From f59fd057a937e451c975be5ebfbf5feb27804bd3 Mon Sep 17 00:00:00 2001 From: Kostya Serebryany Date: Mon, 21 Nov 2016 13:43:12 -0800 Subject: [PATCH] Update building_running_fuzzers.md --- docs/building_running_fuzzers.md | 39 +------------------------------- 1 file changed, 1 insertion(+), 38 deletions(-) diff --git a/docs/building_running_fuzzers.md b/docs/building_running_fuzzers.md index a136c020c..ac361fc6d 100644 --- a/docs/building_running_fuzzers.md +++ b/docs/building_running_fuzzers.md @@ -1,38 +1 @@ -# Building and Running Fuzzers - -_This page documents building and running fuzzers as part of OSS target source tree._ -_See [External Fuzzer](building_running_fuzzers_external.md) process for oss-fuzz fuzzers._ - -## Prerequisites - -[Install Docker]. The toolchain setup necessary to build coverage-guided fuzzers is complicated. Docker is used -to simplify distribution of the toolchain and to produce repeatable results for distributed execution. - -## Building Fuzzers - -Building fuzzer is a two-step process: - -1. Building a container ready to compile fuzzers: -
-    # in target directory
-    docker build -t ossfuzz/$target_name .
-    
-2. Build fuzzers: -
-    # in target directory
-docker run -ti -v /tmp/out:/out ossfuzz/$target_name
-    
- -`/tmp/out` will contain fuzzers. - -## Running Fuzzers - -Fuzzers are statically linked executables and could be executed normally in Unbuntu-like environment. -When Ubuntu environment is not available (or a restricted environment is desirable), the fuzzer can easily be run inside docker -container: - -
-docker run -ti -v /tmp/out:/out -t ossfuzz/libfuzzer-runner /out/$fuzzer --runs=100
-
- -[Install Docker]: https://docs.docker.com/engine/installation/ +# This page is deprecated, see the home page at https://github.com/google/oss-fuzz