-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for .options files to fuzzing_binary #148
Add support for .options files to fuzzing_binary #148
Conversation
1c62e46
to
0b5d326
Compare
If we expose this functionality through the |
I would like to understand a bit what design alternatives we have here. If I remember correctly, one idea behind #104 was to automatically generate the .options file for OSS-Fuzz from cc_fuzz_test() attributes. This way, developers don't need to maintain one more file with its own file format. Can we do the same here? What does the developer need to provide in an .options file for Java fuzz targets? |
For Java targets the developer will most likely never need to supply their own I believe the official guidance on length restrictions for C++ fuzz tests is to prefix them with |
Meta-comment: This week I've been away and my replies are slower. Sorry for falling behind with code reviews. |
Ah, I see. How will the ASAN options be passed in that file? I've only seen so far libFuzzer flags, but not ASAN environment options.
Yeah, I can't think of particular C++ options needed at this point (and I agree with you on the |
The |
.options files can be used to supply custom options to sanitizers. While they are rarely used for C++ fuzz targets (and thus not exposed via the cc_fuzz_test macro for now), they are necessary to run JVM fuzz targets correctly and will be used internally by the java_fuzz_test macro in a follow-up commit.
Thanks a lot for your patience with these reviews - I'm now back and will go through these as soon as possible. |
I pushed a new commit to address your comments. |
.options files can be used to supply custom options to sanitizers. While
they are rarely used for C++ fuzz targets (and thus not exposed via the
cc_fuzz_test macro for now), they are necessary to run JVM fuzz targets
correctly and will be used internally by the java_fuzz_test macro in a
follow-up commit.
This generalizes parts of #146.