starting build "9d4a39cf-f206-40d5-bf06-511456ecc669" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135" Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Sending build context to Docker daemon 5.12kB Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b549f31133a9: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 008b78875541: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 928200867a41: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 27b7a26b85d4: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a5e1771809e3: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 70f394e24d88: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 97282320daea: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 084e0bb7df2e: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 5c5100cceda4: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 821b83b191f6: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d81097e72e7d: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 803044b7ee78: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 691ebee164a5: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 60571253bd26: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 97282320daea: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f00f7198f32e: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 7053b8449387: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": aafc0234d757: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 084e0bb7df2e: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": cec7ed9d0583: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6eefca9e564c: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 5c5100cceda4: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c928f0812557: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518b6ac13880: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518cb7ba5e44: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 285afb20e2bf: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a757778216ab: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 821b83b191f6: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d81097e72e7d: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": aafc0234d757: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": cec7ed9d0583: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 803044b7ee78: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6eefca9e564c: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 691ebee164a5: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6391c2b1d795: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 842cf51c9a6b: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 285afb20e2bf: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 60571253bd26: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518cb7ba5e44: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 2fe8e3b03c01: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f00f7198f32e: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 49d5be5f779c: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": fb0270479a6d: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c1e518b6d49d: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c928f0812557: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d6363374623a: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6391c2b1d795: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c54e66c7917f: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 17a7c59b458e: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 842cf51c9a6b: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 49d5be5f779c: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 2fe8e3b03c01: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c1e518b6d49d: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 8d71bc11c21d: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ef81f2346731: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f6feba9aabba: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 35e8dab17623: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d91eb602c335: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b9e2e8d9e42b: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b446bfd6d011: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 50392ea4ebac: Pulling fs layer Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d6363374623a: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c54e66c7917f: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b9e2e8d9e42b: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 35e8dab17623: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 8d71bc11c21d: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d91eb602c335: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ef81f2346731: Waiting Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a5e1771809e3: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a5e1771809e3: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 928200867a41: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 928200867a41: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 084e0bb7df2e: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 084e0bb7df2e: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 97282320daea: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 97282320daea: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b549f31133a9: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b549f31133a9: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 27b7a26b85d4: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 27b7a26b85d4: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d81097e72e7d: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d81097e72e7d: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 803044b7ee78: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 803044b7ee78: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 691ebee164a5: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 691ebee164a5: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 60571253bd26: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f00f7198f32e: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f00f7198f32e: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 7053b8449387: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 7053b8449387: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 821b83b191f6: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 821b83b191f6: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 008b78875541: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 008b78875541: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": aafc0234d757: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": aafc0234d757: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": cec7ed9d0583: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": cec7ed9d0583: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c928f0812557: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c928f0812557: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6eefca9e564c: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518b6ac13880: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518b6ac13880: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518cb7ba5e44: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518cb7ba5e44: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a757778216ab: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6391c2b1d795: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6391c2b1d795: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 285afb20e2bf: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 285afb20e2bf: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 2fe8e3b03c01: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 2fe8e3b03c01: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 842cf51c9a6b: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b549f31133a9: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 49d5be5f779c: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 49d5be5f779c: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": fb0270479a6d: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": fb0270479a6d: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d6363374623a: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 17a7c59b458e: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 17a7c59b458e: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c1e518b6d49d: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c1e518b6d49d: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c54e66c7917f: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c54e66c7917f: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f6feba9aabba: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 5c5100cceda4: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 5c5100cceda4: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 8d71bc11c21d: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 8d71bc11c21d: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ef81f2346731: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 50392ea4ebac: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 50392ea4ebac: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b9e2e8d9e42b: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b9e2e8d9e42b: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 35e8dab17623: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 35e8dab17623: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d91eb602c335: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d91eb602c335: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 70f394e24d88: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 70f394e24d88: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b446bfd6d011: Verifying Checksum Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b446bfd6d011: Download complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 008b78875541: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 928200867a41: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 27b7a26b85d4: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a5e1771809e3: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 70f394e24d88: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 97282320daea: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 084e0bb7df2e: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 5c5100cceda4: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 821b83b191f6: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d81097e72e7d: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 803044b7ee78: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 691ebee164a5: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 60571253bd26: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f00f7198f32e: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 7053b8449387: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": aafc0234d757: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": cec7ed9d0583: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6eefca9e564c: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c928f0812557: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518b6ac13880: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 