-
Notifications
You must be signed in to change notification settings - Fork 566
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tracking issue: support go-fuzz #860
Comments
Related PRs:
|
Hey @dvyukov, when you get a chance, could you please tell us more about the advantages the native |
A relevant discussion about code coverage for Go is happening in https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16549#c2 |
I can think of 2 things (besides the fact that obviously everybody thinks that his fuzzing engine is the best one :)):
|
we currently do not distinguish startup crash vs corpus crash for Go fuzz targets in the stats |
This is done. |
We were thinking about this for a while, now started to make some progress.
There are two modes of go-fuzz:
"native" mode (i.e. using
go-fuzz
): https://github.com/dvyukov/go-fuzzlibFuzzer-compatible mode: https://github.com/dvyukov/go-fuzz#libfuzzer-support -- requires certain build actions, but the resulting binary has libFuzzer interface
Part 2) is easier to integrate, as we can rely on the existing libFuzzer fuzzing engine integration. That's what we start from.
The text was updated successfully, but these errors were encountered: