On 1/10/22 16:18, Aaron Conole wrote: > Ilya Maximets <[email protected]> writes: > >> tests/oss-fuzz/flow_extract_target.c:59:53: >> error: too few arguments to function call, expected 4, have 1 >> uint16_t tcp_flags = parse_tcp_flags(&packet); >> ~~~~~~~~~~~~~~~ ^ >> >> Fixes: e7e9973b80d3 ("dpif-netdev: Forwarding optimization for flows with a >> simple match.") >> Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43498 >> Signed-off-by: Ilya Maximets <[email protected]> >> --- > > Acked-by: Aaron Conole <[email protected]> > > I'm trying to follow the oss-fuzz guide but can't seem to get a clean > compile on my system. It appears that the documentation is incomplete > for simply following out of the box (for example, it really does assume > that clang and the llvm test suite infrastructure are all installed). > I'm digging in a bit deeper. It would be nice if we had a github > actions target that did this testing for us - I'll add it to the back > log. >
They do a lot of custom things for their build, so it's hard to build these targets manually. The following sequence works for me: git clone https://github.com/google/oss-fuzz.git cd oss-fuzz python infra/helper.py build_image openvswitch python infra/helper.py build_fuzzers --sanitizer address --engine afl \ --architecture x86_64 openvswitch Best regards, Ilya Maximets. _______________________________________________ dev mailing list [email protected] https://mail.openvswitch.org/mailman/listinfo/ovs-dev
