george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 1 | //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===// |
| 2 | // |
chandlerc | 4028449 | 2019-01-19 08:50:56 +0000 | [diff] [blame] | 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // Flags. FUZZER_FLAG_INT/FUZZER_FLAG_STRING macros should be defined at the |
| 9 | // point of inclusion. We are not using any flag parsing library for better |
| 10 | // portability and independence. |
| 11 | //===----------------------------------------------------------------------===// |
| 12 | FUZZER_FLAG_INT(verbosity, 1, "Verbosity level.") |
| 13 | FUZZER_FLAG_UNSIGNED(seed, 0, "Random seed. If 0, seed is generated.") |
| 14 | FUZZER_FLAG_INT(runs, -1, |
| 15 | "Number of individual test runs (-1 for infinite runs).") |
| 16 | FUZZER_FLAG_INT(max_len, 0, "Maximum length of the test input. " |
| 17 | "If 0, libFuzzer tries to guess a good value based on the corpus " |
| 18 | "and reports it. ") |
kcc | 9aedd38 | 2018-12-14 23:21:31 +0000 | [diff] [blame] | 19 | FUZZER_FLAG_INT(len_control, 100, "Try generating small inputs first, " |
morehouse | 8c42ada | 2018-02-13 20:52:15 +0000 | [diff] [blame] | 20 | "then try larger inputs over time. Specifies the rate at which the length " |
| 21 | "limit is increased (smaller == faster). If 0, immediately try inputs with " |
| 22 | "size up to max_len.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 23 | FUZZER_FLAG_INT(cross_over, 1, "If 1, cross over inputs.") |
| 24 | FUZZER_FLAG_INT(mutate_depth, 5, |
| 25 | "Apply this number of consecutive mutations to each input.") |
kcc | b6836be | 2017-12-01 19:18:38 +0000 | [diff] [blame] | 26 | FUZZER_FLAG_INT(reduce_depth, 0, "Experimental/internal. " |
| 27 | "Reduce depth if mutations lose unique features") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 28 | FUZZER_FLAG_INT(shuffle, 1, "Shuffle inputs at startup") |
| 29 | FUZZER_FLAG_INT(prefer_small, 1, |
| 30 | "If 1, always prefer smaller inputs during the corpus shuffle.") |
| 31 | FUZZER_FLAG_INT( |
| 32 | timeout, 1200, |
| 33 | "Timeout in seconds (if positive). " |
| 34 | "If one unit runs more than this number of seconds the process will abort.") |
| 35 | FUZZER_FLAG_INT(error_exitcode, 77, "When libFuzzer itself reports a bug " |
| 36 | "this exit code will be used.") |
| 37 | FUZZER_FLAG_INT(timeout_exitcode, 77, "When libFuzzer reports a timeout " |
| 38 | "this exit code will be used.") |
| 39 | FUZZER_FLAG_INT(max_total_time, 0, "If positive, indicates the maximal total " |
| 40 | "time in seconds to run the fuzzer.") |
| 41 | FUZZER_FLAG_INT(help, 0, "Print help.") |
| 42 | FUZZER_FLAG_INT(merge, 0, "If 1, the 2-nd, 3-rd, etc corpora will be " |
| 43 | "merged into the 1-st corpus. Only interesting units will be taken. " |
| 44 | "This flag can be used to minimize a corpus.") |
kcc | c51afd7 | 2017-11-09 01:05:29 +0000 | [diff] [blame] | 45 | FUZZER_FLAG_STRING(merge_inner, "internal flag") |
| 46 | FUZZER_FLAG_STRING(merge_control_file, |
sylvestre | a9eb857 | 2018-03-13 14:35:10 +0000 | [diff] [blame] | 47 | "Specify a control file used for the merge process. " |
kcc | 99a71a1 | 2017-11-09 05:49:28 +0000 | [diff] [blame] | 48 | "If a merge process gets killed it tries to leave this file " |
| 49 | "in a state suitable for resuming the merge. " |
kcc | c51afd7 | 2017-11-09 01:05:29 +0000 | [diff] [blame] | 50 | "By default a temporary file will be used.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 51 | FUZZER_FLAG_STRING(save_coverage_summary, "Experimental:" |
| 52 | " save coverage summary to a given file." |
| 53 | " Used with -merge=1") |
| 54 | FUZZER_FLAG_STRING(load_coverage_summary, "Experimental:" |
