ci: remove inputs invalidated by #22050 removing tor v2 support #63

pull jonatack wants to merge 1 commits into bitcoin-core:main from jonatack:rm-inputs-invalidated-by-torv2-removal changing 2142 files +0 −289
  1. jonatack commented at 2:45 PM on June 5, 2021: none

    See https://github.com/bitcoin/bitcoin/pull/22050/commits/eba9a94b9f56be2fda623e77f19b960425ea1eb5

    previous name:

    netaddr_deserialize
    service_deserialize
    sub_net_deserialize
    

    renamed to:

    net_address_deserialize
    net_service_deserialize
    subnet_deserialize
    
  2. ci: rm inputs invalidated by #22050 removing tor v2 support ec271cac68
  3. jonatack commented at 2:53 PM on June 5, 2021: none

    Hm, I'm not sure this is needed / don't think it is. Feel free to close if that is the case.

  4. maflcko commented at 7:00 PM on June 5, 2021: contributor

    Would there be a downside of renaming the fuzz targets back to the original name?

    I think you might have been motivated by #62 to rename the target. That one changed the whole format, so fuzz inputs might only work "by accident" for the new target.

    However, I think the target shouldn't be renamed when the format largely stays the same (as it is here) and only some inputs are "invalidated" (probably meaning "do not increase coverage meaningfully"). In fact we see fuzz input "invalidation" almost daily. Pretty much every code change that touches code that is covered by existing inputs may "invalidate" some inputs. Here, ipv4 (and ipv6 etc...) inputs are not invalidated AFAICT.

    Also, a risk with deleting inputs is that "actual seeds" (patterns or whole inputs that have been injected manually without running a fuzz engine) will get deleted as well. Modern fuzz engines might pick up inputs that are considered "invalid" and evolve them into useful ones.

    I don't think anyone did add any manual seeds for #62 or this fuzz targets in this pull, so I think deleting them is fine. Though, we should understand that this is not a general best practise and comes with risks and downsides.

    <!-- Interestingly, fuzz inputs are also surprisingly resistant against minor format changes. I presume that settings like `-use_value_profile=1` blow up the input corpus and thus evolve several inputs that exercise the same lines of code. Then

  5. maflcko commented at 7:01 PM on June 5, 2021: contributor

    I think what #62 should have done is move the inputs, not remove them. Deletion will already happen automatically whenever delete_nonreduced_fuzz_inputs is run.

  6. jonatack commented at 1:23 PM on June 6, 2021: none

    Thanks for the helpful replies!

    Would there be a downside of renaming the fuzz targets back to the original name?

    Renaming the targets back to the original names seems to work for me locally. Let's see what the CI thinks. I had a post-merge Span fixup and an RPC fixup that can be done at the same time.

  7. jonatack commented at 3:20 PM on June 6, 2021: none

    Yay, CI passed so closing here.

  8. jonatack closed this on Jun 6, 2021

  9. jonatack deleted the branch on Jun 6, 2021
  10. fanquake referenced this in commit 1cc123f405 on Jun 7, 2021
  11. sidhujag referenced this in commit 8739d50db8 on Jun 9, 2021
Contributors

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin-core/qa-assets. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2026-04-16 23:25 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me