blob: 9b21157793d89313c704f8e2f1e085a52b6766ea [file] [log] [blame]
george.karpenkov29efa6d2017-08-21 23:25:50 +00001//===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9// Flags. FUZZER_FLAG_INT/FUZZER_FLAG_STRING macros should be defined at the
10// point of inclusion. We are not using any flag parsing library for better
11// portability and independence.
12//===----------------------------------------------------------------------===//
13FUZZER_FLAG_INT(verbosity, 1, "Verbosity level.")
14FUZZER_FLAG_UNSIGNED(seed, 0, "Random seed. If 0, seed is generated.")
15FUZZER_FLAG_INT(runs, -1,
16 "Number of individual test runs (-1 for infinite runs).")
17FUZZER_FLAG_INT(max_len, 0, "Maximum length of the test input. "
18 "If 0, libFuzzer tries to guess a good value based on the corpus "
19 "and reports it. ")
20FUZZER_FLAG_INT(experimental_len_control, 0, "experimental flag")
21FUZZER_FLAG_INT(cross_over, 1, "If 1, cross over inputs.")
22FUZZER_FLAG_INT(mutate_depth, 5,
23 "Apply this number of consecutive mutations to each input.")
24FUZZER_FLAG_INT(shuffle, 1, "Shuffle inputs at startup")
25FUZZER_FLAG_INT(prefer_small, 1,
26 "If 1, always prefer smaller inputs during the corpus shuffle.")
27FUZZER_FLAG_INT(
28 timeout, 1200,
29 "Timeout in seconds (if positive). "
30 "If one unit runs more than this number of seconds the process will abort.")
31FUZZER_FLAG_INT(error_exitcode, 77, "When libFuzzer itself reports a bug "
32 "this exit code will be used.")
33FUZZER_FLAG_INT(timeout_exitcode, 77, "When libFuzzer reports a timeout "
34 "this exit code will be used.")
35FUZZER_FLAG_INT(max_total_time, 0, "If positive, indicates the maximal total "
36 "time in seconds to run the fuzzer.")
37FUZZER_FLAG_INT(help, 0, "Print help.")
38FUZZER_FLAG_INT(merge, 0, "If 1, the 2-nd, 3-rd, etc corpora will be "
39 "merged into the 1-st corpus. Only interesting units will be taken. "
40 "This flag can be used to minimize a corpus.")
kccc51afd72017-11-09 01:05:29 +000041FUZZER_FLAG_STRING(merge_inner, "internal flag")
42FUZZER_FLAG_STRING(merge_control_file,
43 "Specify a control file used for the merge proccess. "
kcc99a71a12017-11-09 05:49:28 +000044 "If a merge process gets killed it tries to leave this file "
45 "in a state suitable for resuming the merge. "
kccc51afd72017-11-09 01:05:29 +000046 "By default a temporary file will be used.")
george.karpenkov29efa6d2017-08-21 23:25:50 +000047FUZZER_FLAG_STRING(save_coverage_summary, "Experimental:"
48 " save coverage summary to a given file."
49 " Used with -merge=1")
50FUZZER_FLAG_STRING(load_coverage_summary, "Experimental:"
51 " load coverage summary from a given file."
52 " Treat this coverage as belonging to the first corpus. "
53 " Used with -merge=1")
54FUZZER_FLAG_INT(minimize_crash, 0, "If 1, minimizes the provided"
55 " crash input. Use with -runs=N or -max_total_time=N to limit "
56 "the number attempts."
57 " Use with -exact_artifact_path to specify the output."
58 " Combine with ASAN_OPTIONS=dedup_token_length=3 (or similar) to ensure that"
59 " the minimized input triggers the same crash."
60 )
61FUZZER_FLAG_INT(cleanse_crash, 0, "If 1, tries to cleanse the provided"
62 " crash input to make it contain fewer original bytes."
63 " Use with -exact_artifact_path to specify the output."
64 )
65FUZZER_FLAG_INT(minimize_crash_internal_step, 0, "internal flag")
66FUZZER_FLAG_INT(use_counters, 1, "Use coverage counters")
67FUZZER_FLAG_INT(use_indir_calls, 1, "Use indirect caller-callee counters")
68FUZZER_FLAG_INT(use_memmem, 1,
69 "Use hints from intercepting memmem, strstr, etc")
70FUZZER_FLAG_INT(use_value_profile, 0,
71 "Experimental. Use value profile to guide fuzzing.")
72FUZZER_FLAG_INT(use_cmp, 1, "Use CMP traces to guide mutations")
73FUZZER_FLAG_INT(shrink, 0, "Experimental. Try to shrink corpus inputs.")
74FUZZER_FLAG_INT(reduce_inputs, 1,
75 "Try to reduce the size of inputs while preserving their full feature sets")
76FUZZER_FLAG_UNSIGNED(jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn"
77 " this number of jobs in separate worker processes"
78 " with stdout/stderr redirected to fuzz-JOB.log.")
79FUZZER_FLAG_UNSIGNED(workers, 0,
80 "Number of simultaneous worker processes to run the jobs."
81 " If zero, \"min(jobs,NumberOfCpuCores()/2)\" is used.")
82FUZZER_FLAG_INT(reload, 1,
83 "Reload the main corpus every <N> seconds to get new units"
84 " discovered by other processes. If 0, disabled")
85FUZZER_FLAG_INT(report_slow_units, 10,
86 "Report slowest units if they run for more than this number of seconds.")
