Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(440)

Unified Diff: testing/libfuzzer/efficient_fuzzer.md

Issue 1896123002: [libfuzzer] Update documentation on UBSan options and Upload Corpus section. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Move instructions for corpus uploading into efficient_fuzzer. Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « testing/libfuzzer/clusterfuzz.md ('k') | testing/libfuzzer/getting_started.md » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: testing/libfuzzer/efficient_fuzzer.md
diff --git a/testing/libfuzzer/efficient_fuzzer.md b/testing/libfuzzer/efficient_fuzzer.md
index 7ea08d3c121ffb2a4cef9430eedde261df5975f2..cad61311d59ddaf7bf71db7ca3fbf44a40f73626 100644
--- a/testing/libfuzzer/efficient_fuzzer.md
+++ b/testing/libfuzzer/efficient_fuzzer.md
@@ -119,11 +119,40 @@ items it finds in the directory. You can help the fuzzer by "seeding" the corpus
simply copy interesting inputs for your function to the corpus directory before
running. This works especially well for strictly defined file formats or data
transmission protocols.
+
* For file-parsing functionality just use some valid files from your test suite.
+
* For protocol processing targets put raw streams from test suite into separate
files.
-After discovering new and interesting items, [upload corpus to ClusterFuzz].
+
+ClusterFuzz uses seed corpus stored in Chromium repository. You need to add
+`seed_corpus` attribute to fuzzer target:
+
+```
+fuzzer_test("my_protocol_fuzzer") {
+ ...
+ seed_corpus = "src/fuzz/testcases"
+ ...
+}
+```
+
+If you don't want to store seed corpus in Chromium repository, you can upload
+corpus to Google Cloud Storage bucket used by ClusterFuzz:
+
+
+1) go to [Corpus GCS Bucket]
+
+2) open directory named `%YOUR_FUZZER_NAME%_static`
+
+3) upload corpus files into the directory
+
+
+Alternative way is to use `gsutil` tool:
+```bash
+gsutil -m rsync <corpus_dir_on_disk> gs://clusterfuzz-corpus/libfuzzer/%YOUR_FUZZER_NAME%_static
+```
+
### Fuzzer Dictionary
@@ -190,6 +219,6 @@ Please note that `dict` parameter should be provided [separately](#Fuzzer-Dictio
Other options may be passed through `libfuzzer_options` property.
-[ClusterFuzz status]: ./clusterfuzz.md#Status-Links
-[upload corpus to ClusterFuzz]: ./clusterfuzz.md#Upload-Corpus
[AFL]: http://lcamtuf.coredump.cx/afl/
+[ClusterFuzz status]: clusterfuzz.md#Status-Links
+[Corpus GCS Bucket]: https://goto.google.com/libfuzzer-clusterfuzz-corpus
« no previous file with comments | « testing/libfuzzer/clusterfuzz.md ('k') | testing/libfuzzer/getting_started.md » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698