518cb7ba5e44: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 285afb20e2bf: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": a757778216ab: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 6391c2b1d795: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 842cf51c9a6b: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 2fe8e3b03c01: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 49d5be5f779c: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": fb0270479a6d: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c1e518b6d49d: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d6363374623a: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": c54e66c7917f: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 17a7c59b458e: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 8d71bc11c21d: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ef81f2346731: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": f6feba9aabba: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 35e8dab17623: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": d91eb602c335: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b9e2e8d9e42b: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": b446bfd6d011: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": 50392ea4ebac: Pull complete Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Digest: sha256:ea86a586d4df0bf148a6d399ba2e5acba3cc4780aef5174fea1eb6f3881848ff Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> 27f534b05774 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Step 2/6 : RUN git clone --depth 1 https://github.com/sigstore/rekor Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> Running in 68803431bc0b Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Cloning into 'rekor'... Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Removing intermediate container 68803431bc0b Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> c2281cb9cd6e Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Step 3/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> Running in ba6b1dbb21b2 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Cloning into 'instrumentation'... Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Removing intermediate container ba6b1dbb21b2 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> 14088decbc2a Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Step 4/6 : RUN git clone --depth=1 https://github.com/sassoftware/relic Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> Running in eacd8307440c Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Cloning into 'relic'... Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Removing intermediate container eacd8307440c Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> c6784e5252a3 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Step 5/6 : COPY build.sh $SRC Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> 280b908768a3 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Step 6/6 : WORKDIR $SRC/rekor/pkg Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> Running in e301b20593de Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Removing intermediate container e301b20593de Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": ---> 65500f0d41e9 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Successfully built 65500f0d41e9 Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Successfully tagged gcr.io/oss-fuzz/rekor:latest Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rekor:latest Finished Step #1 - "build-4f49b782-0118-49e0-9316-f21f64447135" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rekor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileTFoFeO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/relic/.git Step #2 - "srcmap": + GIT_DIR=/src/relic Step #2 - "srcmap": + cd /src/relic Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sassoftware/relic Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bdc9acbfe6a439c79e51d931bccf4d0e9e49f233 Step #2 - "srcmap": + jq_inplace /tmp/fileTFoFeO '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filegu0Apd Step #2 - "srcmap": + cat /tmp/fileTFoFeO Step #2 - "srcmap": + jq '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": + mv /tmp/filegu0Apd /tmp/fileTFoFeO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/fileTFoFeO '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filevCuqqH Step #2 - "srcmap": + cat /tmp/fileTFoFeO Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/filevCuqqH /tmp/fileTFoFeO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rekor/.git Step #2 - "srcmap": + GIT_DIR=/src/rekor Step #2 - "srcmap": + cd /src/rekor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/rekor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9e9ad1667f1f15c57c4eb2b94d0a659bffcba551 Step #2 - "srcmap": + jq_inplace /tmp/fileTFoFeO '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "9e9ad1667f1f15c57c4eb2b94d0a659bffcba551" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filesQGcue Step #2 - "srcmap": + cat /tmp/fileTFoFeO Step #2 - "srcmap": + jq '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "9e9ad1667f1f15c57c4eb2b94d0a659bffcba551" }' Step #2 - "srcmap": + mv /tmp/filesQGcue /tmp/fileTFoFeO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileTFoFeO Step #2 - "srcmap": + rm /tmp/fileTFoFeO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/relic": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sassoftware/relic", Step #2 - "srcmap": "rev": "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/rekor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/rekor", Step #2 - "srcmap": "rev": "9e9ad1667f1f15c57c4eb2b94d0a659bffcba551" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + export 'CXX=clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + CXX='clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + /src/rekor/tests/oss_fuzz.sh Step #3 - "compile-libfuzzer-address-x86_64": sed: can't read /src/rekor/pkg/pki/x509/e2e.go: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": sed: can't read /src/rekor/pkg/util/util.go: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/errors v0.22.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/profiler v0.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/runtime v0.29.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/loads v0.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/zap v1.27.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-chi/chi/v5 v5.2.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/viper v1.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/protobuf-specs v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/strfmt v0.25.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/redis/go-redis/v9 v9.14.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/validate v0.25.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmoiron/sqlx v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cobra v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.36.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jedisct1/go-minisign v0.0.0-20211028175153-1c139d1cc84b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore v1.9.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/spec v0.22.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.18.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/DATA-DOG/go-sqlmock v1.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-redis/redismock/v9 v9.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go v0.121.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20220623050100-57a0ce2678a7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic v7.2.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/iam v1.5.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/conv v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/crypto v0.45.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/theupdateframework/go-tuf v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/release-utils v0.12.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/trillian v1.7.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gocloud.dev v0.40.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230919221257-8b5d3ce2d11d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/pubsub/v2 v2.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/in-toto/in-toto-golang v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/api v0.256.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/transparency-dev/merkle v0.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/mock v1.7.0-rc.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/aws v1.9.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/pubsub v1.50.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/veraison/go-cose v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/secure-systems-lab/go-securesystemslib v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic/v7 v7.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/azure v1.9.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.76.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20251103181224-f26f9409b101 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250603155806-513f23925822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.9.6-0.20250729224751-181c5d3339b3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/rpmpack v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.9.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliercoder/go-rpm v0.0.0-20200122174316-8cb9fd9c31a8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go-awskms/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go-gcpkms/v2 v2.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tink-crypto/tink-go/v2 v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.step.sm/crypto v0.74.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/mod v0.30.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/cmdutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/fileutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonname v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/loading v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/mangling v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/netutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/stringutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/typeutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/yamlutils v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/oklog/ulid v1.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.mongodb.org/mongo-driver v1.17.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading filippo.io/edwards25519 v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sagikazarmark/locafero v0.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/afero v1.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cast v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/analysis v0.24.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel v1.38.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.38.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.38.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/testify/v2 v2.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/gomega v1.25.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.32.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/letsencrypt/boulder v0.0.0-20240620165639-de9c06129bec Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/term v0.37.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-containerregistry v0.20.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/pprof v0.0.0-20250602020802-c6617b811d0e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.33.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250818200422-3122310a409c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.22.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.38.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.39.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.31.16 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.47.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jellydator/ttlcache/v3 v3.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/codahale/rfc6979 v0.0.0-20141003034818-6a90f24967eb Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/shibumi/go-pathspec v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.19.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/kms v1.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliergopher/cpio v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/pgzip v1.2.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ulikunitz/xz v0.5.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/vault/api v1.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cavaliercoder/badio v0.0.0-20160213150051-ce5280129e9e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/testify/enable/yaml/v2 v2.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag/jsonutils/fixtures_test v0.25.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.31.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/storage v1.56.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/wire v0.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.17.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.58.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/smithy-go v1.23.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sourcegraph/conc v0.3.1-0.20240121214520-5f936abd7ae8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fatih/color v1.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-colorable v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.38.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zalando/go-keyring v0.2.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.einride.tech/aip v0.73.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.18.20 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.30.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/titanous/rocacheck v0.0.0-20171023193734-afe73141d399 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/longrunning v0.6.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.1.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.14.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20240716161551-93cc26a95ae9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-replayers/grpcreplay v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-replayers/httpreplay v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/auth v0.17.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.53.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.36.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.38.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.36.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.15 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.17 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.15 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/nxadm/tail v1.4.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/alessio/shellescape v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/danieljoos/wincred v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.32.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmhodges/clock v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.29.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.53.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.53.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.32.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20250820121507-0af2bda4dd1d Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/martian/v3 v3.3.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/logging v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/trace v1.11.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20250501225837-2ac532fd4443 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.13.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gonum.org/v1/gonum v0.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spiffe/go-spiffe/v2 v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cel.dev/expr v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zeebo/errs v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.61.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/keybase/go-keychain v0.0.1 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/pki/factory_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/pki/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2517136718/ossFuzzOverlayFile.json2022721268 -o FuzzKeys.a ./main.572389751.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2418817717/ossFuzzOverlayFile.json145276647 -o FuzzCreateEntryIDFromParts.a ./main.3189934329.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild288613611/ossFuzzOverlayFile.json1761765764 -o FuzzGetUUIDFromIDString.a ./main.2859405470.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1447341507/ossFuzzOverlayFile.json1903357114 -o FuzzGetTreeIDFromIDString.a ./main.4100412296.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild566660838/ossFuzzOverlayFile.json737011997 -o FuzzPadToTreeIDLen.a ./main.2094577037.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1379686758/ossFuzzOverlayFile.json1112727432 -o FuzzReturnEntryIDString.a ./main.1738754590.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild831588557/ossFuzzOverlayFile.json976193737 -o FuzzTreeID.a ./main.1654768348.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3360352182/ossFuzzOverlayFile.json1273000278 -o FuzzValidateUUID.a ./main.1400474193.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild970809220/ossFuzzOverlayFile.json895026831 -o FuzzValidateTreeID.a ./main.2101803625.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/log_index_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/ranges_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/shard_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/sharding/sharding_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4248053752/ossFuzzOverlayFile.json3411025716 -o FuzzValidateEntryID.a ./main.4202665311.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/file_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/memory_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/signer_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/signer/tink_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild227484704/ossFuzzOverlayFile.json3027379929 -o FuzzNewFile.a ./main.3194395331.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2894302070/ossFuzzOverlayFile.json652807261 -o FuzzCoseCreateProposedEntry.a ./main.2722204293.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3803501793/ossFuzzOverlayFile.json3325271450 -o FuzzCoseUnmarshalAndCanonicalize.a ./main.1545397730.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/cose/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1446809813/ossFuzzOverlayFile.json1657957894 -o FuzzCoseDecodeEntryDirectMapAndRaw.a ./main.2074053798.go] Step #3 - "compile-libfuzzer-address-x86_64": Could not find the function: func FuzzHashedRekord(f *testing.F) Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3540055446/ossFuzzOverlayFile.json3572449714 -o FuzzHashedRekordCreateProposedEntry.a ./main.984814614.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild695441102/ossFuzzOverlayFile.json3648144957 -o FuzzHashedRekordUnmarshalAndCanonicalize.a ./main.2293425480.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/hashedrekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4268270558/ossFuzzOverlayFile.json3771519207 -o FuzzHashedRekordDecodeEntryDirectMapAndRaw.a ./main.1843202739.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/alpine_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/apk_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1912703935/ossFuzzOverlayFile.json1781204849 -o FuzzPackageUnmarshal.a ./main.3754739613.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2522098668/ossFuzzOverlayFile.json1916487385 -o FuzzAlpineCreateProposedEntry.a ./main.253508756.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3140484603/ossFuzzOverlayFile.json106584301 -o FuzzAlpineUnmarshalAndCanonicalize.a ./main.2286935880.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/alpine/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2351405769/ossFuzzOverlayFile.json2529357092 -o FuzzAlpineDecodeEntryDirectMapAndRaw.a ./main.44120015.go] Step #3 - "compile-libfuzzer-address-x86_64": Could not find the function: func FuzzJarUnmarshal(f *testing.F) Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1191288379/ossFuzzOverlayFile.json2432547563 -o FuzzJarCreateProposedEntry.a ./main.423693833.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1571271076/ossFuzzOverlayFile.json2993152578 -o FuzzJarUnmarshalAndCanonicalize.a ./main.2721494000.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3774815713/ossFuzzOverlayFile.json3124667733 -o FuzzJarDecodeEntryDirectMapAndRaw.a ./main.3280690060.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2521541482/ossFuzzOverlayFile.json334140733 -o FuzzIntotoCreateProposedEntry_v001.a ./main.2685345338.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2079814930/ossFuzzOverlayFile.json3864793912 -o FuzzIntotoUnmarshalAndCanonicalize_v001.a ./main.2410985720.go] Step #3 - "compile-libfuzzer-address-x86_64": panic: Could not find the fuzz func Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": goroutine 1 [running]: Step #3 - "compile-libfuzzer-address-x86_64": main.main() Step #3 - "compile-libfuzzer-address-x86_64": /tmp/go-118-fuzz-build/main.go:142 +0x1425 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3063918333/ossFuzzOverlayFile.json2681035939 -o FuzzIntotoCreateProposedEntry_v002.a ./main.2102599241.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1489170169/ossFuzzOverlayFile.json2656497633 -o FuzzIntotoUnmarshalAndCanonicalize_v002.a ./main.3808684415.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/intoto/v0.0.2/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3587851892/ossFuzzOverlayFile.json1798135817 -o FuzzIntotoDecodeEntryDirectMapAndRaw.a ./main.2778688967.