reference, declaration → definition definition → references, declarations, derived classes, virtual overrides reference to multiple definitions → definitions unreferenced |
159 if (Flags.verbosity >= 2) 165 if (Flags.verbosity >= 2) 170 if (Flags.verbosity >= 2) 199 Flags.len_control = 0; 231 if (Flags.verbosity) { 385 if (Flags.runs <= 0 && Flags.max_total_time == 0) { 385 if (Flags.runs <= 0 && Flags.max_total_time == 0) { 430 if (Flags.exact_artifact_path) { 443 if (Flags.exact_artifact_path) { 626 if (Flags.help) { 631 if (Flags.close_fd_mask & 2) 633 if (Flags.close_fd_mask & 1) 636 if (Flags.jobs > 0 && Flags.workers == 0) { 636 if (Flags.jobs > 0 && Flags.workers == 0) { 638 if (Flags.workers > 1) 639 Printf("Running %u workers\n", Flags.workers); 646 Options.Verbosity = Flags.verbosity; 649 Options.UnitTimeoutSec = Flags.timeout; 650 Options.ErrorExitCode = Flags.error_exitcode; 651 Options.TimeoutExitCode = Flags.timeout_exitcode; 652 Options.IgnoreTimeouts = Flags.ignore_timeouts; 653 Options.IgnoreOOMs = Flags.ignore_ooms; 654 Options.IgnoreCrashes = Flags.ignore_crashes; 655 Options.MaxTotalTimeSec = Flags.max_total_time; 656 Options.DoCrossOver = Flags.cross_over; 657 Options.MutateDepth = Flags.mutate_depth; 658 Options.ReduceDepth = Flags.reduce_depth; 659 Options.UseCounters = Flags.use_counters; 660 Options.UseMemmem = Flags.use_memmem; 661 Options.UseCmp = Flags.use_cmp; 662 Options.UseValueProfile = Flags.use_value_profile; 663 Options.Shrink = Flags.shrink; 664 Options.ReduceInputs = Flags.reduce_inputs; 665 Options.ShuffleAtStartUp = Flags.shuffle; 666 Options.PreferSmall = Flags.prefer_small; 667 Options.ReloadIntervalSec = Flags.reload; 668 Options.OnlyASCII = Flags.only_ascii; 669 Options.DetectLeaks = Flags.detect_leaks; 670 Options.PurgeAllocatorIntervalSec = Flags.purge_allocator_interval; 671 Options.TraceMalloc = Flags.trace_malloc; 672 Options.RssLimitMb = Flags.rss_limit_mb; 673 Options.MallocLimitMb = Flags.malloc_limit_mb; 680 Options.ReportSlowUnits = Flags.report_slow_units; 686 if (Flags.dict) 693 !RunIndividualFiles || Flags.minimize_crash_internal_step; 694 Options.PrintNewCovPcs = Flags.print_pcs; 695 Options.PrintNewCovFuncs = Flags.print_funcs; 696 Options.PrintFinalStats = Flags.print_final_stats; 697 Options.PrintCorpusStats = Flags.print_corpus_stats; 698 Options.PrintCoverage = Flags.print_coverage; 714 unsigned Seed = Flags.seed; 719 if (Flags.verbosity) 722 if (Flags.collect_data_flow && !Flags.fork && !Flags.merge) { 722 if (Flags.collect_data_flow && !Flags.fork && !Flags.merge) { 722 if (Flags.collect_data_flow && !Flags.fork && !Flags.merge) { 742 Options.HandleAbrt = Flags.handle_abrt; 743 Options.HandleBus = Flags.handle_bus; 744 Options.HandleFpe = Flags.handle_fpe; 745 Options.HandleIll = Flags.handle_ill; 746 Options.HandleInt = Flags.handle_int; 747 Options.HandleSegv = Flags.handle_segv; 748 Options.HandleTerm = Flags.handle_term; 749 Options.HandleXfsz = Flags.handle_xfsz; 750 Options.HandleUsr1 = Flags.handle_usr1; 751 Options.HandleUsr2 = Flags.handle_usr2; 793 if (Flags.merge_inner) { 802 if (Flags.analyze_dict) {projects/compiler-rt/lib/fuzzer/FuzzerFlags.def
12 FUZZER_FLAG_INT(verbosity, 1, "Verbosity level.") 13 FUZZER_FLAG_UNSIGNED(seed, 0, "Random seed. If 0, seed is generated.") 14 FUZZER_FLAG_INT(runs, -1, 16 FUZZER_FLAG_INT(max_len, 0, "Maximum length of the test input. " 19 FUZZER_FLAG_INT(len_control, 100, "Try generating small inputs first, " 23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files " 26 FUZZER_FLAG_INT(cross_over, 1, "If 1, cross over inputs.") 