starting build "f47d13f1-04ba-4960-91ba-75e5fec14f24" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 8.704kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: dec9309a56ea: Pulling fs layer Step #1: 2ac36f2efd79: Pulling fs layer Step #1: 5ec988cea38a: Pulling fs layer Step #1: 8e683fb379e8: Pulling fs layer Step #1: 9f891fba8c78: Pulling fs layer Step #1: 25fcf1e6241b: Pulling fs layer Step #1: c668a360339d: Pulling fs layer Step #1: 68e87b77edb8: Pulling fs layer Step #1: f5fb4d6cfdaa: Pulling fs layer Step #1: 51633e1517b0: Pulling fs layer Step #1: e52d90295922: Pulling fs layer Step #1: 8e683fb379e8: Waiting Step #1: be0d3e2ef6e6: Pulling fs layer Step #1: 1548ad8a9b5b: Pulling fs layer Step #1: 9f891fba8c78: Waiting Step #1: 0f856dba2078: Pulling fs layer Step #1: 2b3f31e343f8: Pulling fs layer Step #1: 366fb5c452b5: Pulling fs layer Step #1: 9321548b138a: Pulling fs layer Step #1: 25fcf1e6241b: Waiting Step #1: a49b199fd9f5: Pulling fs layer Step #1: c668a360339d: Waiting Step #1: c38cc9d0658a: Pulling fs layer Step #1: 68e87b77edb8: Waiting Step #1: 6e2b2f2f8224: Pulling fs layer Step #1: f5fb4d6cfdaa: Waiting Step #1: f5e25dc75102: Pulling fs layer Step #1: 51633e1517b0: Waiting Step #1: 1cc1ba13f99c: Pulling fs layer Step #1: e52d90295922: Waiting Step #1: 27e24efb6f46: Pulling fs layer Step #1: be0d3e2ef6e6: Waiting Step #1: d53d3aad68cc: Pulling fs layer Step #1: 820601777549: Pulling fs layer Step #1: 77cc868e2038: Pulling fs layer Step #1: 1548ad8a9b5b: Waiting Step #1: 0f856dba2078: Waiting Step #1: b51458c0a6fb: Pulling fs layer Step #1: 366fb5c452b5: Waiting Step #1: 2b3f31e343f8: Waiting Step #1: 9321548b138a: Waiting Step #1: 57e64755c0e5: Pulling fs layer Step #1: 46db2ee818a9: Pulling fs layer Step #1: f5e25dc75102: Waiting Step #1: 6e2b2f2f8224: Waiting Step #1: 992e6bdb5ffa: Pulling fs layer Step #1: 16b329d45733: Pulling fs layer Step #1: 4906dc293271: Pulling fs layer Step #1: 5daef63c43e5: Pulling fs layer Step #1: a9207ff36fe1: Pulling fs layer Step #1: 5ec988cea38a: Waiting Step #1: 77cc868e2038: Waiting Step #1: b51458c0a6fb: Waiting Step #1: 16b329d45733: Waiting Step #1: 27e24efb6f46: Waiting Step #1: 4906dc293271: Waiting Step #1: 5daef63c43e5: Waiting Step #1: a9207ff36fe1: Waiting Step #1: 992e6bdb5ffa: Waiting Step #1: 46db2ee818a9: Waiting Step #1: d53d3aad68cc: Waiting Step #1: 820601777549: Waiting Step #1: 2ac36f2efd79: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 8e683fb379e8: Verifying Checksum Step #1: 8e683fb379e8: Download complete Step #1: 5ec988cea38a: Verifying Checksum Step #1: 5ec988cea38a: Download complete Step #1: 9f891fba8c78: Verifying Checksum Step #1: 9f891fba8c78: Download complete Step #1: c668a360339d: Download complete Step #1: dec9309a56ea: Verifying Checksum Step #1: dec9309a56ea: Download complete Step #1: 68e87b77edb8: Verifying Checksum Step #1: 68e87b77edb8: Download complete Step #1: 51633e1517b0: Verifying Checksum Step #1: 51633e1517b0: Download complete Step #1: b549f31133a9: Pull complete Step #1: e52d90295922: Verifying Checksum Step #1: e52d90295922: Download complete Step #1: be0d3e2ef6e6: Verifying Checksum Step #1: be0d3e2ef6e6: Download complete Step #1: 1548ad8a9b5b: Verifying Checksum Step #1: 1548ad8a9b5b: Download complete Step #1: 0f856dba2078: Download complete Step #1: 2b3f31e343f8: Verifying Checksum Step #1: 2b3f31e343f8: Download complete Step #1: 366fb5c452b5: Verifying Checksum Step #1: 366fb5c452b5: Download complete Step #1: f5fb4d6cfdaa: Verifying Checksum Step #1: f5fb4d6cfdaa: Download complete Step #1: a49b199fd9f5: Verifying Checksum Step #1: a49b199fd9f5: Download complete Step #1: 9321548b138a: Download complete Step #1: c38cc9d0658a: Verifying Checksum Step #1: c38cc9d0658a: Download complete Step #1: 6e2b2f2f8224: Verifying Checksum Step #1: 6e2b2f2f8224: Download complete Step #1: f5e25dc75102: Verifying Checksum Step #1: f5e25dc75102: Download complete Step #1: 1cc1ba13f99c: Download complete Step #1: 27e24efb6f46: Verifying Checksum Step #1: 27e24efb6f46: Download complete Step #1: d53d3aad68cc: Verifying Checksum Step #1: d53d3aad68cc: Download complete Step #1: 25fcf1e6241b: Verifying Checksum Step #1: 25fcf1e6241b: Download complete Step #1: 820601777549: Verifying Checksum Step #1: 820601777549: Download complete Step #1: b51458c0a6fb: Verifying Checksum Step #1: b51458c0a6fb: Download complete Step #1: 77cc868e2038: Verifying Checksum Step #1: 77cc868e2038: Download complete Step #1: 57e64755c0e5: Verifying Checksum Step #1: 57e64755c0e5: Download complete Step #1: 46db2ee818a9: Verifying Checksum Step #1: 46db2ee818a9: Download complete Step #1: 992e6bdb5ffa: Verifying Checksum Step #1: 992e6bdb5ffa: Download complete Step #1: 16b329d45733: Verifying Checksum Step #1: 16b329d45733: Download complete Step #1: 4906dc293271: Download complete Step #1: a9207ff36fe1: Verifying Checksum Step #1: a9207ff36fe1: Download complete Step #1: dec9309a56ea: Pull complete Step #1: 2ac36f2efd79: Pull complete Step #1: 5ec988cea38a: Pull complete Step #1: 5daef63c43e5: Verifying Checksum Step #1: 5daef63c43e5: Download complete Step #1: 8e683fb379e8: Pull complete Step #1: 9f891fba8c78: Pull complete Step #1: 25fcf1e6241b: Pull complete Step #1: c668a360339d: Pull complete Step #1: 68e87b77edb8: Pull complete Step #1: f5fb4d6cfdaa: Pull complete Step #1: 51633e1517b0: Pull complete Step #1: e52d90295922: Pull complete Step #1: be0d3e2ef6e6: Pull complete Step #1: 1548ad8a9b5b: Pull complete Step #1: 0f856dba2078: Pull complete Step #1: 2b3f31e343f8: Pull complete Step #1: 366fb5c452b5: Pull complete Step #1: 9321548b138a: Pull complete Step #1: a49b199fd9f5: Pull complete Step #1: c38cc9d0658a: Pull complete Step #1: 6e2b2f2f8224: Pull complete Step #1: f5e25dc75102: Pull complete Step #1: 1cc1ba13f99c: Pull complete Step #1: 27e24efb6f46: Pull complete Step #1: d53d3aad68cc: Pull complete Step #1: 820601777549: Pull complete Step #1: 77cc868e2038: Pull complete Step #1: b51458c0a6fb: Pull complete Step #1: 57e64755c0e5: Pull complete Step #1: 46db2ee818a9: Pull complete Step #1: 992e6bdb5ffa: Pull complete Step #1: 16b329d45733: Pull complete Step #1: 4906dc293271: Pull complete Step #1: 5daef63c43e5: Pull complete Step #1: a9207ff36fe1: Pull complete Step #1: Digest: sha256:95653912d170fee459d4d8fdf1b26b946b1180a9e6a38b1a3ded488b9930eb17 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 58ae8b9a9fba Step #1: Step 2/4 : RUN git clone https://github.com/cert-manager/cert-manager --depth=1 Step #1: ---> Running in 560db8ae4e8a Step #1: Cloning into 'cert-manager'... Step #1: Removing intermediate container 560db8ae4e8a Step #1: ---> 6ac981e66dc6 Step #1: Step 3/4 : COPY build.sh pki_fuzzer.go $SRC/ Step #1: ---> 139305a2315b Step #1: Step 4/4 : WORKDIR $SRC/cert-manager Step #1: ---> Running in c71d067eb4c2 Step #1: Removing intermediate container c71d067eb4c2 Step #1: ---> ad11fadc69ba Step #1: Successfully built ad11fadc69ba Step #1: Successfully tagged gcr.io/oss-fuzz/cert-manager:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/cert-manager Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filelLxxzP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cert-manager/.git Step #2 - "srcmap": + GIT_DIR=/src/cert-manager Step #2 - "srcmap": + cd /src/cert-manager Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cert-manager/cert-manager Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f2c262c1a1885c653cd3def15a348262abbb3dcd Step #2 - "srcmap": + jq_inplace /tmp/filelLxxzP '."/src/cert-manager" = { type: "git", url: "https://github.com/cert-manager/cert-manager", rev: "f2c262c1a1885c653cd3def15a348262abbb3dcd" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileBQMCmc Step #2 - "srcmap": + cat /tmp/filelLxxzP Step #2 - "srcmap": + jq '."/src/cert-manager" = { type: "git", url: "https://github.com/cert-manager/cert-manager", rev: "f2c262c1a1885c653cd3def15a348262abbb3dcd" }' Step #2 - "srcmap": + mv /tmp/fileBQMCmc /tmp/filelLxxzP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filelLxxzP Step #2 - "srcmap": + rm /tmp/filelLxxzP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cert-manager": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cert-manager/cert-manager", Step #2 - "srcmap": "rev": "f2c262c1a1885c653cd3def15a348262abbb3dcd" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cp -r /src/pki_fuzzer.go /src/cert-manager/pkg/util/pki/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone --depth=1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=include-all-test-files Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'go-118-fuzz-build'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 35, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 2% (1/35) remote: Counting objects: 5% (2/35) remote: Counting objects: 8% (3/35) remote: Counting objects: 11% (4/35) remote: Counting objects: 14% (5/35) remote: Counting objects: 17% (6/35) remote: Counting objects: 20% (7/35) remote: Counting objects: 22% (8/35) remote: Counting objects: 25% (9/35) remote: Counting objects: 28% (10/35) remote: Counting objects: 31% (11/35) remote: Counting objects: 34% (12/35) remote: Counting objects: 37% (13/35) remote: Counting objects: 40% (14/35) remote: Counting objects: 42% (15/35) remote: Counting objects: 45% (16/35) remote: Counting objects: 48% (17/35) remote: Counting objects: 51% (18/35) remote: Counting objects: 54% (19/35) remote: Counting objects: 57% (20/35) remote: Counting objects: 60% (21/35) remote: Counting objects: 62% (22/35) remote: Counting objects: 65% (23/35) remote: Counting objects: 68% (24/35) remote: Counting objects: 71% (25/35) remote: Counting objects: 74% (26/35) remote: Counting objects: 77% (27/35) remote: Counting objects: 80% (28/35) remote: Counting objects: 82% (29/35) remote: Counting objects: 85% (30/35) remote: Counting objects: 88% (31/35) remote: Counting objects: 91% (32/35) remote: Counting objects: 94% (33/35) remote: Counting objects: 97% (34/35) remote: Counting objects: 100% (35/35) remote: Counting objects: 100% (35/35), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 3% (1/29) remote: Compressing objects: 6% (2/29) remote: Compressing objects: 10% (3/29) remote: Compressing objects: 13% (4/29) remote: Compressing objects: 17% (5/29) remote: Compressing objects: 20% (6/29) remote: Compressing objects: 24% (7/29) remote: Compressing objects: 27% (8/29) remote: Compressing objects: 31% (9/29) remote: Compressing objects: 34% (10/29) remote: Compressing objects: 37% (11/29) remote: Compressing objects: 41% (12/29) remote: Compressing objects: 44% (13/29) remote: Compressing objects: 48% (14/29) remote: Compressing objects: 51% (15/29) remote: Compressing objects: 55% (16/29) remote: Compressing objects: 58% (17/29) remote: Compressing objects: 62% (18/29) remote: Compressing objects: 65% (19/29) remote: Compressing objects: 68% (20/29) remote: Compressing objects: 72% (21/29) remote: Compressing objects: 75% (22/29) remote: Compressing objects: 79% (23/29) remote: Compressing objects: 82% (24/29) remote: Compressing objects: 86% (25/29) remote: Compressing objects: 89% (26/29) remote: Compressing objects: 93% (27/29) remote: Compressing objects: 96% (28/29) remote: Compressing objects: 100% (29/29) remote: Compressing objects: 100% (29/29), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Unpacking objects: 2% (1/35) Unpacking objects: 5% (2/35) Unpacking objects: 8% (3/35) Unpacking objects: 11% (4/35) Unpacking objects: 14% (5/35) Unpacking objects: 17% (6/35) remote: Total 35 (delta 1), reused 24 (delta 1), pack-reused 0 (from 0) Step #3 - "compile-libfuzzer-coverage-x86_64": Unpacking objects: 20% (7/35) Unpacking objects: 22% (8/35) Unpacking objects: 25% (9/35) Unpacking objects: 28% (10/35) Unpacking objects: 31% (11/35) Unpacking objects: 34% (12/35) Unpacking objects: 37% (13/35) Unpacking objects: 40% (14/35) Unpacking objects: 42% (15/35) Unpacking objects: 45% (16/35) Unpacking objects: 48% (17/35) Unpacking objects: 51% (18/35) Unpacking objects: 54% (19/35) Unpacking objects: 57% (20/35) Unpacking objects: 60% (21/35) Unpacking objects: 62% (22/35) Unpacking objects: 65% (23/35) Unpacking objects: 68% (24/35) Unpacking objects: 71% (25/35) Unpacking objects: 74% (26/35) Unpacking objects: 77% (27/35) Unpacking objects: 80% (28/35) Unpacking objects: 82% (29/35) Unpacking objects: 85% (30/35) Unpacking objects: 88% (31/35) Unpacking objects: 91% (32/35) Unpacking objects: 94% (33/35) Unpacking objects: 97% (34/35) Unpacking objects: 100% (35/35) Unpacking objects: 100% (35/35), 27.04 KiB | 1.42 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + ls /root/go/pkg/mod/github.com/ Step #3 - "compile-libfuzzer-coverage-x86_64": mdempsky Step #3 - "compile-libfuzzer-coverage-x86_64": + go build . Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.5 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + mv go-118-fuzz-build /root/go/bin/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/cert-manager Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/AdamKorcz/go-118-fuzz-build/testing@include-all-test-files Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20240914100643-eb91380d8434 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20240914100643-eb91380d8434 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/cert-manager/cert-manager/pkg/controller/certificaterequests/vault FuzzVaultCRController FuzzVaultCRController Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20240921022957-49e7df575cb6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/vault/api v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/vault/sdk v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/gateway-api v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ldap/ldap/v3 v3.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.1-vault-5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiextensions-apiserver v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.20.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-asn1-ber/asn1-ber v1.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/zapr v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/pkg/v3 v3.5.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/v3 v3.5.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.54.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.66.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pierrec/lz4 v2.6.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/imdario/mergo v0.3.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20240903163716-9e1beecbcb38 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/api/v3 v3.5.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.54.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240903143218-8af14fe29dc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240827150818-7e3bb234dfed Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-semver v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch/v5 v5.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.9.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/cert-manager/cert-manager/pkg/controller/certificaterequests/venafi FuzzVenafiCRController FuzzVenafiCRController Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Venafi/vcert/v5 v5.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/youmark/pkcs8 v0.0.0-20240424034433-3c2c7870ae76 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-http-utils/headers v0.0.0-20181008091004-fed159eddc2a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Khan/genqlient v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sosodev/duration v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vektah/gqlparser/v2 v2.5.15 Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/cert-manager/cert-manager/pkg/util/pki FuzzUnmarshalSubjectStringToRDNSequence FuzzUnmarshalSubjectStringToRDNSequence Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/cert-manager/cert-manager/pkg/util/pki: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/dns v1.1.62 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pavlo-v-chernykh/keystore-go/v4 v4.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-aggregator v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpu/goacmedns v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/akamai/AkamaiOPEN-edgegrid-golang v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.198.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/dns/armdns v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/digitalocean/godo v1.125.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.33.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/structs v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smartystreets/assertions v0.0.0-20180927180507-b2de0cb4f26d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.27.36 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.17.34 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/route53 v1.44.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alexbrainman/sspi v0.0.0-20231016080023-1a75b4708caa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gokrb5/v8 v8.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/cel-go v0.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kms v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/server/v3 v3.5.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/NYTimes/gziphandler v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-querystring v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/h2non/gock.v1 v1.0.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gofork v1.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/dnsutils/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-uuid v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/goidentity/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.18 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/aescts/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/rpc/v2 v2.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/andreyvit/diff v0.0.0-20170406064948-c7f18ee00883 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.18 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/h2non/parth v0.0.0-20190131123155-b4df798d6542 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20240727154555-813a5fbdbec8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stoewer/go-strcase v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antlr4-go/antlr/v4 v4.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tmc/grpc-websocket-proxy v0.0.0-20220101234140-673ab2c3ae75 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/pkg/v3 v3.5.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/raft/v3 v3.5.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/soheilhy/cmux v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jonboulle/clockwork v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/v2 v2.305.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20240903143218-8af14fe29dc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/s2a-go v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/cert-manager/cert-manager/pkg/util/pki Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/cert-manager/cert-manager/pkg/util/pki Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/cert-manager/cert-manager/pkg/util/pki FuzzDecodePrivateKeyBytes FuzzDecodePrivateKeyBytes Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/cert-manager/cert-manager/pkg/util/pki: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/cert-manager/cert-manager/pkg/util/pki Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/cert-manager/cert-manager/pkg/util/pki Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: dec9309a56ea: Already exists Step #4: 2ac36f2efd79: Already exists Step #4: ea15a87e47d2: Pulling fs layer Step #4: 7dda1beeb65b: Pulling fs layer Step #4: dcb9a24f074c: Pulling fs layer Step #4: 6b0a720047ba: Pulling fs layer Step #4: 16c50f657e17: Pulling fs layer Step #4: 739954443c14: Pulling fs layer Step #4: 6a0680bacfb3: Pulling fs layer Step #4: 0253158e1e9b: Pulling fs layer Step #4: 16c50f657e17: Waiting Step #4: 6b0a720047ba: Waiting Step #4: 6a0680bacfb3: Waiting Step #4: 0253158e1e9b: Waiting Step #4: 739954443c14: Waiting Step #4: 2f7fa03b67f4: Pulling fs layer Step #4: 2b894ac85629: Pulling fs layer Step #4: fd28bde19ca1: Pulling fs layer Step #4: d9eaf39c7c4d: Pulling fs layer Step #4: 04560b8578a6: Pulling fs layer Step #4: 27328074b78b: Pulling fs layer Step #4: 2f7fa03b67f4: Waiting Step #4: adb2b80e1d68: Pulling fs layer Step #4: 2b894ac85629: Waiting Step #4: f4ea3d4b4969: Pulling fs layer Step #4: 4ad904d75890: Pulling fs layer Step #4: fd28bde19ca1: Waiting Step #4: 04560b8578a6: Waiting Step #4: 27328074b78b: Waiting Step #4: adb2b80e1d68: Waiting Step #4: dcb9a24f074c: Verifying Checksum Step #4: dcb9a24f074c: Download complete Step #4: ea15a87e47d2: Verifying Checksum Step #4: 7dda1beeb65b: Verifying Checksum Step #4: 7dda1beeb65b: Download complete Step #4: 16c50f657e17: Verifying Checksum Step #4: 16c50f657e17: Download complete Step #4: ea15a87e47d2: Pull complete Step #4: 739954443c14: Verifying Checksum Step #4: 739954443c14: Download complete Step #4: 6a0680bacfb3: Download complete Step #4: 7dda1beeb65b: Pull complete Step #4: 2f7fa03b67f4: Verifying Checksum Step #4: 2f7fa03b67f4: Download complete Step #4: dcb9a24f074c: Pull complete Step #4: 0253158e1e9b: Verifying Checksum Step #4: 0253158e1e9b: Download complete Step #4: fd28bde19ca1: Verifying Checksum Step #4: fd28bde19ca1: Download complete Step #4: 6b0a720047ba: Verifying Checksum Step #4: 6b0a720047ba: Download complete Step #4: d9eaf39c7c4d: Verifying Checksum Step #4: d9eaf39c7c4d: Download complete Step #4: 04560b8578a6: Verifying Checksum Step #4: 04560b8578a6: Download complete Step #4: 27328074b78b: Verifying Checksum Step #4: 27328074b78b: Download complete Step #4: adb2b80e1d68: Verifying Checksum Step #4: adb2b80e1d68: Download complete Step #4: f4ea3d4b4969: Verifying Checksum Step #4: f4ea3d4b4969: Download complete Step #4: 2b894ac85629: Verifying Checksum Step #4: 2b894ac85629: Download complete Step #4: 4ad904d75890: Verifying Checksum Step #4: 4ad904d75890: Download complete Step #4: 6b0a720047ba: Pull complete Step #4: 16c50f657e17: Pull complete Step #4: 739954443c14: Pull complete Step #4: 6a0680bacfb3: Pull complete Step #4: 0253158e1e9b: Pull complete Step #4: 2f7fa03b67f4: Pull complete Step #4: 2b894ac85629: Pull complete Step #4: fd28bde19ca1: Pull complete Step #4: d9eaf39c7c4d: Pull complete Step #4: 04560b8578a6: Pull complete Step #4: 27328074b78b: Pull complete Step #4: adb2b80e1d68: Pull complete Step #4: f4ea3d4b4969: Pull complete Step #4: 4ad904d75890: Pull complete Step #4: Digest: sha256:95727df5cd1eb4dbc829555e0bea75a8f5ef7a82a2ef594488644a2395bc2ad7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzDecodePrivateKeyBytes Step #5: Running go target FuzzVenafiCRController Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzVaultCRController Step #5: Running go target FuzzUnmarshalSubjectStringToRDNSequence Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running FuzzVaultCRController: Step #5: E1001 06:14:42.036044 93 vault.go:94] "Failed to initialise vault client for signing" err="error initializing Vault client: tokenSecretRef, appRoleSecretRef, clientCertificate, or Kubernetes auth role not set" logger="cert-manager.sign" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: E1001 06:14:44.138862 93 vault.go:87] "Required secret resource not found" err="secret \"non-existing-secret\" not found" logger="cert-manager.sign" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: E1001 06:14:46.241640 93 vault.go:87] "Required secret resource not found" err="secret \"non-existing-secret\" not found" logger="cert-manager.sign" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: E1001 06:14:54.651385 93 vault.go:94] "Failed to initialise vault client for signing" err="failed to create vault client, temporary auth failure" logger="cert-manager.sign" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: E1001 06:14:54.651444 93 sync.go:143] "error issuing certificate request" err="failed to create vault client, temporary auth failure" logger="cert-manager" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: E1001 06:14:56.753300 93 vault.go:109] "Vault failed to sign certificate" err="failed to sign" logger="cert-manager.sign" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: E1001 06:14:58.855261 93 vault.go:109] "Vault failed to sign certificate" err="failed to sign" logger="cert-manager.sign" related_resource_name="vault-issuer" related_resource_namespace="default-unit-test-ns" related_resource_kind="Issuer" related_resource_version="v1" Step #5: --- FAIL: FuzzVaultCRController (0.08s) Step #5: fuzz_test.go:62: "testdata/fuzz/FuzzVaultCRController/0027683e9ea390de21db5b3f4e16d9ac0f5805f1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/003426a592a17d54acdf7699ca6810bd953a37c8": unmarshal: unknown encoding version: !!!!\B Step #5: "testdata/fuzz/FuzzVaultCRController/0121db514f97771cbd90bafd1cc1e7101aa1a0b4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/01b7544e539cfd9d593a30f099463cb7be0d1f9a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/01e5380e97f7b0861904e12a21bcb3143fb011f5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/029026f34a2a0279f7437348156c8ab8a0c13526": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/02a494c05889a0906339eb876472c3e6108b2b66": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/02a9357dba524f7fa4d1e6c41917134ff6fd4f74": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/02f495243ad86d494d63ee0caf00620315d923dd": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/03497e37ed4db7f77b9ea73c090382c8e096663c": unmarshal: unknown encoding version: mlJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJJ!JJJJJJJJJJ----BEGIN J 1ӓ* 40 Step #5: "testdata/fuzz/FuzzVaultCRController/037503843c03b444cf5e96221397b99bebfe44c9": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/037fddc2d0b9c0a276c5b2918b6ce3620ba373cf": unmarshal: unknown encoding version: 1'ZZ1.000000000800000000147517112m9744921373 Step #5: "testdata/fuzz/FuzzVaultCRController/03a52d76b9c2daba2d75cbda2e801581bd11ef49": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/040682b8b5c537508a2faaeec984e9670831202b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0457cd818766ae893e0c558595056f47bb1b2cbb": unmarshal: unknown encoding version: .|: Step #5: "testdata/fuzz/FuzzVaultCRController/046bc01b2196318d5d18b665f4f4b02217d5b8c3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/047edce4f133c543a32f48ab4122e3d15d6eb047": unmarshal: unknown encoding version: -C_]MHd&X&/gc/heap/tiny/alocs:objects&*1C=%*[]vۗ=>X͜/in[V3ft{xHz#`K>e}lJ^S\*ji8N֍170141183460469231731687303715884105724s+@~X9le!۴`S*}Q{Ļ:Z.!anވ-KCً<"hgB'xՇ0fEL{tB$w=b-4|y]/z{ڨL&$,I`.(P'Jg-'qdy9i]JҔڬ^WUim{?X5/JQA歷 7nT wacSCMkT Step #5: "testdata/fuzz/FuzzVaultCRController/04a46abfa44b96b698be763238447d43d74347f4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/04f1e802141187e49bb475f8c6407079ac5f1e86": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/05010d688f31452aa15ab7d24f11f7f1ed3f1aca": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0513ba5bf2d792a58f100e9f865ce71453677a39": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/0528e3fd6bc49f044fed03d4203534eca2316970": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/05602f6290e8597c79fdaa9ffcefe24918e073d2": unmarshal: unknown encoding version: ISOLID3#[X͜/in[V3ft{xHz#`K>e}',B6y#& iu#8.Љ۶y٪=dM2N-af!A XF0fC0}#N4`Ca3@jh170141183460469231731687303715884105729 F>z;Z'ᣡ`>]!|Co,K܆@j,{#,!b Dl1+CB q VJe.$|?^E 0W*_~vԾ Step #5: "testdata/fuzz/FuzzVaultCRController/0823da87d7b43b48c619f612c8518a65db69fe95": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/08280604793e8a1add7bce34cbabba7f97bb9b47": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0872afa8afcddc890761a79702576c0aebe695bc": unmarshal: unknown encoding version: PK Step #5: "testdata/fuzz/FuzzVaultCRController/08a560ababb5065ee9bc9b802af014261111ce3c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/08f69e244688140a4f5ae067c40279660a52c739": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/090dec38a3b394a80c653f9b03641e96a508e548": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0918329b428e02505cbbc7f0197673edfcfe53bb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/093951ded9185ee0432fb5758b44aee44e64bd3c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/099f4fe4202f4e876138abd3322c26e29537d7a8": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/09fb190596eb70fc2cc975d6600e02fcce6bd27b": unmarshal: unknown encoding version: 1'ZZ0.00000000000000100604404787372557977372 Step #5: "testdata/fuzz/FuzzVaultCRController/0a026447f1d837ca0f23fcf699609e2cd6ef3aab": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0a170476083cb33afa2664de1b4b40fd40590513": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/0a1bcf71818df267b192ef7c188dc9d236f362d3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0a2159de23826d64737a12abb190dd7e558a9b29": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0a268157e9a845712009b731816699b3235ae798": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0a66cc2bf1298c8ef305abf15ddfe17d328a4e1a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0a90cb53e23a88d22a1eab805bb312677dc94412": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0a9e6e6fd78ecc208057bc31850384148e5481cf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0afc178ececff610afd345dd42b1b288d4b09401": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0b13a823eda7bbc04c28c7d23567218a1ae933f8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0b278e1791c2ba704032468176584cd34261b8ec": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0b4e3076f9599debb14295f18f879a1857e27a52": unmarshal: unknown encoding version: :]MHects--C&).-+--1376aPK Step #5: "testdata/fuzz/FuzzVaultCRController/0b5747c4d6283b4364d98855d2b71c9ab69fbf26": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0b927abc18cf99d83c223d603a5591f0a660e749": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0ba279eea114873548ac4651186898520a6c04df": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0bb51e5871ad5458435919ec1730cef9e5bc73ed": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0bd3ca85da479d1402223e18eb388ce496ae5ec6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0bf21f8ebcdc947f381cd68f0065504d6a5ebacc": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0c4f4b847e81f124c99c99300b8a1b906d2b9a3c": unmarshal: unknown encoding version: xC|yY&n@ Step #5: "testdata/fuzz/FuzzVaultCRController/0ca422724caf8e742c4e4531c5d6d5a891c27c0c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0cb2ec5ccfbc1214e7794eac4aed96b52f3eb7d1": unmarshal: unknown encoding version: #v1ZZ3675s86s2116386s765s2s576861717s21138676s8531934498s?Z[ Step #5: "testdata/fuzz/FuzzVaultCRController/0cf9f260ba78843e464f3d5e976b7d922b2beceb": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/0d0655472d7fb6b729e2cea33244b0d31de34237": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/0d22b74cf34ede5987de49bada1287a4ad04dd22": unmarshal: unknown encoding version: mlJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJJ!JJjJJJJJJJ-----BG uJ 1ӓ&* 50 Step #5: "testdata/fuzz/FuzzVaultCRController/0d30edc9b1f47158015cc7fa73cf149e8308f4b4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0d509c4a071c9a041d0887fce72854f3de624afb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0d5ae6bcb4409ba551f3a0e3fe755aac2d45d9d7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/0d77b32979d8f4bfe53045d00b21f26ef0f2b58b": unmarshal: unknown encoding version: 889555555155555152m888898888888888)88888ܾ!!!!@B1/p$Call,s$AInISOLID3#[X͜/in[V3ft{xHz#`K>e}',B6y#& iu#8.Љ۶y٪=dM2N-af!A XF0fC0}#N4`Ca3@jh170141183460469231731687303715884105729 F>z;Z'ᣡ`>]!|Co,K܆@j,{#,!b Dl1+CB q VJe.$|?^E 0W*_~vԾ Step #5: "testdata/fuzz/FuzzVaultCRController/11c4158a087b1f0a468e687330b13e6edd8beda1": unmarshal: unknown encoding version: ISOLID3#[X͜/#,!b Dl1+CB q V�Je.$|?^E 0W*_~vԾ Step #5: "testdata/fuzz/FuzzVaultCRController/1270ffc3b9152d7120e68548fef32251f3a9682a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/12c79302820234e5b860a5b59648c7e64fc143ac": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/12ca146c7340a113ab8af129c46cde2fc00eeb30": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/12d487413282aa9d67683e11bd3df5d9ef08c8c9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/12ece47e42a8ecedfdf4e27a53855f8200ff6117": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/131d4a480678f9a31ae4006428ede3f5e6a8ca02": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/133acac208f8ba81606ccc384e985f1b64c4a431": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1359879a5eb608433e02d925e8a02a01790d0ccf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/139a65182bc46e392591afbe2f7a4c9e39e9eafc": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/13ae3d095fcb49cd21ade58cbb6d70fa071f7f8c": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/13c8b9a6959cdbd08f6645de2a7b8b375e53e62b": unmarshal: unknown encoding version: Call12s: Step #5: "testdata/fuzz/FuzzVaultCRController/144015b8e3661ab70e3e6ae54092d80bb050b8d6": unmarshal: unknown encoding version: ! CR-208b06c31c2f3b9396ff3b9396f Step #5: "testdata/fuzz/FuzzVaultCRController/146afa2dd40ed960a8172d429f0807d0fc983539": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1476bd8cf8e8b1100c23de987a9e5a7c2a26cecf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/14da274764ea0e5648e11eb254fa9b9e07f02138": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/14e7e8f0a22f72a51387d1894750ba439fa0994c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/154b6de29ea21047917d06b708aaced2f2a3baf5": unmarshal: unknown encoding version: ކsssssssssssssss @0↑Ͻ Step #5: "testdata/fuzz/FuzzVaultCRController/158482e199a8f91ff5e2418c20eb9cb98acd8c2a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/15a8893af74e70557629aa7c3244664c40add618": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/15b462b9e068bd9dcea467865d02fc7ff01607a2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/15b83c80e04924b9266760fcfaa9d33b112969b1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/15d21d32257e4c2d3640431cb0955486072b1da3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/15e9ef6577fc3b59aae5a4e3bb04b07ca473ef6d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/15f0fa9b38f55bb695df4548e6a3a5f965fa1d0f": unmarshal: unknown encoding version: /#ZvZZ3675s86s211638djZm+ta !hdlr mdjijX,!hdlrZm+ta !hdlr mdjijX,!hdlrmjd,U Step #5: "testdata/fuzz/FuzzVaultCRController/16095742304a6e568c290965d58a5185ac44db0d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/160ca59a29dabc9dea3e95bb737509d7265ec16f": unmarshal: unknown encoding version: -2--B{.:19$3 Step #5: "testdata/fuzz/FuzzVaultCRController/163e0bdfe30d31270bc717ed509f1b696db67709": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1655511d0a18a07844a2d1d996f8ee6a3fd7e462": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/166214eeaf108ec629032aa1eb6ecfed3e1a163e": unmarshal: unknown encoding version: 88884444 NW)W8888888884443Q 44}44 NW)W8888888884443 NW)8888888888888 NW)8888888888888$44 NW)W88888888844434444 NW)W8888888884443 NW)8888888888888 NW)8888888888888$4484444 NW)W8888888884443 4444 Step #5: "testdata/fuzz/FuzzVaultCRController/1675ded04e335a24bd5f1dc5095b8ca8792c3950": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1691fa6ec45ebc66196fdee50aa03bc4fbdac545": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/16e46b9ad29ef3c5812eda843607e1e4f38aef7a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/16f7ba2a5027fd9868b4705c608eee43977af135": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/16ff118ac7e9d50211fd0eabc55d16c3809f0df6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1704aa9b68e2829b91ed0dc90363c761f38dd1a4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/17225d6c21b501029f7ab10d7c4a4dd900cba533": unmarshal: unknown encoding version: CRgeneraliz(?:,08R�alist Step #5: "testdata/fuzz/FuzzVaultCRController/176a27ced4d572e2b503f48e9f9dddcef9528339": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/17790a0975b3d22fa02070d9fee1bf9926cabe14": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/17c82316cd6b34cf0128ffcb4552350c04bb551b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/18244f03889a1162b8bab074c6a56777a3b1b083": unmarshal: unknown encoding version: xC|yY&n@ Step #5: "testdata/fuzz/FuzzVaultCRController/185fe97f36cf049d9150e193d2d21f106bb259b9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1872062beb864cc2fc764f30b1f7da1db2d7b84c": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/19200e6ff40e5aa9061963a720c9e6cfcefaa955": unmarshal: unknown encoding version: \xw(\ɀc[^\s[]d\(*COMٟ`G\B\p(*ACCE!PT)*\P::H<<<<<<x\Dr*\s(?|,g .t?(*THEN)I"&b\S+\tS*:I&{\S/+$*k/&/+$*[:(@\\\<[:|]D\D\|8S(\\hK)$+=8Nup$p;\0S(\K)++~m%\D\w{5}\@DM<];b\xw\B(\DEEEEEEEEEEEEEEEEEEEEEEEEEEE\xw\B|((*ACCEPT)*AB|CC|(\D\xCEPTPET)")\D*()\K\z:+\R?\+ :I) \()\2'+h:aKI) \:a\s+ tttttttttttttttttttttttttt_:PIbI%9(]&S,\w+(*FAIL)S*\w+)":]4 \H󠀻(*COMMIT)DDDDDDDDDDDDDDDDDDDDDD0&b\[[DDDDDDDDDDDDDDDDDDDDD#  \{4\n(?R)*)(%?(?=y R)*)\D%(?(?\B(?R)O*^)%(?(?=y# R)*%)(?(?=[ ?>9,666666666(?R)*(*ACCEPT))%(?(?=y R)*)%(@?(?=y ?>=y(!FAIL)\w002583880013122808?>9x6666666(?>67(?R)*(*ACCEP+T))%(?(?=y R)*)%(@?(?=y  \sFAIL)\w00258380013122808489=6666666666666 \{4\n(?R)*)%(\\\H*\s+\sfffffKbS**Ib\S*/ A([:w6666666666666666666666666666;Ry){8}.(>(!FAIL)0000000000000000000000000000001319204157;Ry){8340282366920938463463374607431775258309h\.#\\\>8H*\R+H*\R+@\s[ɇ4]'b\s+ \H\W*\R+H;Ry){4}.(000000000001539955106165887(*FAIL)2492;Ry){8}.(n(bh\'z'\w)?>9x=y WBx=ga\x \\Sga\x \D)\S?@ *\S?\S? #  \{2\n.(?R)*)%(?(?=y R * Step #5: "testdata/fuzz/FuzzVaultCRController/192a57524555b473b95dd5cbee0d60dca34cca13": unmarshal: unknown encoding version: Call+2ss20 Step #5: "testdata/fuzz/FuzzVaultCRController/193caae3e796c0da4396b577ab76622499ddd8d6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1963208521449c06347792663dac1ba64ac875bd": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/196d7c232c65bb27394d77a79f9b116f20288ef3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/197cbbf88bfe16e3ef0967229b9bd555507e56b2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1980e63f13cdaf4b73d02d8f8e84e5070ee3e8f2": unmarshal: unknown encoding version: :]MHects--C&).-+--5688aPK Step #5: "testdata/fuzz/FuzzVaultCRController/19c3e2b998839496ba5aa88832e42dcf63a30d95": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1a4e3ab65f5c3748ee8eba7dcf934dce696c134d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1a9128aee7ff94fb9dd16124bc31931f0f2f4343": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1aa96325881d191009359b70eab84a1039e76831": unmarshal: unknown encoding version: mlt*0/JJJJJJpJJJAJJprovDeniedJJJJJJJJJJJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJJJIJJJJJJJ-----BEG*2*@Calf????60s Step #5: "testdata/fuzz/FuzzVaultCRController/1b53726697dec351cb2ec3516c65b8766a800301": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1b71b0232a1abc341b6169ebe93e421dd561904c": unmarshal: unknown encoding version: 1'ZZ0000000000000000000013111779544193535542 Step #5: "testdata/fuzz/FuzzVaultCRController/1bbf96daa24f7b33c11a1d962976ab1439139c28": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1bc854153b81a34169c986bc35862151a55f1552": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1c004492b846ddfe565eab8de1b2cfeef0125794": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1c0eef4837fdea1578fea37a98b724821fe0e176": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1c17a66079c43283cd68382e19dd4fcde8111cb0": unmarshal: unknown encoding version: w"TY0@󠁝1111A11112`b283940248139761131111A111111A11111;TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT 111111011112 -*m< 5Y3;<2@b6  <2(5^@b6  <2(5Y3 <2(0%͏ '& 104184594!;$$Ⱪ1$$@-4;$$-448093510648230$$24222$21221232222222120222H2222222122011TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT.0 Step #5: "testdata/fuzz/FuzzVaultCRController/1c3defb5d716f4426ca19db1fe31f0be5e37ff90": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1ccb582c9bd4407e7bdfab9741c4571dc492f8d3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1cf789323f2d08aa3c08e4f02af98f04cb1feb73": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1d61239fb7e9280ab622be16c2f7368e5d948c37": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1da38f7b1086176e14cfabbd08bd58f3f9dd831f": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/1db9813cf1debfa206a9da8706577898a4afb729": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1e1393f3671d458e09b1b0b198060d90791475fb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1e16f99333cfaf343fe3356a737609da83169321": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1e6b6577f94330617fa6075149acc3c43a0a777f": unmarshal: unknown encoding version: #ZZZ3-57s86s2116.8us667s9116785272s167s63877s65s43935Call18ssJ Step #5: "testdata/fuzz/FuzzVaultCRController/1e869445b0cd91849444d7d923fcf8d41df930ef": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1e9fe5e1096b637b9409d1d476f17e8d43a69ffc": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1eac404400d19ecb6167c7452d4b5e5a42d662d9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1f6116adff3dd9baa099806b077c6de358e71adc": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1f8c522f867a2cc4b5674e27710059791f1c72e0": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1fad210f2126ffdb2cdee0369a6d798abecb89ef": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1fc8c6ea62c569676f058aaa4303a116d7c2b63f": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1feb44a4e9e0534302b266679950c4079ab5be46": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/1ff51057019fb2256532c7c199f8e0cbdf4bbe79": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/20255e0f37757263a1a6673c5cd0a4e9817a2ca9": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/202de0fdb5b227e41eac0339da560070c045c6c0": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2037cbdeb399cd3505e629ad5762119a9f89e3e5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2079a0ff1669890d08502b24181d08c2e03217ea": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/20811c95669f637d389c605ac1cabdd77da60d4c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2093d49107ca9e06838a0d2f88dbe939d03c4ca5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/20b8fb61fb6cfdc98691c27558d09e297f11e778": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/20d84839acae1c04083da145ad54f89ec9eb971c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/20e382f42cd79670cad6d029de17f495f043a45e": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/20eea12680ee102aae7e6bf96f693830dac86012": unmarshal: unknown encoding version: 1'ZZ22222.22222222222222544444442func(*v122 Step #5: "testdata/fuzz/FuzzVaultCRController/210acd89f7db5289afe812e2a2f27cde0540c601": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/211146aa1d653067e84dd223c45f4f7f617bd809": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/213250d709b6628c329ae0af4389c1ad1d43106d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/21393fa442874844c400094c400a0e374e38e7bf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/217fef30ddd59c8d82fd8ddf42c82c722b1105b0": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/21965baf7119a5ff738386b8a58c761a4b49f6c5": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/21a91a1709be44c2ebdc0fbf13acf67db7475b50": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/21cbe80db32a985150df2b3ec25f126ce5d6cd89": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/23066bfa0fbae5e408696f972acf2b2bf260d09c": unmarshal: unknown encoding version: zC󠀵 Step #5: "testdata/fuzz/FuzzVaultCRController/2309ef2d9e58669af2f66ae62f92cc5e2d51f242": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2319a16d1687c2c1e59c921c47a6cf31c549141c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/236b22df1b620255a75b15948afd9e4578637c55": unmarshal: unknown encoding version: -TypeM%8 Step #5: "testdata/fuzz/FuzzVaultCRController/2391de8dc55c207f59c5326c38f87c0e12de486c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/23d636525c77dc63bc877abb4d562d176ce1744f": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/2403329a95bf0ce15b0f9e453dc6a0e835bd5795": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/24a2a1ec62a01585cfcc262b8181f5078de42500": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/251beb546fb4f576a630340d74e534ed27c70f86": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/252417c0756fb48f461b2759dd41bc519632f17a": unmarshal: unknown encoding version: -C_]]Hd&X&/gc/heap/tiny/alocs:objects&*18446744073709551615C=%utf8vۗ=>X͜/in[V3ft{xHz#`K>e}lJ^]/z{ڨL&$,I`.(P'Jg-'^5vi]JҔڬ^WUim{?X5/J@QA歷 7nT wa\MkT Step #5: "testdata/fuzz/FuzzVaultCRController/252f8a157217d1ae7536e222387af074440cba02": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/258d24fd9e4dcc8e5c85dcfa1d0317e73ff077b9": unmarshal: unknown encoding version: ISOLNQID4294970139#[X͜/in[V3ft{xHz#`K>e}lJ^]/z{ڨL&$,I`.(P'Jg-'qdy0i]JҔڬ^WUim{?X5/J@QA歷 4nT wacSCMkT Step #5: "testdata/fuzz/FuzzVaultCRController/28c94e9f09bdd037397a78acd74a11437cc4480f": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/290bed8e140060793faf6e63e03ecaacabac9c63": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/291c3d766f59c663541fd172ce7313e3024a630b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/295177a23598e14b041296092688825bee381e9e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/29521c2a02377807ad159cf7d0b228aed18215ce": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/29be2aa362bd6b88a1918d4f564819667e68095a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/29d96a5e69456acaf7266995ee22cc04b3df9f10": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2a3cf2989141f25a0945adc1e2e10a0f66c8a920": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2a6eb226b8bf24c2133a9720a946fdceef2a67a4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2b6c10c6e53f6704b60e000151f9e7509084efdb": unmarshal: unknown encoding version: 1'ZZ0.0000000000000000060440478737255X372 Step #5: "testdata/fuzz/FuzzVaultCRController/2b7f666065df244e148eca0043160fc675383532": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2b841a6aec08f9b8f8e84c675f86c242214a11d0": unmarshal: unknown encoding version: ZZ3675s86s11s63628765s2s576863434s21139126s8532196664s? [ Step #5: "testdata/fuzz/FuzzVaultCRController/2b92ebdeceea0e1d30cd15bc70ab1e85aefb8d66": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2bd7abf4f50747584223a9eaa9b8a54d423c5b32": unmarshal: unknown encoding version: r Step #5: "testdata/fuzz/FuzzVaultCRController/2be3a2558c71362bb64732f18e6707e72cc7fddc": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2be83f621cec75b12e74e9974044558f64cf9636": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2bf4080d390c0f04c90edac8ab3e03d2b1e568e0": unmarshal: unknown encoding version: createPSǶ?^C:NcMLJeR*M=ܸ߶{(&2Bgԯ%ǒm)רJVw/"a[ճ,Cd} A2.]@*HLFR ]D_h+DXx6ḱa~tL0# Step #5: "testdata/fuzz/FuzzVaultCRController/2c5964018c9e0464ddb5d9a8c2aef145a3113a64": unmarshal: unknown encoding version: 1'ZZ0000000000000000000008245045131422944950 Step #5: "testdata/fuzz/FuzzVaultCRController/2c9f07a278207b33be93fbd7b7ef4ce7aef8686e": unmarshal: unknown encoding version: xC|yY&n@ Step #5: "testdata/fuzz/FuzzVaultCRController/2cbc6560fb9736f181059dcd9da234bdb2524b57": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2cd519be96d3bf64338e727cb4ecd19eee981787": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2d06332e850ad1bd4e8dc38e823210f18ef25e04": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/2d50dcc3ebba3e45913e22153e3a8f1cf4499b94": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2d97a2585b262631b10f63d77bc1dd9cb30dedb3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2daf4ceff102ef1c4970a93bee79913a3a763aa1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2dcfdb1d4c338d84eae98a83aae623621217bba3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2e0945929a9db89b3eb1e5cb7aa9bd039cdc92a1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2e318d674c812c072cab37672ce9f9f0d01866c5": unmarshal: unknown encoding version: 1'ZZ22222.2222222222222244444444 Step #5: "testdata/fuzz/FuzzVaultCRController/2ea70133b7933ab2bd2abe0cf5c8456320c86978": unmarshal: unknown encoding version: mU0 Step #5: "testdata/fuzz/FuzzVaultCRController/2f85a8dced04a35f90ab3b9970d36499f3964988": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/2fc5c56d0fbe3a9b553e4db7070e380f17578801": unmarshal: unknown encoding version: !!!!!@BdF-08b06c31c2f3b9396f Step #5: "testdata/fuzz/FuzzVaultCRController/2fe1e614e65136c4030440d6b2e2ea234db814d4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/30c4cf1201c3de48752cc99348f97569c28d503e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/30ce8d8a82f6274be5e7cd7253bdc3d33ab19f9e": unmarshal: unknown encoding version: ZZ1.00000000008000000008917529517235605480 Step #5: "testdata/fuzz/FuzzVaultCRController/315354b7a339d8fdf1989c43b04720a131d845e9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/31b4a8cf9e4f7d7d65a557cec2db5e3f8251dd28": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/31b9ae0c0810f565a3e1d416605ece35d44b453f": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/31bcc3ca356e7b3dacec42dd8de9fcccf607a968": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/31feaa1ef4518d95f982a557f8ec646707b9e1f2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/320e1d807c4a67ea3855a2f4114928658d1382e5": unmarshal: unknown encoding version: Z103789"211GGrK߄ (?:,l08R�a Step #5: "testdata/fuzz/FuzzVaultCRController/3258a56c1ebb5e7d34cdf110ae121f458b7101f4": unmarshal: unknown encoding version: R�aR�aR�aaR�aR�aR�aR�aR�aR�aR�aR�aR�aAAR�aR�aR�aR�abR�aR Step #5: "testdata/fuzz/FuzzVaultCRController/325b5e158c5540e3892c13df9ed91affb476bd47": unmarshal: unknown encoding version: /cc/heap/tin/gc/heap/tin~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~y/allocs:objectseeee~~~~~~~$~~ Step #5: "testdata/fuzz/FuzzVaultCRController/32e351d36b9a4c1bce8677bc5802f72aee07b192": unmarshal: unknown encoding version: xC|yY&n@ Step #5: "testdata/fuzz/FuzzVaultCRController/335521014323834303b029964e8512f16ca2e300": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/33788841093a31bf2b03fcde668ee4234d14b50b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/3407ca57609c6d49af4b4832cb016344ab8815e1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/344c406c9fbf71b937d07ebda6cce53f1140ee54": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/347d21da728f377469218e7a233a06e680112b64": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/3486b7df433f70e7deb770bfb4433df5bac27066": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/3492e4ae85011c5c5a4498ac5b3cd83b21bd4916": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/34bb3cbc586944788a1f6cffcb26a0785416e80d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/34bda283856a70c9305f54e7e5bdb5de07f30b18": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/34f6c643b4979ba37cb0485a9c50f0a042999890": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/350c3f6bef1367c5779d18ef28c385a7f2179db9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/3525dda27bf0202a12c4169e3a5aaf014edf03b7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/355f3c0ac993f04180bc97779d1b002ef8865212": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/3567ddcd70e2dec954903c27e80d29157fece391": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/35c2393f14645230725ac454b521989367732453": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/36455ca07b4e7d12fb4d7f47e6fd168e3a801a21": unmarshal: unknown encoding version: mlJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJJ!JJJJJJJJJJ-----BE 1ӓ&* 40 Step #5: "testdata/fuzz/FuzzVaultCRController/3659ecd64e39f3a9b245355668163c708cbbf0e2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/36b71765801948a0f057a1b424bc6b2e343bc52e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/37008aa515e32788ff4702b299109aaad50add0c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/3726c055d7e471a9b27726947d3acfa80e06c562": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/375553aea420f429d94fa9e72a652b0583dcfabd": unmarshal: unknown encoding version: fHTTPRou--C&)3zCa--` \!Galll2#6@aC00~~~~~@~000 0075792720--C&K"@vv""zVeoӜ{ao}% ?Wα Step #5: "testdata/fuzz/FuzzVaultCRController/4cc8b32978c248f79913f74657777947b5fd59df": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/4d136d57405531564ca64d075331c66b29cf9515": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/4d1eb94668e507ad5c2bb611a8838793c0007943": unmarshal: unknown encoding version: .: Step #5: "testdata/fuzz/FuzzVaultCRController/4d2d015a6d32738a06809a0ec852ef97bbaafa98": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/4d7410c31197700e719ec4b3fd821c3c7b4f6282": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/4d7de78f24c3015dc1f65565d95a610c44cfafed": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/4e325f4178a985577f57253c5ee87f39ffbf8472": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/4f4ee9f950ba1c3c2036fe55ea7a18705fbc7df1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/4f7608dc0db526f2fa874fe90a837921bbc06203": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/4fac9d13226734a34fdc40ae9df15f7dac31dc5d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/4fd41e40cef017ec4cf4b67408e564d4c9308eeb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5055e34629cf9fa8fe27a4624066498f9c70ed1e": unmarshal: unknown encoding version: m Step #5: "testdata/fuzz/FuzzVaultCRController/50af0567524001b71547d13349108b7d5513b302": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/50b699d2c735bcbd297419d9be0d1e88ed9a7960": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/50e804c5e3ea39637571a7215bacfabb5c1d136e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/50ff211b72943e66b12c04d32eb4b5daee26ee71": unmarshal: unknown encoding version: r2 (?:,02 R�a2{ Step #5: "testdata/fuzz/FuzzVaultCRController/51270286cf69d630c9ae7c390c9af3f617d07a4f": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5158fbd1d5609e85c8e2dd974adf958b3cc84f50": unmarshal: unknown encoding version: 1'ZZ22222.22001722586676059650100func(*v122 Step #5: "testdata/fuzz/FuzzVaultCRController/519230451e2e4987a4ed7dab04711d5db50fda84": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/521db872409b22668aa5b5190044b978edf5ce7d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/525788fd41dd7fe5db50da068ca52db565995ca7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/52c25864a409b810d39a9be71cd89ee498eeec83": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/52ebc0de5c001ae503c132ee556db97a5c194135": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5309cb042fb7e0ea62f40521b393d4439b65c8e7": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/5338bfe95ba0edcf4b09847b52af7c342b2d16d1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5347f1b70695de69d7ad2e7ec1fcea47eb293f8e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/53884a8703b735e8f5e2c63211d13a128c4b3c36": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/53ae79d326485591db31f7b0d79067cc57cc0ac9": unmarshal: unknown encoding version: ID33{2APICyvvv=?APICID3TU!USLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJDI5-^0w ^^w ^1w ^w ^1w ^^w ^^w ^1w ^^w ^w ^^w ^1w ^-w ^7w ^^-w ^5514aPK Step #5: "testdata/fuzz/FuzzVaultCRController/53af5df064a8cb639c682d5c599432ea754521bf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/53b56d90c03618ca4f1b4c80493a15d1832209a7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/53d184654d4067ad87a293ab4be604fb321644b2": unmarshal: unknown encoding version: 1'ZZ0.00000900000000000009771209953995099704 Step #5: "testdata/fuzz/FuzzVaultCRController/549647ead0bbf55f9289454f6a1835eda048c033": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5496fa65c8eb3a2f50a9e8d9e32d984e86776fbe": unmarshal: unknown encoding version: ID33{2APICyvvv=?APICID3TU!USLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJDI3-^0w ^^w ^1w ^w ^1w ^^w ^^w ^1w ^^w ^w ^^w ^1w ^-w ^7w ^^-w ^5514aPK Step #5: "testdata/fuzz/FuzzVaultCRController/54c1a203cfc92ba8e48a03803e602f843c99374f": unmarshal: unknown encoding version:  99999990 Step #5: "testdata/fuzz/FuzzVaultCRController/552723a7d928304aafb3555c6e9edd61d07afcf5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/555284ba15e7df4d33659eca982f5cae210daf12": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/55ca58d44258bf2c7abcd7d07a51d718189e083b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/56223e433e992be9794032e9805643e73fa5a133": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/56259ab5753ba4be2f24f84fa8547a50eefc16d8": unmarshal: unknown encoding version: C Step #5: "testdata/fuzz/FuzzVaultCRController/5643c8d2771e7a0b245864704dadff0dab9ec7dc": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/566515c7dbcc3226b789b33f9910f67cd1e12178": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/566e83bcae0645464bb6e0906871f8829173a9dd": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/56796a79bb0baadd4e425e69f8f303887565f344": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/569561de7c6076aeab79871d150399e73ca53646": unmarshal: unknown encoding version: 1G UEFI PART\/)"'%N.&?#~@=rGy=iG}zӶVEҭ`DLinux filesystemG̚릿,G #!󠀻0%@CallG UEFI PART\/)"'%N.&?#~@=rGy=iG}zӶVEҭ`DLinux filesystem1.1.+0#eLeeLe$= Step #5: "testdata/fuzz/FuzzVaultCRController/569b234ba3848d13e1e7b7c5544c1df84c094861": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/56ab1c41dccaa27cdc07f234866de4d85ccbe3d6": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/5717bee1015459dd8fe66841d1bee8cdb1cb8f95": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/573ebbbadb131a7cb5df4bc630ceff217c3e62f0": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5743783253263d30059ee64e765efe0758c2a8d6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/584950e68706a88a018b9330e026e320fcdfb052": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/587d3cbba1359658229e80f82ac7b26f6d4dfdd0": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/58942066e58cdaf57e258a4686520879f8e0c881": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/58a67a76b863a1919d0be9605d863074031153e8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/58b08d51ec65aba4e9004200152b241e15b36fae": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/593b16308568823330d3a695c3263fb53d7064c8": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/5974cd408e9ba784e3fb32679027c8a75fefbda6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/599a5a37933ffda3cb0435c1f3c0038896f08593": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/59abf34172a44fd7525a4dc9215fa3af8f6ca2cb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/59d36f1ebd3c97651bf919a6b482270164fd9e5e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/59e731ea6ca29b0d6e35ebc38f286e98515f89f8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/59f7b523187dfdb10d95f2ba8ce7abbc707e6b3c": unmarshal: unknown encoding version: 1Z0:!]!)] Step #5: "testdata/fuzz/FuzzVaultCRController/5a528158058ddcf8a66b79ae72083b235ec5d698": unmarshal: unknown encoding version: -C_]]Hd&X&/gc/heap/tiny/alocs:objects&*1C=%utf8vۗ=>X͜/in[V3ft{xHz#`K>e}lJ^]/z{ڨL&$,I`.(P'Jg-'^5vi]JҔڬ^WUim{?X5/J@QA歷 7nT wa\MkT Step #5: "testdata/fuzz/FuzzVaultCRController/5a6760731bdcd4475f279668d2760f67fdc6251e": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/5a6a7efd8b06fe04f6318c6ded45f5351db8ba9b": unmarshal: unknown encoding version: fHTTPRou--C&)3zCa--` Step #5: "testdata/fuzz/FuzzVaultCRController/5a986301cc0dda30d68379afc0025647af4763c1": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/5af7583a7009652112d68e7e3b3c25b1f57cc39e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5afa9893d2339df6f101aef40ef4ff6135dc4c61": unmarshal: unknown encoding version: *bCall ~ ӓ :*;q0;2IID3i0\-TATIID3i0\-TATIID3i0\-TATIID3i0\-TATIID3i0\-TATIID3i0\-TATIID3i0\-TATI~PX Step #5: "testdata/fuzz/FuzzVaultCRController/5b8086559ae5f07da7614681297377b85fb40111": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5b8c2ea523a97b6fc734029ddfccb217d49d02dd": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/5ba27c4762b407b69a1a45da5743cf7767ebcfd3": unmarshal: unknown encoding version: ?CR.JJJJJJJJJJJJJJJJJJJJJJJJJthuer:bytes(?:,04R� Step #5: "testdata/fuzz/FuzzVaultCRController/5bad5cbd4afc083d7ae69c4f91e6b84780155425": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5beec30833df0d9a85bbe8495e75e33cebc085f8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5bf27008a8241eb42f209d05f65ee4c9bc621d02": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/5c03e5e9e10d739219fd0bc87db32459604e4f47": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/5cfdc2b0e7d9b5ab40270c2504af11ebba195ccd": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5d0b27baadc9c64676bc0c6b99afce6e793e0211": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5d3d0db94676a8f0cd1c43933817f5929e5971ce": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5d6071266bae75ffa9e4fb73192c0860ac127516": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5d868e98fc8f285c582035716ace0575cf73f540": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5db93bc6ee6d09e77837fc265d3a26d78788a75e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5dd2e39eeff1bc1e8883444d7a04d1779792e186": unmarshal: unknown encoding version: r Step #5: "testdata/fuzz/FuzzVaultCRController/5e252690ad6e31c5b474aa7230db03b74f3203a7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5e783d6ed5859bcc199dd57da205c68e39a07050": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5e7bc57dddead0a0b8f84f28cbb883439c21c192": unmarshal: unknown encoding version: -----B%4 Step #5: "testdata/fuzz/FuzzVaultCRController/5ea658603c0d70ddbffe051fb3a51b5a2b67a6d6": unmarshal: unknown encoding version: r Step #5: "testdata/fuzz/FuzzVaultCRController/5eb1eb56617f3c2202b3ac2511e71a89115b9f6d": unmarshal: unknown encoding version: 88884444 NW)W8888888894443 4444 NW)W888888888$ W&[ Step #5: "testdata/fuzz/FuzzVaultCRController/5ed95db12da9033b7d4a51fc36ab04a3348d8a92": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5ef566725a28bf06ae315385a2254e8be6e01243": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5f126e54fd50e4bb7ba76a9a7330cffa52337fdb": unmarshal: unknown encoding version: ZZ3675s86s11s63628764s86s75263434s21138679s8532196664s?