# Reproducing oss-fuzz issues You've been CC'ed on an oss-fuzz issue, now what? Before attempting a fix you should be able to reliably reproduce an issue. The process is much simpler if you have Docker installed ([how?](installing_docker.md), [why?](faq.md#why-do-you-use-docker)), but is entirely possible to do without. ## Docker If you have docker installed, follow these steps: - *Download testcase.* Each issue has a minimized testcase link. Download the testcase to a file. - *Reproduce from nightly sources:*
docker run --rm -v $testcase_file:/testcase -t ossfuzz/$target reproduce $fuzzer
   
It builds the fuzzer from nightly sources (in the image) and runs it with testcase input. E.g. for libxml2 it will be:
docker run --rm -ti -v ~/Downloads/testcase:/testcase ossfuzz/libxml2 reproduce libxml2_xml_read_memory_fuzzer
   
- *Reproduce from local sources:*
docker run --rm  -v $target_checkout_dir:/src/$target \
                     -v $reproducer_file:/testcase -t ossfuzz/$target reproduce $fuzzer
    
This is essentially the previous command that additonally mounts local sources into the running container. - *Fix the issue.* Use the previous command to verify you fixed the issue locally. Consult the [debugging](debugging.md) document for your debugging needs. - *Submit the fix.* ClusterFuzz will automatically pick up the changes, recheck the testcase and will close the issue. ## Manual Manual process is fully documented on main [libFuzzer page](http://llvm.org/docs/LibFuzzer.html). To manully reproduce the issue you have to: - fetch the toolchain: http://llvm.org/docs/LibFuzzer.html#versions - build the target with toolchain and sanitizer: http://llvm.org/docs/LibFuzzer.html#building - build the fuzzer from target-related code in [targets/](../targets/) - run the fuzzer on downloaded testcase - develop a fix and submit it upstream ClusterFuzz will automatically pick up the changes, recheck the testcase and will close the issue.