FuzzerFlags.def 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. // Flags. FUZZER_FLAG_INT/FUZZER_FLAG_STRING macros should be defined at the
  9. // point of inclusion. We are not using any flag parsing library for better
  10. // portability and independence.
  11. //===----------------------------------------------------------------------===//
  12. FUZZER_FLAG_INT(verbosity, 1, "Verbosity level.")
  13. FUZZER_FLAG_UNSIGNED(seed, 0, "Random seed. If 0, seed is generated.")
  14. FUZZER_FLAG_INT(runs, -1,
  15. "Number of individual test runs (-1 for infinite runs).")
  16. FUZZER_FLAG_INT(max_len, 0, "Maximum length of the test input. "
  17. "If 0, libFuzzer tries to guess a good value based on the corpus "
  18. "and reports it. ")
  19. FUZZER_FLAG_INT(len_control, 100, "Try generating small inputs first, "
  20. "then try larger inputs over time. Specifies the rate at which the length "
  21. "limit is increased (smaller == faster). If 0, immediately try inputs with "
  22. "size up to max_len. Default value is 0, if LLVMFuzzerCustomMutator is used.")
  23. FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
  24. "to use as an additional seed corpus. Alternatively, an \"@\" followed by "
  25. "the name of a file containing the comma-separated list.")
  26. FUZZER_FLAG_INT(keep_seed, 0, "If 1, keep seed inputs in the corpus even if "
  27. "they do not produce new coverage. When used with |reduce_inputs==1|, the "
  28. "seed inputs will never be reduced. This option can be useful when seeds are"
  29. "not properly formed for the fuzz target but still have useful snippets.")
  30. FUZZER_FLAG_INT(cross_over, 1, "If 1, cross over inputs.")
  31. FUZZER_FLAG_INT(cross_over_uniform_dist, 0, "Experimental. If 1, use a "
  32. "uniform probability distribution when choosing inputs to cross over with. "
  33. "Some of the inputs in the corpus may never get chosen for mutation "
  34. "depending on the input mutation scheduling policy. With this flag, all "
  35. "inputs, regardless of the input mutation scheduling policy, can be chosen "
  36. "as an input to cross over with. This can be particularly useful with "
  37. "|keep_seed==1|; all the initial seed inputs, even though they do not "
  38. "increase coverage because they are not properly formed, will still be "
  39. "chosen as an input to cross over with.")
  40. FUZZER_FLAG_INT(mutate_depth, 5,
  41. "Apply this number of consecutive mutations to each input.")
  42. FUZZER_FLAG_INT(reduce_depth, 0, "Experimental/internal. "
  43. "Reduce depth if mutations lose unique features")
  44. FUZZER_FLAG_INT(shuffle, 1, "Shuffle inputs at startup")
  45. FUZZER_FLAG_INT(prefer_small, 1,
  46. "If 1, always prefer smaller inputs during the corpus shuffle.")
  47. FUZZER_FLAG_INT(
  48. timeout, 1200,
  49. "Timeout in seconds (if positive). "
  50. "If one unit runs more than this number of seconds the process will abort.")
  51. FUZZER_FLAG_INT(error_exitcode, 77, "When libFuzzer itself reports a bug "
  52. "this exit code will be used.")
  53. FUZZER_FLAG_INT(timeout_exitcode, 70, "When libFuzzer reports a timeout "
  54. "this exit code will be used.")
  55. FUZZER_FLAG_INT(interrupted_exitcode, 0, "[arcadia] When libFuzzer intercepts a singal "
  56. "this exit code will be used.")
  57. FUZZER_FLAG_INT(dump_interrupted, 0, "[arcadia] If 1, dump current unit on signal.")
  58. FUZZER_FLAG_INT(max_total_time, 0, "If positive, indicates the maximal total "
  59. "time in seconds to run the fuzzer.")
  60. FUZZER_FLAG_INT(help, 0, "Print help.")
  61. FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens "
  62. "in a subprocess")
  63. FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
  64. "strategy, The main corpus will be grouped according to size, "
  65. "and each sub-process will randomly select seeds from different "
  66. "groups as the sub-corpus.")
  67. FUZZER_FLAG_INT(ignore_timeouts, 1, "Ignore timeouts in fork mode")
  68. FUZZER_FLAG_INT(ignore_ooms, 1, "Ignore OOMs in fork mode")
  69. FUZZER_FLAG_INT(ignore_crashes, 0, "Ignore crashes in fork mode")
  70. FUZZER_FLAG_INT(merge, 0, "If 1, the 2-nd, 3-rd, etc corpora will be "
  71. "merged into the 1-st corpus. Only interesting units will be taken. "
  72. "This flag can be used to minimize a corpus.")
