blob: a11cfe4405f314556e3357ad3f0cf41edf6f7b24 [file] [log] [blame]
george.karpenkov29efa6d2017-08-21 23:25:50 +00001//===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
2//
chandlerc40284492019-01-19 08:50:56 +00003// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
george.karpenkov29efa6d2017-08-21 23:25:50 +00006//
7//===----------------------------------------------------------------------===//
8// Flags. FUZZER_FLAG_INT/FUZZER_FLAG_STRING macros should be defined at the
9// point of inclusion. We are not using any flag parsing library for better
10// portability and independence.
11//===----------------------------------------------------------------------===//
12FUZZER_FLAG_INT(verbosity, 1, "Verbosity level.")
13FUZZER_FLAG_UNSIGNED(seed, 0, "Random seed. If 0, seed is generated.")
14FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
16FUZZER_FLAG_INT(max_len, 0, "Maximum length of the test input. "
17 "If 0, libFuzzer tries to guess a good value based on the corpus "
18 "and reports it. ")
kcc9aedd382018-12-14 23:21:31 +000019FUZZER_FLAG_INT(len_control, 100, "Try generating small inputs first, "
morehouse8c42ada2018-02-13 20:52:15 +000020 "then try larger inputs over time. Specifies the rate at which the length "
21 "limit is increased (smaller == faster). If 0, immediately try inputs with "
dor1se7579d62019-06-14 19:34:11 +000022 "size up to max_len. Default value is 0, if LLVMFuzzerCustomMutator is used.")
kcc0c34c832019-02-08 01:20:54 +000023FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
metzmane9b95bc2019-04-30 20:56:18 +000024 "to use as an additional seed corpus. Alternatively, an \"@\" followed by "
25 "the name of a file containing the comma-seperated list.")
george.karpenkov29efa6d2017-08-21 23:25:50 +000026FUZZER_FLAG_INT(cross_over, 1, "If 1, cross over inputs.")
27FUZZER_FLAG_INT(mutate_depth, 5,
28 "Apply this number of consecutive mutations to each input.")
kccb6836be2017-12-01 19:18:38 +000029FUZZER_FLAG_INT(reduce_depth, 0, "Experimental/internal. "
30 "Reduce depth if mutations lose unique features")
george.karpenkov29efa6d2017-08-21 23:25:50 +000031FUZZER_FLAG_INT(shuffle, 1, "Shuffle inputs at startup")
32FUZZER_FLAG_INT(prefer_small, 1,
33 "If 1, always prefer smaller inputs during the corpus shuffle.")
34FUZZER_FLAG_INT(
35 timeout, 1200,
36 "Timeout in seconds (if positive). "
37 "If one unit runs more than this number of seconds the process will abort.")
38FUZZER_FLAG_INT(error_exitcode, 77, "When libFuzzer itself reports a bug "
39 "this exit code will be used.")
kcc243006d2019-02-12 00:12:33 +000040FUZZER_FLAG_INT(timeout_exitcode, 70, "When libFuzzer reports a timeout "
george.karpenkov29efa6d2017-08-21 23:25:50 +000041 "this exit code will be used.")
42FUZZER_FLAG_INT(max_total_time, 0, "If positive, indicates the maximal total "
43 "time in seconds to run the fuzzer.")
44FUZZER_FLAG_INT(help, 0, "Print help.")
kcca3815862019-02-08 21:27:23 +000045FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens "
46 "in a subprocess")
kcca7b741c2019-02-12 02:18:53 +000047FUZZER_FLAG_INT(ignore_timeouts, 1, "Ignore timeouts in fork mode")
48FUZZER_FLAG_INT(ignore_ooms, 1, "Ignore OOMs in fork mode")
kcc55e54ed2019-02-15 21:51:15 +000049FUZZER_FLAG_INT(ignore_crashes, 0, "Ignore crashes in fork mode")
george.karpenkov29efa6d2017-08-21 23:25:50 +000050FUZZER_FLAG_INT(merge, 0, "If 1, the 2-nd, 3-rd, etc corpora will be "
51 "merged into the 1-st corpus. Only interesting units will be taken. "
52 "This flag can be used to minimize a corpus.")
kcc1ee7f412019-06-14 22:56:50 +000053FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists")
kccc51afd72017-11-09 01:05:29 +000054FUZZER_FLAG_STRING(merge_inner, "internal flag")
55FUZZER_FLAG_STRING(merge_control_file,
sylvestrea9eb8572018-03-13 14:35:10 +000056 "Specify a control file used for the merge process. "
kcc99a71a12017-11-09 05:49:28 +000057 "If a merge process gets killed it tries to leave this file "
58 "in a state suitable for resuming the merge. "
kccc51afd72017-11-09 01:05:29 +000059 "By default a temporary file will be used.")
george.karpenkov29efa6d2017-08-21 23:25:50 +000060FUZZER_FLAG_INT(minimize_crash, 0, "If 1, minimizes the provided"
61 " crash input. Use with -runs=N or -max_total_time=N to limit "
62 "the number attempts."
63 " Use with -exact_artifact_path to specify the output."
64 " Combine with ASAN_OPTIONS=dedup_token_length=3 (or similar) to ensure that"
65 " the minimized input triggers the same crash."
66 )
67FUZZER_FLAG_INT(cleanse_crash, 0, "If 1, tries to cleanse the provided"
68 " crash input to make it contain fewer original bytes."
69 " Use with -exact_artifact_path to specify the output."
70 )
71FUZZER_FLAG_INT(minimize_crash_internal_step, 0, "internal flag")
kcc6f1e9bc2019-04-13 00:20:31 +000072FUZZER_FLAG_STRING(features_dir, "internal flag. Used to dump feature sets on disk."
73 "Every time a new input is added to the corpus, a corresponding file in the features_dir"
74 " is created containing the unique features of that input."
75 " Features are stored in binary format.")
george.karpenkov29efa6d2017-08-21 23:25:50 +000076FUZZER_FLAG_INT(use_counters, 1, "Use coverage counters")
george.karpenkov29efa6d2017-08-21 23:25:50 +000077FUZZER_FLAG_INT(use_memmem, 1,
78 "Use hints from intercepting memmem, strstr, etc")
79FUZZER_FLAG_INT(use_value_profile, 0,
80 "Experimental. Use value profile to guide fuzzing.")
81FUZZER_FLAG_INT(use_cmp, 1, "Use CMP traces to guide mutations")
82FUZZER_FLAG_INT(shrink, 0, "Experimental. Try to shrink corpus inputs.")
83FUZZER_FLAG_INT(reduce_inputs, 1,
84 "Try to reduce the size of inputs while preserving their full feature sets")
85FUZZER_FLAG_UNSIGNED(jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn"
86 " this number of jobs in separate worker processes"
87 " with stdout/stderr redirected to fuzz-JOB.log.")
88FUZZER_FLAG_UNSIGNED(workers, 0,
89 "Number of simultaneous worker processes to run the jobs."
90 " If zero, \"min(jobs,NumberOfCpuCores()/2)\" is used.")
91FUZZER_FLAG_INT(reload, 1,
92 "Reload the main corpus every <N> seconds to get new units"
93 " discovered by other processes. If 0, disabled")
94FUZZER_FLAG_INT(report_slow_units, 10,
95 "Report slowest units if they run for more than this number of seconds.")
96FUZZER_FLAG_INT(only_ascii, 0,
97 "If 1, generate only ASCII (isprint+isspace) inputs.")
98FUZZER_FLAG_STRING(dict, "Experimental. Use the dictionary file.")
99FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, "
100 "timeout, or slow inputs) as "
101 "$(artifact_prefix)file")
102FUZZER_FLAG_STRING(exact_artifact_path,
103 "Write the single artifact on failure (crash, timeout) "
104 "as $(exact_artifact_path). This overrides -artifact_prefix "
105 "and will not use checksum in the file name. Do not "
106 "use the same path for several parallel processes.")
107FUZZER_FLAG_INT(print_pcs, 0, "If 1, print out newly covered PCs.")
kccec9da662017-08-28 22:52:22 +0000108FUZZER_FLAG_INT(print_funcs, 2, "If >=1, print out at most this number of "
109 "newly covered functions.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000110FUZZER_FLAG_INT(print_final_stats, 0, "If 1, print statistics at exit.")
111FUZZER_FLAG_INT(print_corpus_stats, 0,
112 "If 1, print statistics on corpus elements at exit.")
113FUZZER_FLAG_INT(print_coverage, 0, "If 1, print coverage information as text"
114 " at exit.")
kcc569b3fa2019-01-29 23:53:28 +0000115FUZZER_FLAG_INT(dump_coverage, 0, "Deprecated.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000116FUZZER_FLAG_INT(handle_segv, 1, "If 1, try to intercept SIGSEGV.")