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3592779821/ossFuzzOverlayFile.json4064652451 -o FuzzTufCreateProposedEntry.a ./main.3711758257.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3859904686/ossFuzzOverlayFile.json2686065603 -o FuzzTufUnmarshalAndCanonicalize.a ./main.2143898325.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/tuf/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild272715419/ossFuzzOverlayFile.json1945968795 -o FuzzTufDecodeEntryDirectMapAndRaw.a ./main.4039286514.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3995655432/ossFuzzOverlayFile.json3335956502 -o FuzzRfc3161CreateProposedEntry.a ./main.4241630868.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild606754398/ossFuzzOverlayFile.json3283810843 -o FuzzRfc3161UnmarshalAndCanonicalize.a ./main.2235431019.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rfc3161/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3979043461/ossFuzzOverlayFile.json1838980133 -o FuzzRfc3161DecodeEntryDirectMapAndRaw.a ./main.2163535472.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3198579717/ossFuzzOverlayFile.json1962224693 -o FuzzRpmCreateProposedEntry.a ./main.2683445158.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild35665433/ossFuzzOverlayFile.json2154834343 -o FuzzRpmUnmarshalAndCanonicalize.a ./main.203365451.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rpm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1454820181/ossFuzzOverlayFile.json2240394001 -o FuzzRpmDecodeEntryDirectMapAndRaw.a ./main.3742617104.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3527652042/ossFuzzOverlayFile.json3858569404 -o FuzzHelmCreateProposedEntry.a ./main.1397857037.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild886658521/ossFuzzOverlayFile.json2030702609 -o FuzzHelmUnmarshalAndCanonicalize.a ./main.4111300857.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3664732617/ossFuzzOverlayFile.json4113183651 -o FuzzHelmProvenanceUnmarshal.a ./main.1298473756.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/helm/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3139280055/ossFuzzOverlayFile.json1283557758 -o FuzzHelmDecodeEntryDirectMapAndRaw.a ./main.1795195812.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4089745490/ossFuzzOverlayFile.json1039054591 -o FuzzRekordCreateProposedEntry.a ./main.3861455549.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3160740451/ossFuzzOverlayFile.json4073072756 -o FuzzRekordUnmarshalAndCanonicalize.a ./main.4275276145.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/rekord/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild162130779/ossFuzzOverlayFile.json1757996971 -o FuzzRekordDecodeEntryDirectMapAndRaw.a ./main.269233283.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild119863534/ossFuzzOverlayFile.json3242468098 -o FuzzDSSECreateProposedEntry.a ./main.2114349153.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1658903896/ossFuzzOverlayFile.json110655922 -o FuzzDSSEUnmarshalAndCanonicalize.a ./main.2413097294.go] Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/e2e_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/dsse/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1116635490/ossFuzzOverlayFile.json1469596575 -o FuzzDSSEDecodeEntryDirectMapAndRaw.a ./main.2239393616.go] Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cloudflare/circl v1.3.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.71.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zalando/go-keyring v0.2.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading al.essio.dev/pkg/shellescape v1.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/danieljoos/wincred v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.18.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.26 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.4.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/zipslicer Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs9 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/config Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs7 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/binpatch Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/passprompt Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/signers/sigerrors Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/x509tools Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/certloader Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/binpatch in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/x509tools in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/signers/sigerrors in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/passprompt in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs7 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs9 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/config in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/certloader in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found github.com/sassoftware/relic/v8/lib/zipslicer in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/benchmark_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/entry_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/rekor/pkg/types/jar/v0.0.1/fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2831594003/ossFuzzOverlayFile.json3372081523 -o FuzzJarutilsVerify.a ./main.2572717505.go] Step #3 - "compile-libfuzzer-address-x86_64": adding: src/rekor/tests/fuzz-testdata/seeds/alpine/FuzzPackageUnmarshal/FuzzPackageUnmarshal_seed1 (deflated 98%) Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 008b78875541: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 928200867a41: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": e7cd04c0c651: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2e730abeb9a2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7cb36f62a147: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5fc815f8f116: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 66351cb039d1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ee161dad15dd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": df4ad2b82919: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e6f50db343a4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1633885ce418: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8838d43ac745: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4b8a05eb7225: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1b081b11f788: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 69d5a41678e3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c03a704cb7e7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0445055a93fc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b344c7fa3b43: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 107622352030: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 77a39b7d8a1b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f92d6f2459f0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b5bafa58a602: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5ca1715a5de7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7b998ee89cc2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 32c73a5c2cdc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": afe53b633b2b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 69d5a41678e3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c03a704cb7e7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0445055a93fc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b344c7fa3b43: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 107622352030: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 32c73a5c2cdc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": afe53b633b2b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7b998ee89cc2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 77a39b7d8a1b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f92d6f2459f0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b5bafa58a602: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": df4ad2b82919: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e6f50db343a4: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5ca1715a5de7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4b8a05eb7225: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1633885ce418: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8838d43ac745: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7cb36f62a147: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7cb36f62a147: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 66351cb039d1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 66351cb039d1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e7cd04c0c651: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e7cd04c0c651: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5fc815f8f116: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5fc815f8f116: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2e730abeb9a2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2e730abeb9a2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e6f50db343a4: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e6f50db343a4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": df4ad2b82919: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": df4ad2b82919: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1633885ce418: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1633885ce418: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e7cd04c0c651: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1b081b11f788: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1b081b11f788: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 69d5a41678e3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 69d5a41678e3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4b8a05eb7225: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0445055a93fc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0445055a93fc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ee161dad15dd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ee161dad15dd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 77a39b7d8a1b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 77a39b7d8a1b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 107622352030: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2e730abeb9a2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7cb36f62a147: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5ca1715a5de7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5ca1715a5de7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b5bafa58a602: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8838d43ac745: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8838d43ac745: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 32c73a5c2cdc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 32c73a5c2cdc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": afe53b633b2b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": afe53b633b2b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5fc815f8f116: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7b998ee89cc2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7b998ee89cc2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 