| 55 | " load coverage summary from a given file." |
| 56 | " Treat this coverage as belonging to the first corpus. " |
| 57 | " Used with -merge=1") |
| 58 | FUZZER_FLAG_INT(minimize_crash, 0, "If 1, minimizes the provided" |
| 59 | " crash input. Use with -runs=N or -max_total_time=N to limit " |
| 60 | "the number attempts." |
| 61 | " Use with -exact_artifact_path to specify the output." |
| 62 | " Combine with ASAN_OPTIONS=dedup_token_length=3 (or similar) to ensure that" |
| 63 | " the minimized input triggers the same crash." |
| 64 | ) |
| 65 | FUZZER_FLAG_INT(cleanse_crash, 0, "If 1, tries to cleanse the provided" |
| 66 | " crash input to make it contain fewer original bytes." |
| 67 | " Use with -exact_artifact_path to specify the output." |
| 68 | ) |
| 69 | FUZZER_FLAG_INT(minimize_crash_internal_step, 0, "internal flag") |
| 70 | FUZZER_FLAG_INT(use_counters, 1, "Use coverage counters") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 71 | FUZZER_FLAG_INT(use_memmem, 1, |
| 72 | "Use hints from intercepting memmem, strstr, etc") |
| 73 | FUZZER_FLAG_INT(use_value_profile, 0, |
| 74 | "Experimental. Use value profile to guide fuzzing.") |
| 75 | FUZZER_FLAG_INT(use_cmp, 1, "Use CMP traces to guide mutations") |
| 76 | FUZZER_FLAG_INT(shrink, 0, "Experimental. Try to shrink corpus inputs.") |
| 77 | FUZZER_FLAG_INT(reduce_inputs, 1, |
| 78 | "Try to reduce the size of inputs while preserving their full feature sets") |
| 79 | FUZZER_FLAG_UNSIGNED(jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn" |
| 80 | " this number of jobs in separate worker processes" |
| 81 | " with stdout/stderr redirected to fuzz-JOB.log.") |
| 82 | FUZZER_FLAG_UNSIGNED(workers, 0, |
| 83 | "Number of simultaneous worker processes to run the jobs." |
| 84 | " If zero, \"min(jobs,NumberOfCpuCores()/2)\" is used.") |
| 85 | FUZZER_FLAG_INT(reload, 1, |
| 86 | "Reload the main corpus every <N> seconds to get new units" |
| 87 | " discovered by other processes. If 0, disabled") |
| 88 | FUZZER_FLAG_INT(report_slow_units, 10, |
| 89 | "Report slowest units if they run for more than this number of seconds.") |
| 90 | FUZZER_FLAG_INT(only_ascii, 0, |
| 91 | "If 1, generate only ASCII (isprint+isspace) inputs.") |
| 92 | FUZZER_FLAG_STRING(dict, "Experimental. Use the dictionary file.") |
| 93 | FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, " |
| 94 | "timeout, or slow inputs) as " |
| 95 | "$(artifact_prefix)file") |
| 96 | FUZZER_FLAG_STRING(exact_artifact_path, |
| 97 | "Write the single artifact on failure (crash, timeout) " |
| 98 | "as $(exact_artifact_path). This overrides -artifact_prefix " |
| 99 | "and will not use checksum in the file name. Do not " |
| 100 | "use the same path for several parallel processes.") |
| 101 | FUZZER_FLAG_INT(print_pcs, 0, "If 1, print out newly covered PCs.") |
kcc | ec9da66 | 2017-08-28 22:52:22 +0000 | [diff] [blame] | 102 | FUZZER_FLAG_INT(print_funcs, 2, "If >=1, print out at most this number of " |
| 103 | "newly covered functions.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 104 | FUZZER_FLAG_INT(print_final_stats, 0, "If 1, print statistics at exit.") |
| 105 | FUZZER_FLAG_INT(print_corpus_stats, 0, |
| 106 | "If 1, print statistics on corpus elements at exit.") |
| 107 | FUZZER_FLAG_INT(print_coverage, 0, "If 1, print coverage information as text" |
| 108 | " at exit.") |
kcc | 569b3fa | 2019-01-29 23:53:28 +0000 | [diff] [blame] | 109 | FUZZER_FLAG_INT(dump_coverage, 0, "Deprecated.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 110 | FUZZER_FLAG_INT(handle_segv, 1, "If 1, try to intercept SIGSEGV.") |
| 111 | FUZZER_FLAG_INT(handle_bus, 1, "If 1, try to intercept SIGBUS.") |
