4b61077eb: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d1e148e672c1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7d1810a3ce9f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:33e2bfc298d08050aa42a5ab2203c0c9432cb24c1952268dae9f53e50211c6ad Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRpmDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzTufCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHashedRekord Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHashedRekordUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRekordCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzJarUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHashedRekordDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzCoseUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzTufUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHelmProvenanceUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHelmCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzKeys Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzCoseCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzIntotoUnmarshalAndCanonicalize_v001 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzCoseDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRpmUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRpmCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRekordUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRekordDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRfc3161CreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzDSSEDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRfc3161UnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzPadToTreeIDLen Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzJarDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHelmUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzNewFile Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzJarCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzRfc3161DecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzJarutilsVerify Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzAlpineUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzIntotoDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzAlpineDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzAlpineCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzTufDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzDSSECreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHashedRekordCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzIntotoCreateProposedEntry_v001 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzJarUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzIntotoUnmarshalAndCanonicalize_v002 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzDSSEUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzIntotoCreateProposedEntry_v002 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzPackageUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzHelmDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": Retrying failed fuzz targets sequentially 8 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString Step #4 - "build-check-libfuzzer-address-x86_64": Broken fuzz targets 8 Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzTreeID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzTreeID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzTreeID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190549 inline 8-bit counters): 190549 [0x55ed0c339080, 0x55ed0c3678d5), \nINFO: Loaded 1 PC tables (190549 PCs): 190549 [0x10c000100000,0x10c0003e8550), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55ed095864d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.2506514058.go:48 +0x1d8\npanic({0x55ed0ad63c40?, 0x55ed0b8c7fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008e85b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008e85b0, {0x10c00060ef60, 0x2d})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008e85b0, {0x55ed0a8ea9f1?, 0x55ed094ce792?}, {0x10c0009273f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzTreeID.FuzzTreeID.func1(0x10c0008e85a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:61 +0xfd\nreflect.Value.call({0x55ed0acfbc20?, 0x55ed0af576a0?, 0x2?}, {0x55ed0a8c93e8, 0x4}, {0x10c000625770, 0x2, 0x55ed094daa6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55ed0acfbc20?, 0x55ed0af576a0?, 0x55ed0acdd960?}, {0x10c000625770, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55ed0acfbc20, 0x55ed0af576a0}, {0x55ed0af3e900?, 0x10c0008e85a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55ed0acfbc20, 0x55ed0af576a0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzTreeID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:59\nmain.LibFuzzerFuzzTreeID({0x7b40564e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.2506514058.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55ed093d9c01?)\n\t./main.2506514058.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2793==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000ae9 (pc 0x55ed093dd8a1 bp 0x10c000926f08 sp 0x10c000926ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55ed093dd8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2793==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055ed093dd8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000ae9 rsi = 0x0000000000000ae9 rbp = 0x000010c000926f08 rsp = 0x000010c000926ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000ae9 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2793==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzTreeID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190549 inline 8-bit counters): 190549 [0x55dda313d080, 0x55dda316b8d5), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190549 PCs): 190549 [0x10c000100000,0x10c0003e8550), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55dda038a4d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2506514058.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55dda1b67c40?, 0x55dda26cbfe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00046d4b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00046d4b0, {0x10c000045620, 0x2d}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00046d4b0, {0x55dda16ee9f1?, 0x55dda02d2792?}, {0x10c0006273f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzTreeID.FuzzTreeID.func1(0x10c00046d4a0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:61 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55dda1affc20?, 0x55dda1d5b6a0?, 0x2?}, {0x55dda16cd3e8, 0x4}, {0x10c000469ce0, 0x2, 0x55dda02dea6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55dda1affc20?, 0x55dda1d5b6a0?, 0x55dda1ae1960?}, {0x10c000469ce0, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55dda1affc20, 0x55dda1d5b6a0}, {0x55dda1d42900?, 0x10c00046d4a0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55dda1affc20, 0x55dda1d5b6a0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzTreeID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:59 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzTreeID({0x7b6d296e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2506514058.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55dda01ddc01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2506514058.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==2963==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b93 (pc 0x55dda01e18a1 bp 0x10c000626f08 sp 0x10c000626ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55dda01e18a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2963==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055dda01e18a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000b93 rsi = 0x0000000000000b93 rbp = 0x000010c000626f08 rsp = 0x000010c000626ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000b93 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0x00000000000001f8 Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2963==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190523 inline 8-bit counters): 190523 [0x56410b02c080, 0x56410b05a8bb), \nINFO: Loaded 1 PC tables (190523 PCs): 190523 [0x10c000100000,0x10c0003e83b0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x56410827a4d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.544188806.go:48 +0x1d8\npanic({0x564109a57000?, 0x56410a5bafe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c00083f4b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c00083f4b0, {0x10c0005236b0, 0x2d})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c00083f4b0, {0x5641095dd9da?, 0x5641081c2792?}, {0x10c0008773f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateUUID.FuzzValidateUUID.func1(0x10c00083f4a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:69 +0xfd\nreflect.Value.call({0x5641099eefe0?, 0x564109c4aa60?, 0x2?}, {0x5641095bc3e8, 0x4}, {0x10c000821d40, 0x2, 0x5641081cea6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x5641099eefe0?, 0x564109c4aa60?, 0x5641099d0d20?}, {0x10c000821d40, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x5641099eefe0, 0x564109c4aa60}, {0x564109c31cc0?, 0x10c00083f4a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x5641099eefe0, 0x564109c4aa60})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateUUID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:67\nmain.LibFuzzerFuzzValidateUUID({0x7be6a12e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.544188806.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x5641080cdc01?)\n\t./main.544188806.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2728==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000aa8 (pc 0x5641080d18a1 bp 0x10c000876f08 sp 0x10c000876ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x5641080d18a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2728==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x00005641080d18a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000aa8 rsi = 0x0000000000000aa8 rbp = 0x000010c000876f08 rsp = 0x000010c000876ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000aa8 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2728==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzValidateUUID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190523 inline 8-bit counters): 190523 [0x55c4af34c080, 0x55c4af37a8bb), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190523 PCs): 190523 [0x10c000100000,0x10c0003e83b0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55c4ac59a4d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.544188806.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55c4add77000?, 0x55c4ae8dafe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008a54b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008a54b0, {0x10c000892cc0, 0x2d}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008a54b0, {0x55c4ad8fd9da?, 0x55c4ac4e2792?}, {0x10c0009273f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateUUID.FuzzValidateUUID.func1(0x10c0008a54a0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:69 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55c4add0efe0?, 0x55c4adf6aa60?, 0x2?}, {0x55c4ad8dc3e8, 0x4}, {0x10c00089f440, 0x2, 0x55c4ac4eea6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55c4add0efe0?, 0x55c4adf6aa60?, 0x55c4adcf0d20?}, {0x10c00089f440, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55c4add0efe0, 0x55c4adf6aa60}, {0x55c4adf51cc0?, 0x10c0008a54a0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55c4add0efe0, 0x55c4adf6aa60}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateUUID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:67 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateUUID({0x7ba622de1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.544188806.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55c4ac3edc01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.544188806.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3023==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000bcf (pc 0x55c4ac3f18a1 bp 0x10c000926f08 sp 0x10c000926ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55c4ac3f18a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3023==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055c4ac3f18a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000bcf rsi = 0x0000000000000bcf rbp = 0x000010c000926f08 rsp = 0x000010c000926ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000bcf r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3023==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190551 inline 8-bit counters): 190551 [0x55c06438d080, 0x55c0643bb8d7), \nINFO: Loaded 1 PC tables (190551 PCs): 190551 [0x10c000100000,0x10c0003e8570), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55c0615da4d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.2752319253.go:48 +0x1d8\npanic({0x55c062db7bc0?, 0x55c06391bfe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c000921870, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c000921870, {0x10c000520cc0, 0x36})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c000921870, {0x55c06295d0aa?, 0x0?}, {0x10c00048f3c0?, 0x0?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzCreateEntryIDFromParts.FuzzCreateEntryIDFromParts.func1(0x10c000921860, {0x0, 0x0}, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:21 +0x15c\nreflect.Value.call({0x55c062d7e480?, 0x55c062fab620?, 0x3?}, {0x55c06291d3e8, 0x4}, {0x10c0005bc6e0, 0x3, 0x55c06152ea6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55c062d7e480?, 0x55c062fab620?, 0x55c062d318e0?}, {0x10c0005bc6e0, 0x3, 0x3})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55c062d7e480, 0x55c062fab620}, {0x55c062f92880?, 0x10c000921860?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55c062d7e480, 0x55c062fab620})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzCreateEntryIDFromParts(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:19\nmain.LibFuzzerFuzzCreateEntryIDFromParts({0x7bdaf72e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.2752319253.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55c06142dc01?)\n\t./main.2752319253.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2765==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000acd (pc 0x55c0614318a1 bp 0x10c00048eed8 sp 0x10c00048eec0 T0)\nSCARINESS: 10 (signal)\n #0 0x55c0614318a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2765==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055c0614318a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000acd rsi = 0x0000000000000acd rbp = 0x000010c00048eed8 rsp = 0x000010c00048eec0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000acd r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2765==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzCreateEntryIDFromParts -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190551 inline 8-bit counters): 190551 [0x55ce88532080, 0x55ce885608d7), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190551 PCs): 190551 [0x10c000100000,0x10c0003e8570), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55ce8577f4d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2752319253.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55ce86f5cbc0?, 0x55ce87ac0fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0005bb4b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0005bb4b0, {0x10c000049a40, 0x36}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0005bb4b0, {0x55ce86b020aa?, 0x0?}, {0x10c0008e13c0?, 0x0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzCreateEntryIDFromParts.FuzzCreateEntryIDFromParts.func1(0x10c0005bb4a0, {0x0, 0x0}, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:21 +0x15c Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55ce86f23480?, 0x55ce87150620?, 0x3?}, {0x55ce86ac23e8, 0x4}, {0x10c000935cc0, 0x3, 0x55ce856d3a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55ce86f23480?, 0x55ce87150620?, 0x55ce86ed68e0?}, {0x10c000935cc0, 0x3, 0x3}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55ce86f23480, 0x55ce87150620}, {0x55ce87137880?, 0x10c0005bb4a0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55ce86f23480, 0x55ce87150620}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzCreateEntryIDFromParts(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:19 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzCreateEntryIDFromParts({0x7b7254ae1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2752319253.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55ce855d2c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2752319253.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3083==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c0b (pc 0x55ce855d68a1 bp 0x10c0008e0ed8 sp 0x10c0008e0ec0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55ce855d68a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3083==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055ce855d68a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c0b rsi = 0x0000000000000c0b rbp = 0x000010c0008e0ed8 rsp = 0x000010c0008e0ec0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c0b r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3083==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190525 inline 8-bit counters): 190525 [0x562007708080, 0x5620077368bd), \nINFO: Loaded 1 PC tables (190525 PCs): 190525 [0x10c000100000,0x10c0003e83d0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5620049564d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.730112684.go:48 +0x1d8\npanic({0x562006132fe0?, 0x562006c96fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008e14b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008e14b0, {0x10c000a11440, 0x40})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008e14b0, {0x562005cbdc01?, 0x56200489e792?