117FUZZER_FLAG_INT(handle_bus, 1, "If 1, try to intercept SIGBUS.")
118FUZZER_FLAG_INT(handle_abrt, 1, "If 1, try to intercept SIGABRT.")
119FUZZER_FLAG_INT(handle_ill, 1, "If 1, try to intercept SIGILL.")
120FUZZER_FLAG_INT(handle_fpe, 1, "If 1, try to intercept SIGFPE.")
121FUZZER_FLAG_INT(handle_int, 1, "If 1, try to intercept SIGINT.")
122FUZZER_FLAG_INT(handle_term, 1, "If 1, try to intercept SIGTERM.")
123FUZZER_FLAG_INT(handle_xfsz, 1, "If 1, try to intercept SIGXFSZ.")
kcc1239a992017-11-09 20:30:19 +0000124FUZZER_FLAG_INT(handle_usr1, 1, "If 1, try to intercept SIGUSR1.")
125FUZZER_FLAG_INT(handle_usr2, 1, "If 1, try to intercept SIGUSR2.")
kccda168932019-01-31 00:09:43 +0000126FUZZER_FLAG_INT(lazy_counters, 0, "If 1, a performance optimization is"
127 "enabled for the 8bit inline counters. "
128 "Requires that libFuzzer successfully installs its SEGV handler")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000129FUZZER_FLAG_INT(close_fd_mask, 0, "If 1, close stdout at startup; "
130 "if 2, close stderr; if 3, close both. "
kccb6836be2017-12-01 19:18:38 +0000131 "Be careful, this will also close e.g. stderr of asan.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000132FUZZER_FLAG_INT(detect_leaks, 1, "If 1, and if LeakSanitizer is enabled "
133 "try to detect memory leaks during fuzzing (i.e. not only at shut down).")
alekseyshld995b552017-10-23 22:04:30 +0000134FUZZER_FLAG_INT(purge_allocator_interval, 1, "Purge allocator caches and "
135 "quarantines every <N> seconds. When rss_limit_mb is specified (>0), "
136 "purging starts when RSS exceeds 50% of rss_limit_mb. Pass "
137 "purge_allocator_interval=-1 to disable this functionality.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000138FUZZER_FLAG_INT(trace_malloc, 0, "If >= 1 will print all mallocs/frees. "
139 "If >= 2 will also print stack traces.")
140FUZZER_FLAG_INT(rss_limit_mb, 2048, "If non-zero, the fuzzer will exit upon"
141 "reaching this limit of RSS memory usage.")
kcc120e40b2017-12-01 22:12:04 +0000142FUZZER_FLAG_INT(malloc_limit_mb, 0, "If non-zero, the fuzzer will exit "
143 "if the target tries to allocate this number of Mb with one malloc call. "
144 "If zero (default) same limit as rss_limit_mb is applied.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000145FUZZER_FLAG_STRING(exit_on_src_pos, "Exit if a newly found PC originates"
146 " from the given source location. Example: -exit_on_src_pos=foo.cc:123. "
147 "Used primarily for testing libFuzzer itself.")
148FUZZER_FLAG_STRING(exit_on_item, "Exit if an item with a given sha1 sum"
149 " was added to the corpus. "
150 "Used primarily for testing libFuzzer itself.")
151FUZZER_FLAG_INT(ignore_remaining_args, 0, "If 1, ignore all arguments passed "
152 "after this one. Useful for fuzzers that need to do their own "
153 "argument parsing.")
kcc3acbe072018-05-16 23:26:37 +0000154FUZZER_FLAG_STRING(focus_function, "Experimental. "
kccf7d6ba32019-05-09 21:29:45 +0000155 "Fuzzing will focus on inputs that trigger calls to this function. "
156 "If -focus_function=auto and -data_flow_trace is used, libFuzzer "
157 "will choose the focus functions automatically.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000158
george.karpenkov29efa6d2017-08-21 23:25:50 +0000159FUZZER_FLAG_INT(analyze_dict, 0, "Experimental")
kcc6991e962018-05-10 20:12:15 +0000160FUZZER_DEPRECATED_FLAG(use_clang_coverage)
kcc86e43882018-06-06 01:23:29 +0000161FUZZER_FLAG_STRING(data_flow_trace, "Experimental: use the data flow trace")
kcc908220a2019-05-10 00:59:32 +0000162FUZZER_FLAG_STRING(collect_data_flow,
163 "Experimental: collect the data flow trace")