| 112 | FUZZER_FLAG_INT(handle_abrt, 1, "If 1, try to intercept SIGABRT.") |
| 113 | FUZZER_FLAG_INT(handle_ill, 1, "If 1, try to intercept SIGILL.") |
| 114 | FUZZER_FLAG_INT(handle_fpe, 1, "If 1, try to intercept SIGFPE.") |
| 115 | FUZZER_FLAG_INT(handle_int, 1, "If 1, try to intercept SIGINT.") |
| 116 | FUZZER_FLAG_INT(handle_term, 1, "If 1, try to intercept SIGTERM.") |
| 117 | FUZZER_FLAG_INT(handle_xfsz, 1, "If 1, try to intercept SIGXFSZ.") |
kcc | 1239a99 | 2017-11-09 20:30:19 +0000 | [diff] [blame] | 118 | FUZZER_FLAG_INT(handle_usr1, 1, "If 1, try to intercept SIGUSR1.") |
| 119 | FUZZER_FLAG_INT(handle_usr2, 1, "If 1, try to intercept SIGUSR2.") |
kcc | da16893 | 2019-01-31 00:09:43 +0000 | [diff] [blame] | 120 | FUZZER_FLAG_INT(lazy_counters, 0, "If 1, a performance optimization is" |
| 121 | "enabled for the 8bit inline counters. " |
| 122 | "Requires that libFuzzer successfully installs its SEGV handler") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 123 | FUZZER_FLAG_INT(close_fd_mask, 0, "If 1, close stdout at startup; " |
| 124 | "if 2, close stderr; if 3, close both. " |
kcc | b6836be | 2017-12-01 19:18:38 +0000 | [diff] [blame] | 125 | "Be careful, this will also close e.g. stderr of asan.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 126 | FUZZER_FLAG_INT(detect_leaks, 1, "If 1, and if LeakSanitizer is enabled " |
| 127 | "try to detect memory leaks during fuzzing (i.e. not only at shut down).") |
alekseyshl | d995b55 | 2017-10-23 22:04:30 +0000 | [diff] [blame] | 128 | FUZZER_FLAG_INT(purge_allocator_interval, 1, "Purge allocator caches and " |
| 129 | "quarantines every <N> seconds. When rss_limit_mb is specified (>0), " |
| 130 | "purging starts when RSS exceeds 50% of rss_limit_mb. Pass " |
| 131 | "purge_allocator_interval=-1 to disable this functionality.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 132 | FUZZER_FLAG_INT(trace_malloc, 0, "If >= 1 will print all mallocs/frees. " |
| 133 | "If >= 2 will also print stack traces.") |
| 134 | FUZZER_FLAG_INT(rss_limit_mb, 2048, "If non-zero, the fuzzer will exit upon" |
| 135 | "reaching this limit of RSS memory usage.") |
kcc | 120e40b | 2017-12-01 22:12:04 +0000 | [diff] [blame] | 136 | FUZZER_FLAG_INT(malloc_limit_mb, 0, "If non-zero, the fuzzer will exit " |
| 137 | "if the target tries to allocate this number of Mb with one malloc call. " |
| 138 | "If zero (default) same limit as rss_limit_mb is applied.") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 139 | FUZZER_FLAG_STRING(exit_on_src_pos, "Exit if a newly found PC originates" |
| 140 | " from the given source location. Example: -exit_on_src_pos=foo.cc:123. " |
| 141 | "Used primarily for testing libFuzzer itself.") |
| 142 | FUZZER_FLAG_STRING(exit_on_item, "Exit if an item with a given sha1 sum" |
| 143 | " was added to the corpus. " |
| 144 | "Used primarily for testing libFuzzer itself.") |
| 145 | FUZZER_FLAG_INT(ignore_remaining_args, 0, "If 1, ignore all arguments passed " |
| 146 | "after this one. Useful for fuzzers that need to do their own " |
| 147 | "argument parsing.") |
kcc | 3acbe07 | 2018-05-16 23:26:37 +0000 | [diff] [blame] | 148 | FUZZER_FLAG_STRING(focus_function, "Experimental. " |
| 149 | "Fuzzing will focus on inputs that trigger calls to this function") |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 150 | |
george.karpenkov | 29efa6d | 2017-08-21 23:25:50 +0000 | [diff] [blame] | 151 | FUZZER_FLAG_INT(analyze_dict, 0, "Experimental") |
kcc | 6991e96 | 2018-05-10 20:12:15 +0000 | [diff] [blame] | 152 | FUZZER_DEPRECATED_FLAG(use_clang_coverage) |
kcc | 86e4388 | 2018-06-06 01:23:29 +0000 | [diff] [blame] | 153 | FUZZER_FLAG_STRING(data_flow_trace, "Experimental: use the data flow trace") |