@@ -17,32 +17,9 @@ all you is to run
17
17
Depending on the nature of the bug, the fuzz target binary needs to be built with the appropriate sanitizer
18
18
(e.g. if this is a buffer overflow, with [ AddressSanitizer] ( http://clang.llvm.org/docs/AddressSanitizer.html ) ).
19
19
20
- ** TODO**
21
-
22
- Another option is to use the Docker commands (** TODO: link** ) to replicate the exact build steps
23
- used by OSS-Fuzz and then feed the reproducer input to the target.
24
-
25
- ## ** TODO careate separate file with all docker commands**
26
- ([ how?] ( installing_docker.md ) , [ why?] ( faq.md#why-do-you-use-docker ) ), but
27
- is entirely possible to do without.
28
-
29
-
30
- Click the testcase download link to download the testcase (you may need to
31
- login, using the same Google account that you've been CC'ed with). The "Detailed
32
- report" link provides the full stack trace, as well as some additional details
33
- that may be useful.
34
-
35
- For the following instructions, ` $target ` is the text after ` Target: ` in the
36
- report, and ` $fuzzer ` is the text after ` Fuzzer binary: ` . ` $testcase_file ` is
37
- the path to the testcase you just downloaded.
38
-
39
- Note that for older reports, ` Fuzzer binary: ` and ` Target: ` may not exist. In
40
- this case, please extract this information from the ` Fuzzer: ` field. This is
41
- usually in the format ` libFuzzer_$target_$fuzzer ` .
42
-
43
- ## Docker
44
-
45
- If you have docker installed, follow these steps:
20
+ If you are not sure how to build fuzzers within the target, you may also use
21
+ Docker (([ how?] ( installing_docker.md ) , [ why?] ( faq.md#why-do-you-use-docker ) )) commands
22
+ to replicate the exact build steps used by OSS-Fuzz and then feed the reproducer input to the target.
46
23
47
24
- * Reproduce from nightly sources:*
48
25
0 commit comments