}, {0x10c00092d3f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateTreeID.FuzzValidateTreeID.func1(0x10c0008e14a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:77 +0xfd\nreflect.Value.call({0x5620060cafc0?, 0x562006326a40?, 0x2?}, {0x562005c983e8, 0x4}, {0x10c0007abb00, 0x2, 0x5620048aaa6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x5620060cafc0?, 0x562006326a40?, 0x5620060acd00?}, {0x10c0007abb00, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x5620060cafc0, 0x562006326a40}, {0x56200630dca0?, 0x10c0008e14a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x5620060cafc0, 0x562006326a40})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateTreeID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:75\nmain.LibFuzzerFuzzValidateTreeID({0x7b664dce1090?, 0x10c0000028c0?, 0x0?})\n\t./main.730112684.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x5620047a9c01?)\n\t./main.730112684.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2730==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000aaa (pc 0x5620047ad8a1 bp 0x10c00092cf08 sp 0x10c00092cef0 T0)\nSCARINESS: 10 (signal)\n #0 0x5620047ad8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2730==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x00005620047ad8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000aaa rsi = 0x0000000000000aaa rbp = 0x000010c00092cf08 rsp = 0x000010c00092cef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000aaa r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2730==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzValidateTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190525 inline 8-bit counters): 190525 [0x555abafc2080, 0x555abaff08bd), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190525 PCs): 190525 [0x10c000100000,0x10c0003e83d0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x555ab82104d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.730112684.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x555ab99ecfe0?, 0x555aba550fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c000845a50, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c000845a50, {0x10c0000b5180, 0x40}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c000845a50, {0x555ab9577c01?, 0x555ab8158792?}, {0x10c0008e73f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateTreeID.FuzzValidateTreeID.func1(0x10c000845a40, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:77 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x555ab9984fc0?, 0x555ab9be0a40?, 0x2?}, {0x555ab95523e8, 0x4}, {0x10c000855470, 0x2, 0x555ab8164a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x555ab9984fc0?, 0x555ab9be0a40?, 0x555ab9966d00?}, {0x10c000855470, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x555ab9984fc0, 0x555ab9be0a40}, {0x555ab9bc7ca0?, 0x10c000845a40?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x555ab9984fc0, 0x555ab9be0a40}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateTreeID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:75 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateTreeID({0x7b55688e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.730112684.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x555ab8063c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.730112684.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3142==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c46 (pc 0x555ab80678a1 bp 0x10c0008e6f08 sp 0x10c0008e6ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x555ab80678a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3142==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000555ab80678a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c46 rsi = 0x0000000000000c46 rbp = 0x000010c0008e6f08 rsp = 0x000010c0008e6ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c46 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3142==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190544 inline 8-bit counters): 190544 [0x55a707073080, 0x55a7070a18d0), \nINFO: Loaded 1 PC tables (190544 PCs): 190544 [0x10c000100000,0x10c0003e8500), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55a7042c14d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.1207284713.go:48 +0x1d8\npanic({0x55a705a9dcc0?, 0x55a706601fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0007ad870, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0007ad870, {0x10c00092ecc0, 0x31})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0007ad870, {0x55a70562ce7a?, 0x55a704209792?}, {0x10c00094b3f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzGetTreeIDFromIDString.FuzzGetTreeIDFromIDString.func1(0x10c0007ad860, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:37 +0xf6\nreflect.Value.call({0x55a705a35ca0?, 0x55a705c91720?, 0x2?}, {0x55a7056033e8, 0x4}, {0x10c000a014a0, 0x2, 0x55a704215a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55a705a35ca0?, 0x55a705c91720?, 0x55a705a179e0?}, {0x10c000a014a0, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55a705a35ca0, 0x55a705c91720}, {0x55a705c78980?, 0x10c0007ad860?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55a705a35ca0, 0x55a705c91720})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzGetTreeIDFromIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:35\nmain.LibFuzzerFuzzGetTreeIDFromIDString({0x7b20c58e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.1207284713.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55a704114c01?)\n\t./main.1207284713.