87FUZZER_FLAG_INT(only_ascii, 0,
88 "If 1, generate only ASCII (isprint+isspace) inputs.")
89FUZZER_FLAG_STRING(dict, "Experimental. Use the dictionary file.")
90FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, "
91 "timeout, or slow inputs) as "
92 "$(artifact_prefix)file")
93FUZZER_FLAG_STRING(exact_artifact_path,
94 "Write the single artifact on failure (crash, timeout) "
95 "as $(exact_artifact_path). This overrides -artifact_prefix "
96 "and will not use checksum in the file name. Do not "
97 "use the same path for several parallel processes.")
98FUZZER_FLAG_INT(print_pcs, 0, "If 1, print out newly covered PCs.")
kccec9da662017-08-28 22:52:22 +000099FUZZER_FLAG_INT(print_funcs, 2, "If >=1, print out at most this number of "
100 "newly covered functions.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000101FUZZER_FLAG_INT(print_final_stats, 0, "If 1, print statistics at exit.")
102FUZZER_FLAG_INT(print_corpus_stats, 0,
103 "If 1, print statistics on corpus elements at exit.")
104FUZZER_FLAG_INT(print_coverage, 0, "If 1, print coverage information as text"
105 " at exit.")
kcc1f707b82017-08-25 20:20:46 +0000106FUZZER_FLAG_INT(dump_coverage, 0, "Deprecated."
107 " If 1, dump coverage information as a"
george.karpenkov29efa6d2017-08-21 23:25:50 +0000108 " .sancov file at exit.")
109FUZZER_FLAG_INT(handle_segv, 1, "If 1, try to intercept SIGSEGV.")
110FUZZER_FLAG_INT(handle_bus, 1, "If 1, try to intercept SIGBUS.")
111FUZZER_FLAG_INT(handle_abrt, 1, "If 1, try to intercept SIGABRT.")
112FUZZER_FLAG_INT(handle_ill, 1, "If 1, try to intercept SIGILL.")
113FUZZER_FLAG_INT(handle_fpe, 1, "If 1, try to intercept SIGFPE.")
114FUZZER_FLAG_INT(handle_int, 1, "If 1, try to intercept SIGINT.")
115FUZZER_FLAG_INT(handle_term, 1, "If 1, try to intercept SIGTERM.")
116FUZZER_FLAG_INT(handle_xfsz, 1, "If 1, try to intercept SIGXFSZ.")
117FUZZER_FLAG_INT(close_fd_mask, 0, "If 1, close stdout at startup; "
118 "if 2, close stderr; if 3, close both. "
119 "Be careful, this will also close e.g. asan's stderr/stdout.")
120FUZZER_FLAG_INT(detect_leaks, 1, "If 1, and if LeakSanitizer is enabled "
121 "try to detect memory leaks during fuzzing (i.e. not only at shut down).")
alekseyshld995b552017-10-23 22:04:30 +0000122FUZZER_FLAG_INT(purge_allocator_interval, 1, "Purge allocator caches and "
123 "quarantines every <N> seconds. When rss_limit_mb is specified (>0), "
124 "purging starts when RSS exceeds 50% of rss_limit_mb. Pass "
125 "purge_allocator_interval=-1 to disable this functionality.")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000126FUZZER_FLAG_INT(trace_malloc, 0, "If >= 1 will print all mallocs/frees. "
127 "If >= 2 will also print stack traces.")
128FUZZER_FLAG_INT(rss_limit_mb, 2048, "If non-zero, the fuzzer will exit upon"
129 "reaching this limit of RSS memory usage.")
130FUZZER_FLAG_STRING(exit_on_src_pos, "Exit if a newly found PC originates"
131 " from the given source location. Example: -exit_on_src_pos=foo.cc:123. "
132 "Used primarily for testing libFuzzer itself.")
133FUZZER_FLAG_STRING(exit_on_item, "Exit if an item with a given sha1 sum"
134 " was added to the corpus. "
135 "Used primarily for testing libFuzzer itself.")
136FUZZER_FLAG_INT(ignore_remaining_args, 0, "If 1, ignore all arguments passed "
137 "after this one. Useful for fuzzers that need to do their own "
138 "argument parsing.")
139
140FUZZER_FLAG_STRING(run_equivalence_server, "Experimental")
141FUZZER_FLAG_STRING(use_equivalence_server, "Experimental")
142FUZZER_FLAG_INT(analyze_dict, 0, "Experimental")
dor1s06fb50c2017-10-05 22:41:03 +0000143FUZZER_FLAG_INT(use_clang_coverage, 0, "Experimental")
kcc51e6f392017-10-11 20:31:01 +0000144FUZZER_FLAG_INT(use_feature_frequency, 0, "Experimental/internal")
george.karpenkov29efa6d2017-08-21 23:25:50 +0000145
146FUZZER_DEPRECATED_FLAG(exit_on_first)
147FUZZER_DEPRECATED_FLAG(save_minimized_corpus)
148FUZZER_DEPRECATED_FLAG(sync_command)
149FUZZER_DEPRECATED_FLAG(sync_timeout)
150FUZZER_DEPRECATED_FLAG(test_single_input)
151FUZZER_DEPRECATED_FLAG(drill)
152FUZZER_DEPRECATED_FLAG(truncate_units)
153FUZZER_DEPRECATED_FLAG(output_csv)