66351cb039d1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c03a704cb7e7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c03a704cb7e7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f92d6f2459f0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f92d6f2459f0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b344c7fa3b43: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b344c7fa3b43: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ee161dad15dd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": df4ad2b82919: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e6f50db343a4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1633885ce418: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8838d43ac745: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4b8a05eb7225: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1b081b11f788: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 69d5a41678e3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c03a704cb7e7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0445055a93fc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b344c7fa3b43: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 107622352030: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 77a39b7d8a1b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f92d6f2459f0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b5bafa58a602: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5ca1715a5de7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7b998ee89cc2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 32c73a5c2cdc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": afe53b633b2b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:a06a1dccaef5db5b29674ec3d533d88af07a0c874ca3bbb7efd1a37f18b38713 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRpmDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzTufCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHashedRekordUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRekordCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzJarUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHashedRekordDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzCoseUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzTufUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHelmProvenanceUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHelmCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzKeys Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzCoseCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzIntotoUnmarshalAndCanonicalize_v001 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzCoseDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRpmUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRpmCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRekordUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzPadToTreeIDLen Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRfc3161CreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzDSSEDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRfc3161UnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRekordDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzJarDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzJarCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHelmUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzNewFile Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzRfc3161DecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzJarutilsVerify Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzAlpineUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzIntotoDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzAlpineDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzAlpineCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzTufDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzDSSECreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHashedRekordCreateProposedEntry Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzIntotoCreateProposedEntry_v001 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzIntotoUnmarshalAndCanonicalize_v002 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzDSSEUnmarshalAndCanonicalize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzIntotoCreateProposedEntry_v002 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzPackageUnmarshal Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzHelmDecodeEntryDirectMapAndRaw Step #4 - "build-check-libfuzzer-address-x86_64": Retrying failed fuzz targets sequentially 8 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString Step #4 - "build-check-libfuzzer-address-x86_64": Broken fuzz targets 8 Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzTreeID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzTreeID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzTreeID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184294 inline 8-bit counters): 184294 [0x55b64ec3b120, 0x55b64ec68106), \nINFO: Loaded 1 PC tables (184294 PCs): 184294 [0x10c000100000,0x10c0003cfe60), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55b64bf4a1b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.1654768348.go:48 +0x1d8\npanic({0x55b64d6a1ce0?, 0x55b64e1b9fd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c00085d2d0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c00085d2d0, {0x10c000874480, 0x2d})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c00085d2d0, {0x55b64d23238e?, 0x55b64be92472?}, {0x10c0008c53f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzTreeID.FuzzTreeID.func1(0x10c00085d2c0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:61 +0xfd\nreflect.Value.call({0x55b64d63cb80?, 0x55b64d8849e0?, 0x2?}, {0x55b64d2113e0, 0x4}, {0x10c000833e60, 0x2, 0x55b64be9e74f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55b64d63cb80?, 0x55b64d8849e0?, 0x55b64d61fe20?}, {0x10c000833e60, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55b64d63cb80, 0x55b64d8849e0}, {0x55b64d86c7c0?, 0x10c00085d2c0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55b64d63cb80, 0x55b64d8849e0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzTreeID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:59\nmain.LibFuzzerFuzzTreeID({0x7b6879ee1090?, 0x10c0000028c0?, 0x0?})\n\t./main.1654768348.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55b64bd9dc01?)\n\t./main.1654768348.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2373==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000945 (pc 0x55b64bda18a1 bp 0x10c0008c4f08 sp 0x10c0008c4ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55b64bda18a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2373==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055b64bda18a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000945 rsi = 0x0000000000000945 rbp = 0x000010c0008c4f08 rsp = 0x000010c0008c4ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000945 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2373==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzTreeID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184294 inline 8-bit counters): 184294 [0x55b4f6b4b120, 0x55b4f6b78106), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184294 PCs): 184294 [0x10c000100000,0x10c0003cfe60), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55b4f3e5a1b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1654768348.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55b4f55b1ce0?, 0x55b4f60c9fd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008632d0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008632d0, {0x10c000550390, 0x2d}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008632d0, {0x55b4f514238e?, 0x55b4f3da2472?}, {0x10c0008b73f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzTreeID.FuzzTreeID.func1(0x10c0008632c0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:61 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55b4f554cb80?, 0x55b4f57949e0?, 0x2?}, {0x55b4f51213e0, 0x4}, {0x10c000791b90, 0x2, 0x55b4f3dae74f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55b4f554cb80?, 0x55b4f57949e0?, 0x55b4f552fe20?}, {0x10c000791b90, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55b4f554cb80, 0x55b4f57949e0}, {0x55b4f577c7c0?, 0x10c0008632c0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55b4f554cb80, 0x55b4f57949e0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzTreeID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:59 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzTreeID({0x7b84cf4e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1654768348.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55b4f3cadc01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1654768348.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==2814==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000afe (pc 0x55b4f3cb18a1 bp 0x10c0008b6f08 sp 0x10c0008b6ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55b4f3cb18a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2814==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055b4f3cb18a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000afe rsi = 0x0000000000000afe rbp = 0x000010c0008b6f08 rsp = 0x000010c0008b6ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000afe r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2814==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184268 inline 8-bit counters): 184268 [0x55c9cfba0120, 0x55c9cfbcd0ec), \nINFO: Loaded 1 PC tables (184268 PCs): 184268 [0x10c000100000,0x10c0003cfcc0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55c9cceaf1b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.1400474193.go:48 +0x1d8\npanic({0x55c9ce6070c0?, 0x55c9cf11efd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008f8970, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008f8970, {0x10c000892ff0, 0x2d})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008f8970, {0x55c9ce197377?, 0x55c9ccdf7472?}, {0x10c0009293f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateUUID.FuzzValidateUUID.func1(0x10c0008f8960, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:69 +0xfd\nreflect.Value.call({0x55c9ce5a1f60?, 0x55c9ce7e9dc0?, 0x2?}, {0x55c9ce1763e0, 0x4}, {0x10c00090a600, 0x2, 0x55c9cce0374f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55c9ce5a1f60?, 0x55c9ce7e9dc0?, 0x55c9ce585200?}, {0x10c00090a600, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55c9ce5a1f60, 0x55c9ce7e9dc0}, {0x55c9ce7d1ba0?, 0x10c0008f8960?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55c9ce5a1f60, 0x55c9ce7e9dc0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateUUID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:67\nmain.LibFuzzerFuzzValidateUUID({0x7b8a429e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.1400474193.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55c9ccd02c01?)\n\t./main.1400474193.