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2831==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b0f (pc 0x55a7041188a1 bp 0x10c00094af08 sp 0x10c00094aef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55a7041188a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2831==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055a7041188a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b0f rsi = 0x0000000000000b0f rbp = 0x000010c00094af08 rsp = 0x000010c00094aef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b0f r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2831==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzGetTreeIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190544 inline 8-bit counters): 190544 [0x55f07af02080, 0x55f07af308d0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190544 PCs): 190544 [0x10c000100000,0x10c0003e8500), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55f0781504d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1207284713.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55f07992ccc0?, 0x55f07a490fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00085d690, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00085d690, {0x10c000882940, 0x31}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00085d690, {0x55f0794bbe7a?, 0x55f078098792?}, {0x10c0008d33f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetTreeIDFromIDString.FuzzGetTreeIDFromIDString.func1(0x10c00085d680, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:37 +0xf6 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55f0798c4ca0?, 0x55f079b20720?, 0x2?}, {0x55f0794923e8, 0x4}, {0x10c0008cc000, 0x2, 0x55f0780a4a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55f0798c4ca0?, 0x55f079b20720?, 0x55f0798a69e0?}, {0x10c0008cc000, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55f0798c4ca0, 0x55f079b20720}, {0x55f079b07980?, 0x10c00085d680?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55f0798c4ca0, 0x55f079b20720}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzGetTreeIDFromIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:35 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetTreeIDFromIDString({0x7b23b6ce1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1207284713.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55f077fa3c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1207284713.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3203==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c83 (pc 0x55f077fa78a1 bp 0x10c0008d2f08 sp 0x10c0008d2ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55f077fa78a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3203==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055f077fa78a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c83 rsi = 0x0000000000000c83 rbp = 0x000010c0008d2f08 rsp = 0x000010c0008d2ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c83 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3203==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190538 inline 8-bit counters): 190538 [0x563862142080, 0x5638621708ca), \nINFO: Loaded 1 PC tables (190538 PCs): 190538 [0x10c000100000,0x10c0003e84a0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x56385f3904d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.3457452141.go:48 +0x1d8\npanic({0x563860b6cde0?, 0x5638616d0fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c000915870, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c000915870, {0x10c000910d50, 0x30})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c000915870, {0x5638606f9893?, 0x56385f2d8792?}, {0x10c0008693f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateEntryID.FuzzValidateEntryID.func1(0x10c000915860, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:85 +0xfd\nreflect.Value.call({0x563860b04dc0?, 0x563860d60840?, 0x2?}, {0x5638606d23e8, 0x4}, {0x10c00091d470, 0x2, 0x56385f2e4a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x563860b04dc0?, 0x563860d60840?, 0x563860ae6b00?}, {0x10c00091d470, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x563860b04dc0, 0x563860d60840}, {0x563860d47aa0?, 0x10c000915860?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x563860b04dc0, 0x563860d60840})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateEntryID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:83\nmain.LibFuzzerFuzzValidateEntryID({0x7b7d90fe1090?, 0x10c0000028c0?, 0x0?})\n\t./main.3457452141.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x56385f1e3c01?)\n\t./main.3457452141.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2855==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b27 (pc 0x56385f1e78a1 bp 0x10c000868f08 sp 0x10c000868ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x56385f1e78a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2855==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000056385f1e78a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b27 rsi = 0x0000000000000b27 rbp = 0x000010c000868f08 rsp = 0x000010c000868ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b27 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2855==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzValidateEntryID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190538 inline 8-bit counters): 190538 [0x564c14ce1080, 0x564c14d0f8ca), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190538 PCs): 190538 [0x10c000100000,0x10c0003e84a0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x564c11f2f4d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3457452141.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x564c1370bde0?, 0x564c1426ffe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008fe3d0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008fe3d0, {0x10c000875ce0, 0x30}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008fe3d0, {0x564c13298893?, 0x564c11e77792?}, {0x10c0009493f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateEntryID.FuzzValidateEntryID.func1(0x10c0008fe3c0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:85 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x564c136a3dc0?, 0x564c138ff840?, 0x2?}, {0x564c132713e8, 0x4}, {0x10c0008b5ef0, 0x2, 0x564c11e83a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x564c136a3dc0?, 0x564c138ff840?, 0x564c13685b00?}, {0x10c0008b5ef0, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x564c136a3dc0, 0x564c138ff840}, {0x564c138e6aa0?, 0x10c0008fe3c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x564c136a3dc0, 0x564c138ff840}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateEntryID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:83 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateEntryID({0x7b656eee1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3457452141.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x564c11d82c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3457452141.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3262==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000cbe (pc 0x564c11d868a1 bp 0x10c000948f08 sp 0x10c000948ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x564c11d868a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3262==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000564c11d868a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000cbe rsi = 0x0000000000000cbe rbp = 0x000010c000948f08 rsp = 0x000010c000948ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000cbe r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3262==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190548 inline 8-bit counters): 190548 [0x55631d7c0080, 0x55631d7ee8d4), \nINFO: Loaded 1 PC tables (190548 PCs): 190548 [0x10c000100000,0x10c0003e8540), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55631aa0d4d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.3265038485.go:48 +0x1d8\npanic({0x55631c1eacc0?, 0x55631cd4efe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c00088b4b0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c00088b4b0, {0x10c000882c90, 0x2f})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c00088b4b0, {0x55631bd75c19?, 0x55631a955792?}, {0x10c00091b3f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzGetUUIDFromIDString.FuzzGetUUIDFromIDString.func1(0x10c00088b4a0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:29 +0xf6\nreflect.Value.call({0x55631c182ca0?, 0x55631c3de720?, 0x2?}, {0x55631bd503e8, 0x4}, {0x10c000885440, 0x2, 0x55631a961a6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55631c182ca0?, 0x55631c3de720?, 0x55631c1649e0?}, {0x10c000885440, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55631c182ca0, 0x55631c3de720}, {0x55631c3c5980?, 0x10c00088b4a0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55631c182ca0, 0x55631c3de720})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzGetUUIDFromIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:27\nmain.LibFuzzerFuzzGetUUIDFromIDString({0x7b8752ae1090?, 0x10c0000028c0?, 0x0?})\n\t./main.3265038485.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55631a860c01?)\n\t./main.3265038485.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2900==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b54 (pc 0x55631a8648a1 bp 0x10c00091af08 sp 0x10c00091aef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55631a8648a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2900==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055631a8648a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b54 rsi = 0x0000000000000b54 rbp = 0x000010c00091af08 rsp = 0x000010c00091aef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b54 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2900==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzGetUUIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190548 inline 8-bit counters): 190548 [0x5569ca198080, 0x5569ca1c68d4), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190548 PCs): 190548 [0x10c000100000,0x10c0003e8540), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5569c73e54d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3265038485.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x5569c8bc2cc0?, 0x5569c9726fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c000822010, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c000822010, {0x10c000a0ae70, 0x2f}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c000822010, {0x5569c874dc19?, 0x5569c732d792?}, {0x10c0008853f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetUUIDFromIDString.FuzzGetUUIDFromIDString.func1(0x10c000822000, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:29 +0xf6 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x5569c8b5aca0?, 0x5569c8db6720?, 0x2?}, {0x5569c87283e8, 0x4}, {0x10c000a2f470, 0x2, 0x5569c7339a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x5569c8b5aca0?, 0x5569c8db6720?, 0x5569c8b3c9e0?}, {0x10c000a2f470, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x5569c8b5aca0, 0x5569c8db6720}, {0x5569c8d9d980?, 0x10c000822000?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x5569c8b5aca0, 0x5569c8db6720}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzGetUUIDFromIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:27 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetUUIDFromIDString({0x7b3abc9e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3265038485.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x5569c7238c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3265038485.