[[ Step #5: "testdata/fuzz/FuzzVaultCRController/5f502d68c2dc242c2e9bcdd3b5660dc1358da493": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/5fb244d9ecfe92b85909797412412b6936ecbdf0": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/600f365898079e2c0131beece4d1bcd68553bc10": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/607e3a73386c4ad411b8509e465a830afadd5def": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/607f48e0811cff23a2bf68f17ebf87ef419af8ba": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/60a90970158b4d8fde2a492dd52656b6cd237ef5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/60b3df85f80c8c680ed24881d6eaa38fd37649f6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/60db499f7a680a096566fac613028d90d61d2cd9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/611504bc777f31764a0dfcd38d8edaf67558e767": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/61406dc731401b11c79139895963b1c8a4424696": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/616c7baae6fd1b20780c00627f028ff2af074886": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/617817d0645cd7510de435d85921580999254261": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/619f676cb4bd1e439d6ab71312b83f9c346efcb4": unmarshal: unknown encoding version: 1'.Z1.00900000087370000004󠁂4047877255797737000000440478772557977372 Step #5: "testdata/fuzz/FuzzVaultCRController/620514e412f3731fbe8b0e7bd22591801457afc5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6262329f88d24a5cd935d560d3881ca1bfb11325": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/628a7791cce292a15df38ca11b9e491391bf3f94": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/629e18c06a5beb43e84f900e861ac640ba361d3f": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/62d5c0b6ea7085ede058d1976d7d6a9114a95aa1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/62e62766effd64bf1db1cd7308dbd39d1b3423ac": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/630007e9d0cf94b2e3e8f8be6c40027a45a6026b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/63239fc4278cffe6c33ef175a98f8b084da08a7d": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/633809e198b97c21ea4a1d068e264508c5298b8a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/635ed0955c8e36247f2b0197c17aa25680bed2b8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/63a6b0872529243aaadf681795fba780215922c1": unmarshal: unknown encoding version: -C_]MHd&X&/gc/heap/tiny/alocs:objects&*1C=%*[]vۗ=>X͜/in[V3ft{xHz#`K>e}lJ^S\*ji8N֍4s+@~X9le!۴`S*}Q{Ļ:Z.!anވ-KCً<"hgB'xՇ9fEL{tB$w=b-"4|y]/z{ڨL&$,I`.(P'Jg-!MXdy9i]JҔڬ^WUim{?X5/JQA歷T: m|Ós9le!۴`S*}Q{Ļ:Z.!anވ-KCً<"hgB'xՇ9fEL{tB$w=b-"4|y]/z{ڨL&$,I`.(P'Jg-!MXdy9i]JҔڬ^WUim{?X5/JQA歷T: m|Ós9le!۴`S*}Q{Ļ:Z.!anވ-KCً<"hgB'xՇ9fEL{tB$w=b-4|y41849542764326126505s86s2s386161766s2156718s761s21138676s8578641186s?ZZ3675s86s210]/z{ڨL&$,I`.(P'Jg-'qdy9i]JҔڬ^WUim{?XJQA歷T: m|Ós+weJ׎=K!{Հ%*[]v0.JSONSchemaPro-`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`*[]:v1.JSONSchemaPr`$ס$/-J43č<2.6؏.&'İۗ=>X͜/in[V3ft{xHz#`K>e-N`-N` Step #5: "testdata/fuzz/FuzzVaultCRController/63d1cec59dccda434314830383cf35483bf8f55f": unmarshal: unknown encoding version:  ' Call+0ssa25 q0 Step #5: "testdata/fuzz/FuzzVaultCRController/641a44a5b12ad010955c86414e0efb40b33974c8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6454b0a6fb218bbf7f9624175e69c4847d664a70": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6465f2f96954cd45ee1460005f02a3bc41eadec3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/648189fdc95d3786e770b99d6a62215c893b3acd": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/64bc19494f22d3bbc7524f01f6c33bf4eecc3a30": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/64c77b4c9c996a73d93fec49605cef7a3f842b9a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/65a3fe7a109bb3871c214b9d281eb8c89bee006e": unmarshal: unknown encoding version: !CR.:10 (?:,08!R�lX Step #5: "testdata/fuzz/FuzzVaultCRController/660b8f463cd732a2f22f977458934eab7f87ba79": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6631c1d574b56bff74f03744045ab0a17bacf203": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6675bf41cb87922cc18ca1b30c22c5e218bb1c22": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/66be6db5c5192a42f5eec45f5372a9fa487f1f72": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/66fdc7edbafe552e351b477e691123adbf4f3103": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/672442a03d2c62a905ffd7a94c4cdaa395fbe24d": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/67bd6369839136cdeba8b658576ee84d2b699c7c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/680013aee034c4563529c4ad4917374e55e84dd7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/681f9de4e4bfdd38d95fe3a6c1e7b8f90c650b69": unmarshal: unknown encoding version:  99999990 Step #5: "testdata/fuzz/FuzzVaultCRController/682cda3b217fe29447d52a5fa96223a65ca6bdb8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/68e9f3e4e043f05d11bbd41431ba3fb871b2a0b0": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6930f95dc044ce34d48b62e0324b6684c025818b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6952344d7265de386889264589b3e930d86a7f98": unmarshal: unknown encoding version: Step #5: "testdata/fuzz/FuzzVaultCRController/697255d760de9bdb79e15259fc737715d81eae20": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/698a2b8a1b5270c53b7bd1c59a7e66c0dab0d4a6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/69a329ea6c2d41a69aadd7eefa8886c6c09aa1da": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/69f34d9340452e89444dc714d8387161b6f78681": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6a191e146bf7d4af7a8da04254095d14343f1e76": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6a990efdfe7c186cec79d507447d0f686f0991bf": unmarshal: unknown encoding version: !!!!!@B Step #5: "testdata/fuzz/FuzzVaultCRController/6aa758853a2d5c0a9bc378b5ddbec75ef161a5bf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6ad5320aac5e6e044f81153c1010a05d7377b344": unmarshal: unknown encoding version: Invali[!�o~: u🿽d Step #5: "testdata/fuzz/FuzzVaultCRController/6b0d817dd20f2940e0d88534695c951c951c27e4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6b3864004a372fed5620a9aaed44fd7e30ee813c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6b68c3c0bee5b36cde077d084337e8a421a66c09": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6ba53ad13d0fd7b95667f67385d13c600fa8dfb8": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6ba90b1f933a3596240bd4d5277d4720586f5e11": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6bf45fe609f3f271265b0461b18ecd00695447ad": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6c1bfc7efdab247b2070ecee5796d02669ce7c80": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6c22e84648b144279da7fab4d9cd0f77957fb66c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6c9eaf4f25e1a07ca784f181bd520033fc9a2767": unmarshal: unknown encoding version: 1'ZZ0.01060060s6235600050076 Step #5: "testdata/fuzz/FuzzVaultCRController/6cc90898eb8a428af49f9dd4e3d99888354f463b": unmarshal: unknown encoding version: I$A4 Step #5: "testdata/fuzz/FuzzVaultCRController/6d0189ee3cf584670f0e11b7b724cf82fcb64aa4": unmarshal: unknown encoding version: ID33{2APICyvvv=?APICID3TU!USLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJDI5-^0w ^^w ^1w ^w ^1w ^^w ^^w ^1w ^^w ^w ^^w ^1w ^-w ^7w ^^-w ^5514aPK Step #5: "testdata/fuzz/FuzzVaultCRController/6d243eb6550ac5137a941bc17dc681a6a01c326b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d2e56476dc053a0922c3af099d1fb093f50718b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d391eb0040d9d011ed382f9ab8892697d9c5e76": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d3de9e5739b7b06d2f20c42532508a0c4c56aa3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d525efccd6081698b58616b753c29918b4e9f7d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d55b49cb7283fd597aa3b29c64e65d8031a7710": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d602dcd08215b0842403799fb952b2dff85715c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6d60f8ca5ec80bc0935e211bbb8c34575dab0bb4": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/6d93a87835f156b27e0aa83f47cf1d1b454c2e96": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/6dc37c229d09f7c57c6cb3903cdfdaecef30c82a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6de189fea0b62485891f65800c4f1692cf36966a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6e6aa3c5d6a66868fc7b96d96a8dd44fe4456080": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/6e87cb3d1c2a4a1cd839dbf7163ac6f0952c898a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6ee2b1843b23c47c1466ed4a05ae5dbde94d5a3b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6f16ec6ee6558caefd3223c8c215dffd7f1f9cf0": unmarshal: unknown encoding version: ..00..z0 Step #5: "testdata/fuzz/FuzzVaultCRController/6f2efe6dc031145ecff29a5b488bde5978c53b78": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6f64d1925da01dfd82b3511fb0ca8d3cd498ccfb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6f86ea089987dd65c3902ac98bea22978fed3693": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/6f8e520fbca7f7db191d8e1f08aab17b13bcfed2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/700f4a80afec3a5b44840ffdd2322a635965cc34": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7022b777966106cad2cbfcfa57b5c64f97310ed1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/706cafc20b4b218a06165091fe50864fa98c7946": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/70b90d2e3f0629beafeb7d9381ef01aa896946f6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/716fbe33a840e0f97321a81ccf34ff38de078302": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7177a5b215d8650ec19212335b95637145ffdb1d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/71f4e98ffd26c2233c56e165f015ed1d900789db": unmarshal: unknown encoding version: K Step #5: "testdata/fuzz/FuzzVaultCRController/7242d4ad224479a19923b85e2c47ee8d7c8f3ac4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/725e572f467ed43c7eed66d71084c0f31fc6ddd5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7265dccd8d37dd52fe04727c0eaef7b54025ec43": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/72d144eb0ffc1726b8e25d029c92107024575abd": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/72f7471cf46dec7c294ea5502c7221ad927e0ce2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/731a9356dd2f1268b95ab33d71b3de1ed6764600": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/73e050b428258d264ed1c8c8054207664be946b8": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/73edb80f0c7c37b143c3b2f0a4c17853463defae": unmarshal: unknown encoding version: xC|yY&n@ Step #5: "testdata/fuzz/FuzzVaultCRController/74049951880d7e7b152c733d82e5548bf14f287f": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7407d17119c969cca1be9b73c4d412cdecfeafaa": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/743bbcc4e4a1dc98bb98d8afe0f2222772e8bfd1": unmarshal: unknown encoding version: .y7: Step #5: "testdata/fuzz/FuzzVaultCRController/746057fcb29dfd9056ce05d6552865677090f4e4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7461e126254fa61886583209e13ec71651c8b3c7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7464bb2cf3c70f7b4477c6f0e0ff4fa2c4ae9ad5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7472f0c888756ff550897ccee8ffd618087663b7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7543128e07346cd467da42dbe52ff5df520d327e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/756ff398f477ef6f970c7b96aadc0465eedabc58": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/75f296a05d736bd344e573d9f28e867c9bce47c1": unmarshal: unknown encoding version: 1Z2� Step #5: "testdata/fuzz/FuzzVaultCRController/75f890f803099884e785928b8bb6e4455970e99c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/768ff093415bc5005c5f11bb5f73acf86e623263": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/76a04502be9f61f05db322df501ac50bd45016a3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/77072d9a3279c35fb6097f4e2191ff733dfbce1d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/77a26f65429d75f9757f72bb55414e210966b756": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/77a91d890ed64d09feba004755628795010888f7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/77d2fd965565855708300e1392a87629bfd9f171": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/77e9d9ba40349e01cce3a64aa968858765add033": unmarshal: unknown encoding version:  99999990 Step #5: "testdata/fuzz/FuzzVaultCRController/77f748b9a57eb8ba8e968097af51e102baca3af2": unmarshal: unknown encoding version: ---B--%4 Step #5: "testdata/fuzz/FuzzVaultCRController/7829e108c4ea205d21767a54458003ab1dc578f4": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/78955d1124362668d71f5f2343fc8ef6c65fb480": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/789bc9aa04444551585a4e4bb6b8567b3c476d4d": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/78f8a93f85700e40a140d3896463d5a482559e10": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7905835f6dc1121a9b79edcd15814718b91b9277": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/79b2d0c965fdda53eb4557fa339c7ab45e0251e3": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/79ce06c818361a201946970977de8ccbca76d140": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7a31576c59d1cf37f8ee90394e90ab9647d1ef23": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7ac81b041525259a5494d56d3021b3a8e6b2dc39": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7afd653c7ae60e11aa50b6f6b796d081ec4b625a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7b491074ee406b56de52d2a790d47f72614c5ce2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7bc4da7a580ba47d6cee0e0089d21ddc3dcd8bb4": unmarshal: unknown encoding version: C Step #5: "testdata/fuzz/FuzzVaultCRController/7bdb3addadaa7e01a4ed4ef4d59f8342da0f182b": unmarshal: unknown encoding version: mlJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJ.!JJJJJJJJJJ-----BEGI Step #5: "testdata/fuzz/FuzzVaultCRController/7c920e9d8478526edc4541822a0e4429031f21d2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7cd9493b069108fa9a9e515c963d1e4833d7d5de": unmarshal: unknown encoding version: 1'ZZ2222.224222222222222222222irtsfunc(*v122 Step #5: "testdata/fuzz/FuzzVaultCRController/7ce7d4167949fe3df1c872fd9434bb8209c7749f": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7cf31188cbc033a6aca4bb1fab5fd63adf09de97": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7d12148fdac18902d8aa87e405ccfc80aaea6947": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7d7a7c16b23add32eefd185a86b77ff064c75e51": unmarshal: unknown encoding version: ID33{2APICyvvv=?APICID3TU!USLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJUSLTwJUSLTUSLTwJUSLTwJUSLTwJDI5-^0w ^^w ^1w ^w ^1w ^^w ^^w ^1w ^^w ^w ^^w ^1w ^-w ^7w ^^-w ^5514aPK Step #5: "testdata/fuzz/FuzzVaultCRController/7dc0c9ddde8d2d4cc23cad2c4b65adcf45cf07f6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7dfcde1329ae3e3dd5653644f2ef1deeba8665f2": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7e03c823ad3daee07308ba83fa511940ce2cf729": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7e229c3fa0220e8254047a48dc9b00e0dd29fbcf": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7e3368d173b6d40ee01d42201d66907d7a99b93d": unmarshal: unknown encoding version: xC|yY&n@ Step #5: "testdata/fuzz/FuzzVaultCRController/7e9979be9d5aa89f515fc8e8830cec0ee2f8fcbc": unmarshal: unknown encoding version: 1'ZZ0.00000000000000000009771209953995099704 Step #5: "testdata/fuzz/FuzzVaultCRController/7ebd87ef36e634dc938bf896e7060119f4434ed9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7ec5afd9a974ce93bddb59565764aff3be7658c6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7f1ae229bc7026494618c1ae8e15d34da1c5ac3b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/7f963da2e548807ef7e55bb1ceac506338e6a7bb": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/800ae758ea27cfffc001880dac9225ffc179a5af": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/80383f0cbdcc0bb8f9dac6903ffeefaf282142c9": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/80de2d3792b6875b8c17fd418205078c25d01f16": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/80df9394b0520f3c37a61e731ae3d3e9617f6b3b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/811a2c8fa1b2aee2ff0bd1db30823bc35bf3bed4": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/81219ec11edd4cc0b533ea9eb34f350754b081d6": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/813744818db7980491adb338dfc395a4bb74cb20": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/818c080c05b94e470602344e8181b9c23e2ae257": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/81ad692c687294128239fc3110cf19dbb0636206": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/82100e01d26245373755558314b2aff1d79db7b7": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/8213e49fb9a34d6f2fe57fcb1f451933e1af3a58": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/8237380a668e5f6ffd8435f1b614808f0eaab98f": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/82558c48efb8a7949d30bb73c0ff7542a70dc6d5": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/827781565de0e90de9633c7deac7c850e5b7dacc": unmarshal: unknown encoding version: .: Step #5: "testdata/fuzz/FuzzVaultCRController/82ae9f913835f0926751f7bfdb1b54b546b14321": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/830b187a5292d223ca25de2fc4c579031976c943": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/83898e13f39717d4df1bda40baca9b0af00ad1a7": unmarshal: unknown encoding version: 4 Step #5: "testdata/fuzz/FuzzVaultCRController/83a4c1d91d7f1aa5cafa12eab62ad393629096de": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/844ba15b9e9ecd8044efe6f0904ed4a6e02fd175": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/8464a9250737c9b4f9dc0c8398bda23d37f9f74c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/848da2c34730e17a8d96e5b4c27f1bab8ace9db9": unmarshal: unknown encoding version:  Step #5: "testdata/fuzz/FuzzVaultCRController/848e263aa37eaafcd3853e5b3b5f4b727176c557": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/84a10c65a56560585e70ad97679ea34f9890c25b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/854761a6f6c8d43d4d347babeca173d36eee132c": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/855cd8a64e8cb1678ce6b403ec4205d27733a834": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/85696e3b46a397ebadcef58c86eafa3f5d56fd3b": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/857afbed8ed6c39095929be92ecce0348860c957": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/857e0e167fb1ea4b64887d08cb27c415ab40d961": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/85d0a7c05c635ae44bed4d87aba351d9d17be1aa": unmarshal: unknown encoding version: 1'ZZ080000000000001.00001620s6262625533723 Step #5: "testdata/fuzz/FuzzVaultCRController/85f3bf1ca98ca5f53576942f98f893a1bf817962": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/8613fdd697875245d0e7d3c412d9df1b136ba500": unmarshal: unknown encoding version: mlJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJJ!JJJJJJJJJJ-----BEGI J 1ӓ* 40 Step #5: "testdata/fuzz/FuzzVaultCRController/8641e6c484e59eab2b92774609abb260983918f0": unmarshal: unknown encoding version: ?,:08RR�aR�aR�aR�aR�aR�aR�aR�a#R�aRR�aR�aR�aRaRR�aR�aR�aR�aR�aR�aR�aR�aR�aR�aR�aR�aR�aRaR�aR�aR�aR�aRaR�aR�aR�NRソaR�aR�aR�aR�a*R�aR�a Step #5: "testdata/fuzz/FuzzVaultCRController/8651e215397f2fc473f62b99472bb2d7bc0a55d9": unmarshal: unknown encoding version: #vZZ3-358s6s2115s42s766s2111696815s667s63876s6504391533s73 Step #5: "testdata/fuzz/FuzzVaultCRController/866aca2f35cb268cf224a9f57d292c7643fb53b1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/866c1da7da8ee0fe00fb3984674041f3bc31aa07": unmarshal: unknown encoding version: mlt*0/JJJJJJpJJJAJJprovDeniedJJJJJJJJJJJJJJJJJJJJJll+1{JJJJJJJJJJJJJJJJJJJJJJJJIJJJJJJJ-----BE*2*@Calf360s Step #5: "testdata/fuzz/FuzzVaultCRController/86826dadde5be611ab54c8402a55f8bfddc0d2e1": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/86ab7448e7e6d87326130edf6fe3bea9d6305ac4": unmarshal: unknown encoding version: Invali[!�:/memory/classes/heap/objects:bytes~:+ [u🽿d Step #5: "testdata/fuzz/FuzzVaultCRController/86abccf95245d7cca090fb59c33e1ad641837957": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/871c280b66173cd0ae23d039b9432be16d7f720a": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/877e12b878aa0075fc7034b8e216ecedbe1121bd": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/87851c50bf7f9c9a20f69a01f4cd98ee64eeb091": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/87978efd04ac3b43dbca8b624b62c307cfad013e": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/879f68cd65f21e41ee117f6edc7638b70a557849": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/8885d4f83807ba144d0be4f551928c7320d64189": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/88d3dca555a5a4ee85deded466125b58bed03c68": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/8931ba1a68d743acc9732c1882f99af8ec616416": unmarshal: must include version and at least one value Step #5: "testdata/fuzz/FuzzVaultCRController/899f842fd5bda8537a4e82b5129a4727be55ee4d": unmarshal: unknown encoding version: ISOLNQID4294970139#[