Note: These settings apply to the old fuzzing approach using a fuzzerTestOneInput
method and the native Jazzer binary. They don't work in the new JUnit integration.
The following JVM settings are recommended for running Jazzer:
-XX:-OmitStackTraceInFastThrow
: Ensures that stack traces are emitted even on hot code paths. This may hurt performance if your Fuzz Test frequently throws and catches exceptions, but also helps find flaky bugs.-XX:+UseParallelGC
: Optimizes garbage collection for high throughput rather than low latency.-XX:+CriticalJNINatives
: Is supported with JDK 17 and earlier and improves the runtime performance of Jazzer's instrumentation.-XX:+EnableDynamicAgentLoading
: Silences a warning with JDK 21 and later triggered by the Java agent that Jazzer attaches to instrument the fuzzed code.
Jazzer provides many configuration settings. An up-to-date list can be found by running Jazzer with the --help
flag.
The value of a setting item some_opt
is obtained from the following sources in increasing order of precedence:
- the default value
META-INF/MANIFEST.MF
attributeJazzer-Some-Opt
on the classpath- the
JAZZER_SOME_OPT
environment variable - the
jazzer.some_opt
system property - the
jazzer.some_opt
JUnit configuration parameter - the
--some_opt
CLI parameter
When Jazzer manages to find an input that causes an uncaught exception or a failed assertion, it prints a Java stack trace and creates two files that aid in reproducing the crash without Jazzer:
crash-<sha1_of_input>
contains the raw bytes passed to the fuzz target (just as with libFuzzer C/C++ fuzz targets). The crash can be reproduced with Jazzer by passing the path to the crash file as the only positional argument.Crash-<sha1_of_input>.java
contains a class with amain
function that invokes the fuzz target with the crashing input. This is especially useful if usingFuzzedDataProvider
as the raw bytes of the input do not directly correspond to the values consumed by the fuzz target. The.java
file can be compiled with just the fuzz target and its dependencies in the classpath (plusjazzer_standalone.jar
orcom.code-intelligence:jazzer-api:<version>
if usingFuzzedDataProvider
).
With the following argument you can minimize a crashing input to find the smallest input that reproduces the same "bug":
-minimize_crash=1 <path/to/crashing_input>
libFuzzer offers the -fork=N
and -jobs=N
flags for parallel fuzzing, both of which are also supported by Jazzer.
The Autofuzz mode enables fuzzing arbitrary methods without having to manually create fuzz targets. Instead, Jazzer will attempt to generate suitable and varied inputs to a specified methods using only public API functions available on the classpath.
To use Autofuzz, specify the --autofuzz
flag and provide a fully qualified method reference, e.g.:
--autofuzz=org.apache.commons.imaging.Imaging::getBufferedImage
To autofuzz a constructor the ClassType::new
format can be used.
If there are multiple overloads, and you want Jazzer to only fuzz one, you can optionally specify the signature of the method to fuzz:
--autofuzz=org.apache.commons.imaging.Imaging::getBufferedImage(java.io.InputStream,java.util.Map)
The format of the signature agrees with that obtained from the part after the #
of the link to the Javadocs for the particular method.
Under the hood, Jazzer tries various ways of creating objects from the fuzzer input. For example, if a parameter is an interface or an abstract class, it will look for all concrete implementing classes on the classpath. Jazzer can also create objects from classes that follow the builder design pattern or have a default constructor and use setters to set the fields.
Creating objects from fuzzer input can lead to many reported exceptions.
Jazzer addresses this issue by ignoring exceptions that the target method declares to throw.
In addition to that, you can provide a list of exceptions to be ignored during fuzzing via the --autofuzz_ignore
flag in the form of a comma-separated list.
You can specify concrete exceptions (e.g., java.lang.NullPointerException
), in which case also subclasses of these exception classes will be ignored, or glob patterns to ignore all exceptions in a specific package (e.g. java.lang.*
or com.company.**
).