On 1/10/22 16:18, Aaron Conole wrote:
> Ilya Maximets <[email protected]> writes:
> 
>>   tests/oss-fuzz/flow_extract_target.c:59:53:
>>      error: too few arguments to function call, expected 4, have 1
>>          uint16_t tcp_flags = parse_tcp_flags(&packet);
>>                               ~~~~~~~~~~~~~~~        ^
>>
>> Fixes: e7e9973b80d3 ("dpif-netdev: Forwarding optimization for flows with a 
>> simple match.")
>> Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43498
>> Signed-off-by: Ilya Maximets <[email protected]>
>> ---
> 
> Acked-by: Aaron Conole <[email protected]>
> 
> I'm trying to follow the oss-fuzz guide but can't seem to get a clean
> compile on my system.  It appears that the documentation is incomplete
> for simply following out of the box (for example, it really does assume
> that clang and the llvm test suite infrastructure are all installed).
> I'm digging in a bit deeper.  It would be nice if we had a github
> actions target that did this testing for us - I'll add it to the back
> log.
> 

They do a lot of custom things for their build, so it's hard to build
these targets manually.  The following sequence works for me:

git clone https://github.com/google/oss-fuzz.git
cd oss-fuzz
python infra/helper.py build_image openvswitch
python infra/helper.py build_fuzzers --sanitizer address --engine afl \
                                     --architecture x86_64 openvswitch

Best regards, Ilya Maximets.
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to