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2284==ERROR: AddressSanitizer: ABRT on unknown address 0x0000000008ec (pc 0x55c9ccd068a1 bp 0x10c000928f08 sp 0x10c000928ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55c9ccd068a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2284==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055c9ccd068a1 rdx = 0x0000000000000006 \nrdi = 0x00000000000008ec rsi = 0x00000000000008ec rbp = 0x000010c000928f08 rsp = 0x000010c000928ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x00000000000008ec r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2284==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzValidateUUID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184268 inline 8-bit counters): 184268 [0x564fd27b5120, 0x564fd27e20ec), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184268 PCs): 184268 [0x10c000100000,0x10c0003cfcc0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x564fcfac41b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1400474193.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x564fd121c0c0?, 0x564fd1d33fd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008181f0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008181f0, {0x10c000044cf0, 0x2d}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008181f0, {0x564fd0dac377?, 0x564fcfa0c472?}, {0x10c0008733f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateUUID.FuzzValidateUUID.func1(0x10c0008181e0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:69 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x564fd11b6f60?, 0x564fd13fedc0?, 0x2?}, {0x564fd0d8b3e0, 0x4}, {0x10c000816f90, 0x2, 0x564fcfa1874f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x564fd11b6f60?, 0x564fd13fedc0?, 0x564fd119a200?}, {0x10c000816f90, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x564fd11b6f60, 0x564fd13fedc0}, {0x564fd13e6ba0?, 0x10c0008181e0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x564fd11b6f60, 0x564fd13fedc0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateUUID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:67 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateUUID({0x7b7d59be1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1400474193.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x564fcf917c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1400474193.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==2870==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b36 (pc 0x564fcf91b8a1 bp 0x10c000872f08 sp 0x10c000872ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x564fcf91b8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2870==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000564fcf91b8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000b36 rsi = 0x0000000000000b36 rbp = 0x000010c000872f08 rsp = 0x000010c000872ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000b36 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2870==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184296 inline 8-bit counters): 184296 [0x55cb7fc70120, 0x55cb7fc9d108), \nINFO: Loaded 1 PC tables (184296 PCs): 184296 [0x10c000100000,0x10c0003cfe80), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55cb7cf7f1b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.3189934329.go:48 +0x1d8\npanic({0x55cb7e6d6ca0?, 0x55cb7f1eefd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c00091b0f0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c00091b0f0, {0x10c0008c7200, 0x36})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c00091b0f0, {0x55cb7e284f37?, 0x0?}, {0x10c00094d3c0?, 0x0?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzCreateEntryIDFromParts.FuzzCreateEntryIDFromParts.func1(0x10c00091b0e0, {0x0, 0x0}, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:21 +0x15c\nreflect.Value.call({0x55cb7e69f580?, 0x55cb7e8b99a0?, 0x3?}, {0x55cb7e2463e0, 0x4}, {0x10c000608eb0, 0x3, 0x55cb7ced374f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55cb7e69f580?, 0x55cb7e8b99a0?, 0x55cb7e654de0?}, {0x10c000608eb0, 0x3, 0x3})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55cb7e69f580, 0x55cb7e8b99a0}, {0x55cb7e8a1780?, 0x10c00091b0e0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55cb7e69f580, 0x55cb7e8b99a0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzCreateEntryIDFromParts(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:19\nmain.LibFuzzerFuzzCreateEntryIDFromParts({0x7ba655ae1090?, 0x10c0000028c0?, 0x0?})\n\t./main.3189934329.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55cb7cdd2c01?)\n\t./main.3189934329.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2322==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000912 (pc 0x55cb7cdd68a1 bp 0x10c00094ced8 sp 0x10c00094cec0 T0)\nSCARINESS: 10 (signal)\n #0 0x55cb7cdd68a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2322==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055cb7cdd68a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000912 rsi = 0x0000000000000912 rbp = 0x000010c00094ced8 rsp = 0x000010c00094cec0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000912 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2322==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzCreateEntryIDFromParts -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184296 inline 8-bit counters): 184296 [0x557c459dd120, 0x557c45a0a108), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184296 PCs): 184296 [0x10c000100000,0x10c0003cfe80), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x557c42cec1b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3189934329.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x557c44443ca0?, 0x557c44f5bfd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c000994790, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c000994790, {0x10c000912d00, 0x36}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c000994790, {0x557c43ff1f37?, 0x0?}, {0x10c0009c73c0?, 0x0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzCreateEntryIDFromParts.FuzzCreateEntryIDFromParts.func1(0x10c000994780, {0x0, 0x0}, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:21 +0x15c Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x557c4440c580?, 0x557c446269a0?, 0x3?}, {0x557c43fb33e0, 0x4}, {0x10c0009963c0, 0x3, 0x557c42c4074f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x557c4440c580?, 0x557c446269a0?, 0x557c443c1de0?}, {0x10c0009963c0, 0x3, 0x3}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x557c4440c580, 0x557c446269a0}, {0x557c4460e780?, 0x10c000994780?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x557c4440c580, 0x557c446269a0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzCreateEntryIDFromParts(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:19 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzCreateEntryIDFromParts({0x7bca592e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3189934329.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x557c42b3fc01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.3189934329.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==2926==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000b6e (pc 0x557c42b438a1 bp 0x10c0009c6ed8 sp 0x10c0009c6ec0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x557c42b438a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2926==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000557c42b438a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000b6e rsi = 0x0000000000000b6e rbp = 0x000010c0009c6ed8 rsp = 0x000010c0009c6ec0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000b6e r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2926==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184270 inline 8-bit counters): 184270 [0x560c4fb2a120, 0x560c4fb570ee), \nINFO: Loaded 1 PC tables (184270 PCs): 184270 [0x10c000100000,0x10c0003cfce0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x560c4ce391b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.2101803625.go:48 +0x1d8\npanic({0x560c4e591080?, 0x560c4f0a8fd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008d4b50, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008d4b50, {0x10c0008ea600, 0x40})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008d4b50, {0x560c4e125411?, 0x560c4cd81472?}, {0x10c00080d3f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateTreeID.FuzzValidateTreeID.func1(0x10c0008d4b40, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:77 +0xfd\nreflect.Value.call({0x560c4e52bf20?, 0x560c4e773d80?, 0x2?}, {0x560c4e1003e0, 0x4}, {0x10c0008e8210, 0x2, 0x560c4cd8d74f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x560c4e52bf20?, 0x560c4e773d80?, 0x560c4e50f1c0?}, {0x10c0008e8210, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x560c4e52bf20, 0x560c4e773d80}, {0x560c4e75bb60?, 0x10c0008d4b40?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x560c4e52bf20, 0x560c4e773d80})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateTreeID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:75\nmain.LibFuzzerFuzzValidateTreeID({0x7b9a281e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.2101803625.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x560c4cc8cc01?)\n\t./main.2101803625.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2264==ERROR: AddressSanitizer: ABRT on unknown address 0x0000000008d8 (pc 0x560c4cc908a1 bp 0x10c00080cf08 sp 0x10c00080cef0 T0)\nSCARINESS: 10 (signal)\n #0 0x560c4cc908a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2264==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x0000560c4cc908a1 rdx = 0x0000000000000006 \nrdi = 0x00000000000008d8 rsi = 0x00000000000008d8 rbp = 0x000010c00080cf08 rsp = 0x000010c00080cef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x00000000000008d8 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2264==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzValidateTreeID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184270 inline 8-bit counters): 184270 [0x55bbba0f3120, 0x55bbba1200ee), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184270 PCs): 184270 [0x10c000100000,0x10c0003cfce0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55bbb74021b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2101803625.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55bbb8b5a080?, 0x55bbb9671fd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00084d0f0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00084d0f0, {0x10c000868140, 0x40}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00084d0f0, {0x55bbb86ee411?, 0x55bbb734a472?}, {0x10c00087d3f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateTreeID.FuzzValidateTreeID.func1(0x10c00084d0e0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:77 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55bbb8af4f20?, 0x55bbb8d3cd80?, 0x2?}, {0x55bbb86c93e0, 0x4}, {0x10c00098eb70, 0x2, 0x55bbb735674f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55bbb8af4f20?, 0x55bbb8d3cd80?, 0x55bbb8ad81c0?}, {0x10c00098eb70, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55bbb8af4f20, 0x55bbb8d3cd80}, {0x55bbb8d24b60?, 0x10c00084d0e0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55bbb8af4f20, 0x55bbb8d3cd80}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateTreeID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:75 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateTreeID({0x7b32449e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2101803625.