-
Notifications
You must be signed in to change notification settings - Fork 2.4k
cifuzzer: provide fuzzing_engine
parameter
#13351
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
I think the goal of CIFuzz isn't to be CI for OSS-Fuzz but to find bugs in the projects before merging code. So I think this is out of scope and against the goal of simplicity I had for CIFuzz. I can merge this if it's important enough to you but it won't be supported. |
My point is that i've spent a number of hours trying to placate the existing CIFuzz builds to pass |
ef93cca
to
581a884
Compare
It is mildly bad that it is currently impossible to actually CI all of the builds the oss-fuzz proper will perform, since only the libfuzzer engine can be "configured". This makes the engine configurable. At least the building works, i'm not sure about the rest. There are most likely things missing here. I'm also not sure how coverage/introspector builds should be handledm what should their engine be? Refs. google#13346
Ok, this is close to done i think.
I am mostly interested in just checking that it builds fine, Looks like there is some preexisting brokenness with detecting the changed fuzz targets
Why did it pick that commit? It is the original commit It should diff against the |
fuzzing_engine
parameterfuzzing_engine
parameter
I'm actually confused by the purpose of |
Where is that? |
I recommend only doing builds for these other fuzzers or configs. I'm pretty sure we do the basic smoke test in that step anyway. The smoketest is meant to support all of the fuzzers not just libfuzzer. |
I'm not sure. I don't have the time to look into this though. Feel free to send a PR to disable change detection in this case (I think that might be the fallback behavior anyway). |
Sure, I want to help make my users' lives easier. But I frankly think OSS-Fuzz has a little bit too many build configs to support in CIFuzz and even for projects (I have some ideas for paring this down in the future). |
@jonathanmetzman thank you for taking a look!
Sure, should that be enforced in the
I'm not sure how to detect that situation, and i don't particularly care about it, i'm just posting my observation.
I mainly just think that being unable to ensure that oss-fuzz builds don't go red via the project's CI is a rather bad UX. |
Here's an example job with
https://github.com/LebedevRI/rawspeed/actions/runs/15180497856/job/42688808194#step:4:2302 |
Could you use libfuzzer? It's more realistic. I don't think we do coverage reports for engine: no |
That was my solution, yes. Again, i'm just pointing out my observations in case that is something not known, |
Is this something oss-fuzz wans to support?
It is mildly bad that it is currently impossible
to actually CI all of the builds the oss-fuzz proper will perform, since only the libfuzzer engine can be "configured".
This makes the engine configurable.
At least the building works, i'm not sure about the rest.
There are most likely things missing here.
I'm also not sure how coverage/introspector builds should be handledm what should their engine be?
Refs. #13346