27 FUZZER_FLAG_INT(mutate_depth, 5, 29 FUZZER_FLAG_INT(reduce_depth, 0, "Experimental/internal. " 31 FUZZER_FLAG_INT(shuffle, 1, "Shuffle inputs at startup") 32 FUZZER_FLAG_INT(prefer_small, 1, 34 FUZZER_FLAG_INT( 38 FUZZER_FLAG_INT(error_exitcode, 77, "When libFuzzer itself reports a bug " 40 FUZZER_FLAG_INT(timeout_exitcode, 70, "When libFuzzer reports a timeout " 42 FUZZER_FLAG_INT(max_total_time, 0, "If positive, indicates the maximal total " 44 FUZZER_FLAG_INT(help, 0, "Print help.") 45 FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens " 47 FUZZER_FLAG_INT(ignore_timeouts, 1, "Ignore timeouts in fork mode") 48 FUZZER_FLAG_INT(ignore_ooms, 1, "Ignore OOMs in fork mode") 49 FUZZER_FLAG_INT(ignore_crashes, 0, "Ignore crashes in fork mode") 50 FUZZER_FLAG_INT(merge, 0, "If 1, the 2-nd, 3-rd, etc corpora will be " 53 FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists") 54 FUZZER_FLAG_STRING(merge_inner, "internal flag") 55 FUZZER_FLAG_STRING(merge_control_file, 60 FUZZER_FLAG_INT(minimize_crash, 0, "If 1, minimizes the provided" 67 FUZZER_FLAG_INT(cleanse_crash, 0, "If 1, tries to cleanse the provided" 71 FUZZER_FLAG_INT(minimize_crash_internal_step, 0, "internal flag") 72 FUZZER_FLAG_STRING(features_dir, "internal flag. Used to dump feature sets on disk." 76 FUZZER_FLAG_INT(use_counters, 1, "Use coverage counters") 77 FUZZER_FLAG_INT(use_memmem, 1, 79 FUZZER_FLAG_INT(use_value_profile, 0, 81 FUZZER_FLAG_INT(use_cmp, 1, "Use CMP traces to guide mutations") 82 FUZZER_FLAG_INT(shrink, 0, "Experimental. Try to shrink corpus inputs.") 83 FUZZER_FLAG_INT(reduce_inputs, 1, 85 FUZZER_FLAG_UNSIGNED(jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn" 88 FUZZER_FLAG_UNSIGNED(workers, 0, 91 FUZZER_FLAG_INT(reload, 1, 94 FUZZER_FLAG_INT(report_slow_units, 10, 96 FUZZER_FLAG_INT(only_ascii, 0, 98 FUZZER_FLAG_STRING(dict, "Experimental. Use the dictionary file.") 99 FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, " 102 FUZZER_FLAG_STRING(exact_artifact_path, 107 FUZZER_FLAG_INT(print_pcs, 0, "If 1, print out newly covered PCs.") 108 FUZZER_FLAG_INT(print_funcs, 2, "If >=1, print out at most this number of " 110 FUZZER_FLAG_INT(print_final_stats, 0, "If 1, print statistics at exit.") 111 FUZZER_FLAG_INT(print_corpus_stats, 0, 113 FUZZER_FLAG_INT(print_coverage, 0, "If 1, print coverage information as text" 115 FUZZER_FLAG_INT(dump_coverage, 0, "Deprecated.") 116 FUZZER_FLAG_INT(handle_segv, 1, "If 1, try to intercept SIGSEGV.") 117 FUZZER_FLAG_INT(handle_bus, 1, "If 1, try to intercept SIGBUS.") 118 FUZZER_FLAG_INT(handle_abrt, 1, "If 1, try to intercept SIGABRT.") 119 FUZZER_FLAG_INT(handle_ill, 1, "If 1, try to intercept SIGILL.") 120 FUZZER_FLAG_INT(handle_fpe, 1, "If 1, try to intercept SIGFPE.") 121 FUZZER_FLAG_INT(handle_int, 1, "If 1, try to intercept SIGINT.") 122 FUZZER_FLAG_INT(handle_term, 1, "If 1, try to intercept SIGTERM.") 123 FUZZER_FLAG_INT(handle_xfsz, 1, "If 1, try to intercept SIGXFSZ.") 124 FUZZER_FLAG_INT(handle_usr1, 1, "If 1, try to intercept SIGUSR1.") 125 FUZZER_FLAG_INT(handle_usr2, 1, "If 1, try to intercept SIGUSR2.") 126 FUZZER_FLAG_INT(close_fd_mask, 0, "If 1, close stdout at startup; " 129 FUZZER_FLAG_INT(detect_leaks, 1, "If 1, and if LeakSanitizer is enabled " 131 FUZZER_FLAG_INT(purge_allocator_interval, 1, "Purge allocator caches and " 135 FUZZER_FLAG_INT(trace_malloc, 0, "If >= 1 will print all mallocs/frees. " 137 FUZZER_FLAG_INT(rss_limit_mb, 2048, "If non-zero, the fuzzer will exit upon" 139 FUZZER_FLAG_INT(malloc_limit_mb, 0, "If non-zero, the fuzzer will exit " 142 FUZZER_FLAG_STRING(exit_on_src_pos, "Exit if a newly found PC originates" 145 FUZZER_FLAG_STRING(exit_on_item, "Exit if an item with a given sha1 sum" 148 FUZZER_FLAG_INT(ignore_remaining_args, 0, "If 1, ignore all arguments passed " 151 FUZZER_FLAG_STRING(focus_function, "Experimental. " 156 FUZZER_FLAG_INT(analyze_dict, 0, "Experimental") 158 FUZZER_FLAG_STRING(data_flow_trace, "Experimental: use the data flow trace") 159 FUZZER_FLAG_STRING(collect_data_flow,