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3319==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000cf7 (pc 0x5569c723c8a1 bp 0x10c000884f08 sp 0x10c000884ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x5569c723c8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3319==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x00005569c723c8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000cf7 rsi = 0x0000000000000cf7 rbp = 0x000010c000884f08 rsp = 0x000010c000884ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000cf7 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3319==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (190551 inline 8-bit counters): 190551 [0x55bd11e69080, 0x55bd11e978d7), \nINFO: Loaded 1 PC tables (190551 PCs): 190551 [0x10c000100000,0x10c0003e8570), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55bd0f0b64d3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.3936677638.go:48 +0x1d8\npanic({0x55bd10893be0?, 0x55bd113f7fe0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c000954010, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c000954010, {0x10c000938cc0, 0x36})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c000954010, {0x55bd104390aa?, 0x0?}, {0x10c00095b3c0?, 0x0?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzReturnEntryIDString.FuzzReturnEntryIDString.func1(0x10c000954000, {0x0, 0x0}, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:53 +0x15c\nreflect.Value.call({0x55bd1085a4a0?, 0x55bd10a87640?, 0x3?}, {0x55bd103f93e8, 0x4}, {0x10c0004526e0, 0x3, 0x55bd0f00aa6f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55bd1085a4a0?, 0x55bd10a87640?, 0x55bd1080d900?}, {0x10c0004526e0, 0x3, 0x3})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55bd1085a4a0, 0x55bd10a87640}, {0x55bd10a6e8a0?, 0x10c000954000?, 0x0?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55bd1085a4a0, 0x55bd10a87640})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzReturnEntryIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:51\nmain.LibFuzzerFuzzReturnEntryIDString({0x7be25e8e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.3936677638.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55bd0ef09c01?)\n\t./main.3936677638.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2878==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b3e (pc 0x55bd0ef0d8a1 bp 0x10c00095aed8 sp 0x10c00095aec0 T0)\nSCARINESS: 10 (signal)\n #0 0x55bd0ef0d8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2878==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055bd0ef0d8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000b3e rsi = 0x0000000000000b3e rbp = 0x000010c00095aed8 rsp = 0x000010c00095aec0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000b3e r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2878==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpyrlhxxoj/FuzzReturnEntryIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (190551 inline 8-bit counters): 190551 [0x562a81a58080, 0x562a81a868d7), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (190551 PCs): 190551 [0x10c000100000,0x10c0003e8570), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x562a7eca54d3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3936677638.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x562a80482be0?, 0x562a80fe6fe0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008594b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008594b0, {0x10c000049e80, 0x36}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008594b0, {0x562a800280aa?, 0x0?}, {0x10c0008a13c0?, 0x0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzReturnEntryIDString.FuzzReturnEntryIDString.func1(0x10c0008594a0, {0x0, 0x0}, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:53 +0x15c Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x562a804494a0?, 0x562a80676640?, 0x3?}, {0x562a7ffe83e8, 0x4}, {0x10c000991ef0, 0x3, 0x562a7ebf9a6f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x562a804494a0?, 0x562a80676640?, 0x562a803fc900?}, {0x10c000991ef0, 0x3, 0x3}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x562a804494a0, 0x562a80676640}, {0x562a8065d8a0?, 0x10c0008594a0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x562a804494a0, 0x562a80676640}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzReturnEntryIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:51 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzReturnEntryIDString({0x7b321eee1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3936677638.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x562a7eaf8c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3936677638.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3379==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000d33 (pc 0x562a7eafc8a1 bp 0x10c0008a0ed8 sp 0x10c0008a0ec0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x562a7eafc8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3379==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000562a7eafc8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000d33 rsi = 0x0000000000000d33 rbp = 0x000010c0008a0ed8 rsp = 0x000010c0008a0ec0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000d33 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3379==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ERROR: 15.686274509803921% of fuzz targets seem to be broken. See the list above for a detailed information. Step #4 - "build-check-libfuzzer-address-x86_64": ********************************************************************************\nBuild checks failed.\nTo reproduce, run:\npython infra/helper.py build_image rekor\npython infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 rekor\npython infra/helper.py check_build --sanitizer address --engine libfuzzer --architecture x86_64 rekor\n******************************************************************************** Finished Step #4 - "build-check-libfuzzer-address-x86_64" ERROR ERROR: build step 4 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1