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55bbb7255c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2101803625.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==2984==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000ba8 (pc 0x55bbb72598a1 bp 0x10c00087cf08 sp 0x10c00087cef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55bbb72598a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2984==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055bbb72598a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000ba8 rsi = 0x0000000000000ba8 rbp = 0x000010c00087cf08 rsp = 0x000010c00087cef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000ba8 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==2984==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184289 inline 8-bit counters): 184289 [0x55a406d14120, 0x55a406d41101), \nINFO: Loaded 1 PC tables (184289 PCs): 184289 [0x10c000100000,0x10c0003cfe10), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55a4040231b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.4100412296.go:48 +0x1d8\npanic({0x55a40577ad60?, 0x55a406292fd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0005e12d0, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0005e12d0, {0x10c0005fc500, 0x31})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0005e12d0, {0x55a405313539?, 0x55a403f6b472?}, {0x10c00081d3f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzGetTreeIDFromIDString.FuzzGetTreeIDFromIDString.func1(0x10c0005e12c0, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:37 +0xf6\nreflect.Value.call({0x55a405715c00?, 0x55a40595da60?, 0x2?}, {0x55a4052ea3e0, 0x4}, {0x10c0005a9e60, 0x2, 0x55a403f7774f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55a405715c00?, 0x55a40595da60?, 0x55a4056f8ea0?}, {0x10c0005a9e60, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55a405715c00, 0x55a40595da60}, {0x55a405945840?, 0x10c0005e12c0?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55a405715c00, 0x55a40595da60})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzGetTreeIDFromIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:35\nmain.LibFuzzerFuzzGetTreeIDFromIDString({0x7bfec69e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.4100412296.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55a403e76c01?)\n\t./main.4100412296.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2705==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000a91 (pc 0x55a403e7a8a1 bp 0x10c00081cf08 sp 0x10c00081cef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55a403e7a8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2705==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055a403e7a8a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000a91 rsi = 0x0000000000000a91 rbp = 0x000010c00081cf08 rsp = 0x000010c00081cef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000a91 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2705==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzGetTreeIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184289 inline 8-bit counters): 184289 [0x55cd02a66120, 0x55cd02a93101), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184289 PCs): 184289 [0x10c000100000,0x10c0003cfe10), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55ccffd751b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4100412296.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55cd014ccd60?, 0x55cd01fe4fd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c00094cf10, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c00094cf10, {0x10c0008fee00, 0x31}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c00094cf10, {0x55cd01065539?, 0x55ccffcbd472?}, {0x10c0004c13f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetTreeIDFromIDString.FuzzGetTreeIDFromIDString.func1(0x10c00094cf00, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:37 +0xf6 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55cd01467c00?, 0x55cd016afa60?, 0x2?}, {0x55cd0103c3e0, 0x4}, {0x10c000954cc0, 0x2, 0x55ccffcc974f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55cd01467c00?, 0x55cd016afa60?, 0x55cd0144aea0?}, {0x10c000954cc0, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55cd01467c00, 0x55cd016afa60}, {0x55cd01697840?, 0x10c00094cf00?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55cd01467c00, 0x55cd016afa60}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzGetTreeIDFromIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:35 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetTreeIDFromIDString({0x7b8f094e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4100412296.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55ccffbc8c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4100412296.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3041==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000be1 (pc 0x55ccffbcc8a1 bp 0x10c0004c0f08 sp 0x10c0004c0ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55ccffbcc8a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3041==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055ccffbcc8a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000be1 rsi = 0x0000000000000be1 rbp = 0x000010c0004c0f08 rsp = 0x000010c0004c0ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000be1 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3041==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184283 inline 8-bit counters): 184283 [0x5643e50c1120, 0x5643e50ee0fb), \nINFO: Loaded 1 PC tables (184283 PCs): 184283 [0x10c000100000,0x10c0003cfdb0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5643e23d01b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.4202665311.go:48 +0x1d8\npanic({0x5643e3b27ea0?, 0x5643e463ffd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0008e8010, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0008e8010, {0x10c00054a150, 0x30})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0008e8010, {0x5643e36be02b?, 0x5643e2318472?}, {0x10c0008ef3f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzValidateEntryID.FuzzValidateEntryID.func1(0x10c0008e8000, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:85 +0xfd\nreflect.Value.call({0x5643e3ac2d40?, 0x5643e3d0aba0?, 0x2?}, {0x5643e36973e0, 0x4}, {0x10c0008ba090, 0x2, 0x5643e232474f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x5643e3ac2d40?, 0x5643e3d0aba0?, 0x5643e3aa5fe0?}, {0x10c0008ba090, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x5643e3ac2d40, 0x5643e3d0aba0}, {0x5643e3cf2980?, 0x10c0008e8000?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x5643e3ac2d40, 0x5643e3d0aba0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzValidateEntryID(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:83\nmain.LibFuzzerFuzzValidateEntryID({0x7bcf870e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.4202665311.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x5643e2223c01?)\n\t./main.4202665311.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2684==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000a7c (pc 0x5643e22278a1 bp 0x10c0008eef08 sp 0x10c0008eeef0 T0)\nSCARINESS: 10 (signal)\n #0 0x5643e22278a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2684==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x00005643e22278a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000a7c rsi = 0x0000000000000a7c rbp = 0x000010c0008eef08 rsp = 0x000010c0008eeef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000a7c r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2684==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzValidateEntryID -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184283 inline 8-bit counters): 184283 [0x5599e3aac120, 0x5599e3ad90fb), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184283 PCs): 184283 [0x10c000100000,0x10c0003cfdb0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5599e0dbb1b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4202665311.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x5599e2512ea0?, 0x5599e302afd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0008caf10, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0008caf10, {0x10c0008e64b0, 0x30}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0008caf10, {0x5599e20a902b?, 0x5599e0d03472?}, {0x10c0008853f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateEntryID.FuzzValidateEntryID.func1(0x10c0008caf00, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:85 +0xfd Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x5599e24add40?, 0x5599e26f5ba0?, 0x2?}, {0x5599e20823e0, 0x4}, {0x10c0008d0ff0, 0x2, 0x5599e0d0f74f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x5599e24add40?, 0x5599e26f5ba0?, 0x5599e2490fe0?}, {0x10c0008d0ff0, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x5599e24add40, 0x5599e26f5ba0}, {0x5599e26dd980?, 0x10c0008caf00?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x5599e24add40, 0x5599e26f5ba0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzValidateEntryID(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:83 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzValidateEntryID({0x7b5684ee1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4202665311.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x5599e0c0ec01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.4202665311.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3097==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c19 (pc 0x5599e0c128a1 bp 0x10c000884f08 sp 0x10c000884ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x5599e0c128a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3097==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x00005599e0c128a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c19 rsi = 0x0000000000000c19 rbp = 0x000010c000884f08 rsp = 0x000010c000884ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c19 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3097==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184293 inline 8-bit counters): 184293 [0x55a387fdd120, 0x55a38800a105), \nINFO: Loaded 1 PC tables (184293 PCs): 184293 [0x10c000100000,0x10c0003cfe50), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55a3852ec1b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.2859405470.go:48 +0x1d8\npanic({0x55a386a43d80?, 0x55a38755bfd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c0009e2010, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c0009e2010, {0x10c0009ae630, 0x2f})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c0009e2010, {0x55a3865d8429?, 0x55a385234472?}, {0x10c0009e93f0?, 0x2?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzGetUUIDFromIDString.FuzzGetUUIDFromIDString.func1(0x10c0009e2000, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:29 +0xf6\nreflect.Value.call({0x55a3869dec20?, 0x55a386c26a80?, 0x2?