  73. FUZZER_FLAG_INT(set_cover_merge, 0, "If 1, the 2-nd, 3-rd, etc corpora will be "
  74. "merged into the 1-st corpus. Same as the 'merge' flag, but uses the "
  75. "standard greedy algorithm for the set cover problem to "
  76. "compute an approximation of the minimum set of testcases that "
  77. "provide the same coverage as the initial corpora")
  78. FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists")
  79. FUZZER_FLAG_STRING(merge_inner, "internal flag")
  80. FUZZER_FLAG_STRING(merge_control_file,
  81. "Specify a control file used for the merge process. "
  82. "If a merge process gets killed it tries to leave this file "
  83. "in a state suitable for resuming the merge. "
  84. "By default a temporary file will be used."
  85. "The same file can be used for multistep merge process.")
  86. FUZZER_FLAG_INT(minimize_crash, 0, "If 1, minimizes the provided"
  87. " crash input. Use with -runs=N or -max_total_time=N to limit "
  88. "the number attempts."
  89. " Use with -exact_artifact_path to specify the output."
  90. " Combine with ASAN_OPTIONS=dedup_token_length=3 (or similar) to ensure that"
  91. " the minimized input triggers the same crash."
  92. )
  93. FUZZER_FLAG_INT(cleanse_crash, 0, "If 1, tries to cleanse the provided"
  94. " crash input to make it contain fewer original bytes."
  95. " Use with -exact_artifact_path to specify the output."
  96. )
  97. FUZZER_FLAG_INT(minimize_crash_internal_step, 0, "internal flag")
  98. FUZZER_FLAG_STRING(features_dir, "internal flag. Used to dump feature sets on disk."
  99. "Every time a new input is added to the corpus, a corresponding file in the features_dir"
  100. " is created containing the unique features of that input."
  101. " Features are stored in binary format.")
  102. FUZZER_FLAG_STRING(mutation_graph_file, "Saves a graph (in DOT format) to"
  103. " mutation_graph_file. The graph contains a vertex for each input that has"
  104. " unique coverage; directed edges are provided between parents and children"
  105. " where the child has unique coverage, and are recorded with the type of"
  106. " mutation that caused the child.")
  107. FUZZER_FLAG_INT(use_counters, 1, "Use coverage counters")
  108. FUZZER_FLAG_INT(use_memmem, 1,
  109. "Use hints from intercepting memmem, strstr, etc")
  110. FUZZER_FLAG_INT(use_value_profile, 0,
  111. "Experimental. Use value profile to guide fuzzing.")
  112. FUZZER_FLAG_INT(use_cmp, 1, "Use CMP traces to guide mutations")
  113. FUZZER_FLAG_INT(shrink, 0, "Experimental. Try to shrink corpus inputs.")
  114. FUZZER_FLAG_INT(reduce_inputs, 1,
  115. "Try to reduce the size of inputs while preserving their full feature sets")
  116. FUZZER_FLAG_UNSIGNED(jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn"
  117. " this number of jobs in separate worker processes"
  118. " with stdout/stderr redirected to fuzz-JOB.log.")
  119. FUZZER_FLAG_UNSIGNED(workers, 0,
  120. "Number of simultaneous worker processes to run the jobs."
  121. " If zero, \"min(jobs,NumberOfCpuCores()/2)\" is used.")
  122. FUZZER_FLAG_INT(reload, 1,
  123. "Reload the main corpus every <N> seconds to get new units"
  124. " discovered by other processes. If 0, disabled")
  125. FUZZER_FLAG_INT(report_slow_units, 10,
  126. "Report slowest units if they run for more than this number of seconds.")
  127. FUZZER_FLAG_INT(only_ascii, 0,
  128. "If 1, generate only ASCII (isprint+isspace) inputs.")
  129. FUZZER_FLAG_STRING(dict, "Experimental. Use the dictionary file.")
  130. FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, "
  131. "timeout, or slow inputs) as "
  132. "$(artifact_prefix)file")
  133. FUZZER_FLAG_STRING(exact_artifact_path,
  134. "Write the single artifact on failure (crash, timeout) "
  135. "as $(exact_artifact_path). This overrides -artifact_prefix "
  136. "and will not use checksum in the file name. Do not "
  137. "use the same path for several parallel processes.")
  138. FUZZER_FLAG_INT(print_pcs, 0, "If 1, print out newly covered PCs.")
  139. FUZZER_FLAG_INT(print_funcs, 2, "If >=1, print out at most this number of "
  140. "newly covered functions.")
  141. FUZZER_FLAG_INT(print_final_stats, 0, "If 1, print statistics at exit.")
  142. FUZZER_FLAG_INT(print_corpus_stats, 0,
  143. "If 1, print statistics on corpus elements at exit.")
  144. FUZZER_FLAG_INT(print_coverage, 0, "If 1, print coverage information as text"
  145. " at exit.")
  146. FUZZER_FLAG_INT(print_full_coverage, 0, "If 1, print full coverage information "
  147. "(all branches) as text at exit.")
