mirror of https://github.com/google/oss-fuzz.git
40 lines
1.5 KiB
Markdown
40 lines
1.5 KiB
Markdown
# Fuzzer environment on ClusterFuzz
|
|
|
|
Your fuzz targets will be run on a [Google Compute Engine](https://cloud.google.com/compute/) VM (Linux) with some security restrictions.
|
|
|
|
## Dependencies
|
|
|
|
You should not make any assumptions on the availability of dependent packages
|
|
and libraries in the execution environment. Make sure to statically link any
|
|
library dependencies with your fuzz target executable during build time
|
|
([example](https://github.com/google/oss-fuzz/blob/master/projects/tor/build.sh#L40)).
|
|
All build artifacts needed during fuzz target execution should be inside `$OUT`
|
|
directory. Other directories like `$WORK`, `$SRC` OR dependent packages installed
|
|
in build.sh will not be available.
|
|
|
|
You can ensure that the fuzz target works correctly by using `run_fuzzer` command
|
|
(see instructions [here](new_project_guide.md#testing-locally)). This command uses
|
|
a clean base-runner docker container and not the base-builder docker container
|
|
created during build-time.
|
|
|
|
## argv[0]
|
|
|
|
You must not modify argv[0]. It is required for certain things to work correctly.
|
|
|
|
## Current working directory
|
|
|
|
You should not make any assumptions about the current working directory of your
|
|
fuzz target. If you need to load data files, please use `argv[0]` to get the
|
|
directory where your fuzz target executable is located.
|
|
|
|
## File system
|
|
|
|
Everything except `/tmp` is read-only, including the directory that your fuzz target
|
|
executable lives in.
|
|
|
|
`/dev` is also unavailable.
|
|
|
|
## Network access
|
|
|
|
There will be no network interfaces available (not even loopback).
|