}, {0x55a3865b33e0, 0x4}, {0x10c0009b4150, 0x2, 0x55a38524074f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55a3869dec20?, 0x55a386c26a80?, 0x55a3869c1ec0?}, {0x10c0009b4150, 0x2, 0x2})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55a3869dec20, 0x55a386c26a80}, {0x55a386c0e860?, 0x10c0009e2000?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55a3869dec20, 0x55a386c26a80})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzGetUUIDFromIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:27\nmain.LibFuzzerFuzzGetUUIDFromIDString({0x7b5baa9e1090?, 0x10c0000028c0?, 0x0?})\n\t./main.2859405470.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55a38513fc01?)\n\t./main.2859405470.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2731==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000aab (pc 0x55a3851438a1 bp 0x10c0009e8f08 sp 0x10c0009e8ef0 T0)\nSCARINESS: 10 (signal)\n #0 0x55a3851438a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2731==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055a3851438a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000aab rsi = 0x0000000000000aab rbp = 0x000010c0009e8f08 rsp = 0x000010c0009e8ef0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000aab r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2731==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzGetUUIDFromIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184293 inline 8-bit counters): 184293 [0x55d269c7c120, 0x55d269ca9105), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184293 PCs): 184293 [0x10c000100000,0x10c0003cfe50), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55d266f8b1b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2859405470.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55d2686e2d80?, 0x55d2691fafd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0009565b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0009565b0, {0x10c0008d8f30, 0x2f}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0009565b0, {0x55d268277429?, 0x55d266ed3472?}, {0x10c0008853f0?, 0x2?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetUUIDFromIDString.FuzzGetUUIDFromIDString.func1(0x10c0009565a0, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:29 +0xf6 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55d26867dc20?, 0x55d2688c5a80?, 0x2?}, {0x55d2682523e0, 0x4}, {0x10c0008ef710, 0x2, 0x55d266edf74f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55d26867dc20?, 0x55d2688c5a80?, 0x55d268660ec0?}, {0x10c0008ef710, 0x2, 0x2}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55d26867dc20, 0x55d2688c5a80}, {0x55d2688ad860?, 0x10c0009565a0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55d26867dc20, 0x55d2688c5a80}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzGetUUIDFromIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:27 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzGetUUIDFromIDString({0x7b2fc45e1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2859405470.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55d266ddec01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2859405470.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3152==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c50 (pc 0x55d266de28a1 bp 0x10c000884f08 sp 0x10c000884ef0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55d266de28a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3152==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055d266de28a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c50 rsi = 0x0000000000000c50 rbp = 0x000010c000884f08 rsp = 0x000010c000884ef0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c50 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3152==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (184296 inline 8-bit counters): 184296 [0x55abc3801120, 0x55abc382e108), \nINFO: Loaded 1 PC tables (184296 PCs): 184296 [0x10c000100000,0x10c0003cfe80), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\npanic: runtime error: invalid memory address or nil pointer dereference [recovered]\n\tpanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55abc0b101b3]\n\ngoroutine 17 [running, locked to thread]:\nmain.catchPanics()\n\t./main.1738754590.go:48 +0x1d8\npanic({0x55abc2267ca0?, 0x55abc2d7ffd0?})\n\truntime/panic.go:783 +0x132\ntesting.(*common).callSite(0x10c000912d30, 0x3)\n\ttesting/testing.go:1076 +0x153\ntesting.(*common).log(0x10c000912d30, {0x10c00095ccc0, 0x36})\n\ttesting/testing.go:1040 +0x1e5\ntesting.(*common).Skipf(0x10c000912d30, {0x55abc1e15f37?, 0x0?}, {0x10c0009a73c0?, 0x0?, 0x0?})\n\ttesting/testing.go:1251 +0x88\nmain.LibFuzzerFuzzReturnEntryIDString.FuzzReturnEntryIDString.func1(0x10c000912d20, {0x0, 0x0}, {0x0, 0x0})\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:53 +0x15c\nreflect.Value.call({0x55abc2230580?, 0x55abc244a9a0?, 0x3?}, {0x55abc1dd73e0, 0x4}, {0x10c00093a3c0, 0x3, 0x55abc0a6474f?})\n\treflect/value.go:581 +0x1ed1\nreflect.Value.Call({0x55abc2230580?, 0x55abc244a9a0?, 0x55abc21e5de0?}, {0x10c00093a3c0, 0x3, 0x3})\n\treflect/value.go:365 +0x18e\ntesting.(*Source).FillAndCall(0x10c0000cedd8, {0x55abc2230580, 0x55abc244a9a0}, {0x55abc2432780?, 0x10c000912d20?, 0x58?})\n\ttesting/fuzz.go:212 +0xeaf\ntesting.(*F).Fuzz(0x10c0000cedb8, {0x55abc2230580, 0x55abc244a9a0})\n\ttesting/fuzz.go:47 +0x1f5\ngithub.com/sigstore/rekor/pkg/sharding.FuzzReturnEntryIDString(...)\n\tgithub.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:51\nmain.LibFuzzerFuzzReturnEntryIDString({0x7bfda2fe1090?, 0x10c0000028c0?, 0x0?})\n\t./main.1738754590.go:30 +0xdb\nmain.LLVMFuzzerTestOneInput(0x0?, 0x55abc0963c01?)\n\t./main.1738754590.go:23 +0x6c\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==2752==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000ac0 (pc 0x55abc09678a1 bp 0x10c0009a6ed8 sp 0x10c0009a6ec0 T0)\nSCARINESS: 10 (signal)\n #0 0x55abc09678a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\n==2752==Register values:\nrax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055abc09678a1 rdx = 0x0000000000000006 \nrdi = 0x0000000000000ac0 rsi = 0x0000000000000ac0 rbp = 0x000010c0009a6ed8 rsp = 0x000010c0009a6ec0 \n r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 \nr12 = 0x0000000000000ac0 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff \nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==2752==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpvq_x2pv5/FuzzReturnEntryIDString -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (184296 inline 8-bit counters): 184296 [0x55fc3a10e120, 0x55fc3a13b108), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (184296 PCs): 184296 [0x10c000100000,0x10c0003cfe80), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference [recovered] Step #4 - "build-check-libfuzzer-address-x86_64": panic: runtime error: invalid memory address or nil pointer dereference Step #4 - "build-check-libfuzzer-address-x86_64": [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x55fc3741d1b3] Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": main.catchPanics() Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1738754590.go:48 +0x1d8 Step #4 - "build-check-libfuzzer-address-x86_64": panic({0x55fc38b74ca0?, 0x55fc3968cfd0?}) Step #4 - "build-check-libfuzzer-address-x86_64": runtime/panic.go:783 +0x132 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).callSite(0x10c0009934b0, 0x3) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1076 +0x153 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).log(0x10c0009934b0, {0x10c0009eecc0, 0x36}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1040 +0x1e5 Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*common).Skipf(0x10c0009934b0, {0x55fc38722f37?, 0x0?}, {0x10c0006113c0?, 0x0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/testing.go:1251 +0x88 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzReturnEntryIDString.FuzzReturnEntryIDString.func1(0x10c0009934a0, {0x0, 0x0}, {0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:53 +0x15c Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.call({0x55fc38b3d580?, 0x55fc38d579a0?, 0x3?}, {0x55fc386e43e0, 0x4}, {0x10c0009d43c0, 0x3, 0x55fc3737174f?}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:581 +0x1ed1 Step #4 - "build-check-libfuzzer-address-x86_64": reflect.Value.Call({0x55fc38b3d580?, 0x55fc38d579a0?, 0x55fc38af2de0?}, {0x10c0009d43c0, 0x3, 0x3}) Step #4 - "build-check-libfuzzer-address-x86_64": reflect/value.go:365 +0x18e Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*Source).FillAndCall(0x10c0000cedd8, {0x55fc38b3d580, 0x55fc38d579a0}, {0x55fc38d3f780?, 0x10c0009934a0?, 0x58?}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:212 +0xeaf Step #4 - "build-check-libfuzzer-address-x86_64": testing.(*F).Fuzz(0x10c0000cedb8, {0x55fc38b3d580, 0x55fc38d579a0}) Step #4 - "build-check-libfuzzer-address-x86_64": testing/fuzz.go:47 +0x1f5 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding.FuzzReturnEntryIDString(...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/sigstore/rekor/pkg/sharding/shard_fuzz_libFuzzer.go:51 Step #4 - "build-check-libfuzzer-address-x86_64": main.LibFuzzerFuzzReturnEntryIDString({0x7b958ace1090?, 0x10c0000028c0?, 0x0?}) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1738754590.go:30 +0xdb Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(0x0?, 0x55fc37270c01?) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.1738754590.go:23 +0x6c Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==3209==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000c89 (pc 0x55fc372748a1 bp 0x10c000610ed8 sp 0x10c000610ec0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x55fc372748a1 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3209==Register values: Step #4 - "build-check-libfuzzer-address-x86_64": rax = 0x0000000000000000 rbx = 0x0000000000000000 rcx = 0x000055fc372748a1 rdx = 0x0000000000000006 Step #4 - "build-check-libfuzzer-address-x86_64": rdi = 0x0000000000000c89 rsi = 0x0000000000000c89 rbp = 0x000010c000610ed8 rsp = 0x000010c000610ec0 Step #4 - "build-check-libfuzzer-address-x86_64": r8 = 0x0000000000000001 r9 = 0x0000000000000000 r10 = 0x0000000000000008 r11 = 0x0000000000000246 Step #4 - "build-check-libfuzzer-address-x86_64": r12 = 0x0000000000000c89 r13 = 0x000000000000069c r14 = 0x000010c0000028c0 r15 = 0xffffffffffffffff Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==3209==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ERROR: 16.3265306122449% of fuzz targets seem to be broken. See the list above for a detailed information. Step #4 - "build-check-libfuzzer-address-x86_64": ********************************************************************************\nBuild checks failed.\nTo reproduce, run:\npython infra/helper.py build_image rekor\npython infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 rekor\npython infra/helper.py check_build --sanitizer address --engine libfuzzer --architecture x86_64 rekor\n******************************************************************************** Finished Step #4 - "build-check-libfuzzer-address-x86_64" ERROR ERROR: build step 4 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1