  148. FUZZER_FLAG_INT(dump_coverage, 0, "Deprecated.")
  149. FUZZER_FLAG_INT(handle_segv, 1, "If 1, try to intercept SIGSEGV.")
  150. FUZZER_FLAG_INT(handle_bus, 1, "If 1, try to intercept SIGBUS.")
  151. FUZZER_FLAG_INT(handle_abrt, 1, "If 1, try to intercept SIGABRT.")
  152. FUZZER_FLAG_INT(handle_ill, 1, "If 1, try to intercept SIGILL.")
  153. FUZZER_FLAG_INT(handle_fpe, 1, "If 1, try to intercept SIGFPE.")
  154. FUZZER_FLAG_INT(handle_int, 1, "If 1, try to intercept SIGINT.")
  155. FUZZER_FLAG_INT(handle_term, 1, "If 1, try to intercept SIGTERM.")
  156. FUZZER_FLAG_INT(handle_xfsz, 1, "If 1, try to intercept SIGXFSZ.")
  157. FUZZER_FLAG_INT(handle_usr1, 1, "If 1, try to intercept SIGUSR1.")
  158. FUZZER_FLAG_INT(handle_usr2, 1, "If 1, try to intercept SIGUSR2.")
  159. FUZZER_FLAG_INT(handle_winexcept, 1, "If 1, try to intercept uncaught Windows "
  160. "Visual C++ Exceptions.")
  161. FUZZER_FLAG_INT(close_fd_mask, 0, "If 1, close stdout at startup; "
  162. "if 2, close stderr; if 3, close both. "
  163. "Be careful, this will also close e.g. stderr of asan.")
  164. FUZZER_FLAG_INT(detect_leaks, 1, "If 1, and if LeakSanitizer is enabled "
  165. "try to detect memory leaks during fuzzing (i.e. not only at shut down).")
  166. FUZZER_FLAG_INT(purge_allocator_interval, 1, "Purge allocator caches and "
  167. "quarantines every <N> seconds. When rss_limit_mb is specified (>0), "
  168. "purging starts when RSS exceeds 50% of rss_limit_mb. Pass "
  169. "purge_allocator_interval=-1 to disable this functionality.")
  170. FUZZER_FLAG_INT(trace_malloc, 0, "If >= 1 will print all mallocs/frees. "
  171. "If >= 2 will also print stack traces.")
  172. FUZZER_FLAG_INT(rss_limit_mb, 2048, "If non-zero, the fuzzer will exit upon"
  173. "reaching this limit of RSS memory usage.")
  174. FUZZER_FLAG_INT(malloc_limit_mb, 0, "If non-zero, the fuzzer will exit "
  175. "if the target tries to allocate this number of Mb with one malloc call. "
  176. "If zero (default) same limit as rss_limit_mb is applied.")
  177. FUZZER_FLAG_STRING(exit_on_src_pos, "Exit if a newly found PC originates"
  178. " from the given source location. Example: -exit_on_src_pos=foo.cc:123. "
  179. "Used primarily for testing libFuzzer itself.")
  180. FUZZER_FLAG_STRING(exit_on_item, "Exit if an item with a given sha1 sum"
  181. " was added to the corpus. "
  182. "Used primarily for testing libFuzzer itself.")
  183. FUZZER_FLAG_INT(ignore_remaining_args, 0, "If 1, ignore all arguments passed "
  184. "after this one. Useful for fuzzers that need to do their own "
  185. "argument parsing.")
  186. FUZZER_FLAG_STRING(focus_function, "Experimental. "
  187. "Fuzzing will focus on inputs that trigger calls to this function. "
  188. "If -focus_function=auto and -data_flow_trace is used, libFuzzer "
  189. "will choose the focus functions automatically. Disables -entropic when "
  190. "specified.")
  191. FUZZER_FLAG_INT(entropic, 1, "Enables entropic power schedule.")
  192. FUZZER_FLAG_INT(entropic_feature_frequency_threshold, 0xFF, "Experimental. If "
  193. "entropic is enabled, all features which are observed less often than "
  194. "the specified value are considered as rare.")
  195. FUZZER_FLAG_INT(entropic_number_of_rarest_features, 100, "Experimental. If "
  196. "entropic is enabled, we keep track of the frequencies only for the "
  197. "Top-X least abundant features (union features that are considered as "
  198. "rare).")
  199. FUZZER_FLAG_INT(entropic_scale_per_exec_time, 0, "Experimental. If 1, "
  200. "the Entropic power schedule gets scaled based on the input execution "
  201. "time. Inputs with lower execution time get scheduled more (up to 30x). "
  202. "Note that, if 1, fuzzer stops from being deterministic even if a "
  203. "non-zero random seed is given.")
  204. FUZZER_FLAG_INT(analyze_dict, 0, "Experimental")
  205. FUZZER_DEPRECATED_FLAG(use_clang_coverage)
  206. FUZZER_FLAG_STRING(data_flow_trace, "Experimental: use the data flow trace")
  207. FUZZER_FLAG_STRING(collect_data_flow,
  208. "Experimental: collect the data flow trace")
  209. FUZZER_FLAG_INT(create_missing_dirs, 0, "Automatically attempt to create "
  210. "directories for arguments that would normally expect them to already "
  211. "exist (i.e. artifact_prefix, exact_artifact_path, features_dir, corpus)")