-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support specifying runtime fuzzing options in the fuzz target rule. #103
Comments
It seems like |
Apologies for the delay! This feature is currently deprioritized, because the consensus in our discussions with OSS-Fuzz is that the file should actually not be needed for the vast majority of purposes. Can you share more info about your use case? I'm happy to reconsider the prioritization if there is functionality that can't be achieved without an options file. |
I was looking for a way to set the maximum input length. Seems minor now that I changed the code to |
Ah, for that particular use case OSS-Fuzz actually recommends using the approach you just mentioned: https://google.github.io/oss-fuzz/getting-started/new-project-guide/#input-size I believe this should not affect much the performance of the fuzzing engine - IIRC, libFuzzer will also not end up generating large inputs unless it observes they bring a coverage increase. With an early return statement like this one, it should not generate large inputs at all. Do you happen to run on a seed corpus of large files? That might explain why the fuzzer attempts to generate large inputs. |
The initial set of options should include the maximum input length. That seems to be referenced in a number of fuzz targets in GRPC, for example.
The text was updated successfully, but these errors were encountered: