xref: /freebsd-src/contrib/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtilPosix.cpp (revision 06c3fb2749bda94cb5201f81ffdb8fa6c3161b2e)
10b57cec5SDimitry Andric //===- FuzzerUtilPosix.cpp - Misc utils for Posix. ------------------------===//
20b57cec5SDimitry Andric //
30b57cec5SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
40b57cec5SDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
50b57cec5SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
60b57cec5SDimitry Andric //
70b57cec5SDimitry Andric //===----------------------------------------------------------------------===//
80b57cec5SDimitry Andric // Misc utils implementation using Posix API.
90b57cec5SDimitry Andric //===----------------------------------------------------------------------===//
105ffd83dbSDimitry Andric #include "FuzzerPlatform.h"
110b57cec5SDimitry Andric #if LIBFUZZER_POSIX
120b57cec5SDimitry Andric #include "FuzzerIO.h"
130b57cec5SDimitry Andric #include "FuzzerInternal.h"
140b57cec5SDimitry Andric #include "FuzzerTracePC.h"
150b57cec5SDimitry Andric #include <cassert>
160b57cec5SDimitry Andric #include <chrono>
170b57cec5SDimitry Andric #include <cstring>
180b57cec5SDimitry Andric #include <errno.h>
190b57cec5SDimitry Andric #include <iomanip>
200b57cec5SDimitry Andric #include <signal.h>
210b57cec5SDimitry Andric #include <stdio.h>
220b57cec5SDimitry Andric #include <sys/mman.h>
230b57cec5SDimitry Andric #include <sys/resource.h>
240b57cec5SDimitry Andric #include <sys/syscall.h>
250b57cec5SDimitry Andric #include <sys/time.h>
260b57cec5SDimitry Andric #include <sys/types.h>
270b57cec5SDimitry Andric #include <thread>
280b57cec5SDimitry Andric #include <unistd.h>
290b57cec5SDimitry Andric 
300b57cec5SDimitry Andric namespace fuzzer {
310b57cec5SDimitry Andric 
AlarmHandler(int,siginfo_t *,void *)320b57cec5SDimitry Andric static void AlarmHandler(int, siginfo_t *, void *) {
330b57cec5SDimitry Andric   Fuzzer::StaticAlarmCallback();
340b57cec5SDimitry Andric }
350b57cec5SDimitry Andric 
360b57cec5SDimitry Andric static void (*upstream_segv_handler)(int, siginfo_t *, void *);
370b57cec5SDimitry Andric 
SegvHandler(int sig,siginfo_t * si,void * ucontext)380b57cec5SDimitry Andric static void SegvHandler(int sig, siginfo_t *si, void *ucontext) {
390b57cec5SDimitry Andric   assert(si->si_signo == SIGSEGV);
400b57cec5SDimitry Andric   if (upstream_segv_handler)
410b57cec5SDimitry Andric     return upstream_segv_handler(sig, si, ucontext);
420b57cec5SDimitry Andric   Fuzzer::StaticCrashSignalCallback();
430b57cec5SDimitry Andric }
440b57cec5SDimitry Andric 
CrashHandler(int,siginfo_t *,void *)450b57cec5SDimitry Andric static void CrashHandler(int, siginfo_t *, void *) {
460b57cec5SDimitry Andric   Fuzzer::StaticCrashSignalCallback();
470b57cec5SDimitry Andric }
480b57cec5SDimitry Andric 
InterruptHandler(int,siginfo_t *,void *)490b57cec5SDimitry Andric static void InterruptHandler(int, siginfo_t *, void *) {
500b57cec5SDimitry Andric   Fuzzer::StaticInterruptCallback();
510b57cec5SDimitry Andric }
520b57cec5SDimitry Andric 
GracefulExitHandler(int,siginfo_t *,void *)530b57cec5SDimitry Andric static void GracefulExitHandler(int, siginfo_t *, void *) {
540b57cec5SDimitry Andric   Fuzzer::StaticGracefulExitCallback();
550b57cec5SDimitry Andric }
560b57cec5SDimitry Andric 
FileSizeExceedHandler(int,siginfo_t *,void *)570b57cec5SDimitry Andric static void FileSizeExceedHandler(int, siginfo_t *, void *) {
580b57cec5SDimitry Andric   Fuzzer::StaticFileSizeExceedCallback();
590b57cec5SDimitry Andric }
600b57cec5SDimitry Andric 
SetSigaction(int signum,void (* callback)(int,siginfo_t *,void *))610b57cec5SDimitry Andric static void SetSigaction(int signum,
620b57cec5SDimitry Andric                          void (*callback)(int, siginfo_t *, void *)) {
630b57cec5SDimitry Andric   struct sigaction sigact = {};
640b57cec5SDimitry Andric   if (sigaction(signum, nullptr, &sigact)) {
650b57cec5SDimitry Andric     Printf("libFuzzer: sigaction failed with %d\n", errno);
660b57cec5SDimitry Andric     exit(1);
670b57cec5SDimitry Andric   }
680b57cec5SDimitry Andric   if (sigact.sa_flags & SA_SIGINFO) {
690b57cec5SDimitry Andric     if (sigact.sa_sigaction) {
700b57cec5SDimitry Andric       if (signum != SIGSEGV)
710b57cec5SDimitry Andric         return;
720b57cec5SDimitry Andric       upstream_segv_handler = sigact.sa_sigaction;
730b57cec5SDimitry Andric     }
740b57cec5SDimitry Andric   } else {
750b57cec5SDimitry Andric     if (sigact.sa_handler != SIG_DFL && sigact.sa_handler != SIG_IGN &&
760b57cec5SDimitry Andric         sigact.sa_handler != SIG_ERR)
770b57cec5SDimitry Andric       return;
780b57cec5SDimitry Andric   }
790b57cec5SDimitry Andric 
80fe6060f1SDimitry Andric   struct sigaction new_sigact = {};
81fe6060f1SDimitry Andric   // Address sanitizer needs SA_ONSTACK (causing the signal handler to run on a
82fe6060f1SDimitry Andric   // dedicated stack) in order to be able to detect stack overflows; keep the
83fe6060f1SDimitry Andric   // flag if it's set.
84fe6060f1SDimitry Andric   new_sigact.sa_flags = SA_SIGINFO | (sigact.sa_flags & SA_ONSTACK);
85fe6060f1SDimitry Andric   new_sigact.sa_sigaction = callback;
86fe6060f1SDimitry Andric   if (sigaction(signum, &new_sigact, nullptr)) {
870b57cec5SDimitry Andric     Printf("libFuzzer: sigaction failed with %d\n", errno);
880b57cec5SDimitry Andric     exit(1);
890b57cec5SDimitry Andric   }
900b57cec5SDimitry Andric }
910b57cec5SDimitry Andric 
925ffd83dbSDimitry Andric // Return true on success, false otherwise.
ExecuteCommand(const Command & Cmd,std::string * CmdOutput)935ffd83dbSDimitry Andric bool ExecuteCommand(const Command &Cmd, std::string *CmdOutput) {
945ffd83dbSDimitry Andric   FILE *Pipe = popen(Cmd.toString().c_str(), "r");
955ffd83dbSDimitry Andric   if (!Pipe)
965ffd83dbSDimitry Andric     return false;
975ffd83dbSDimitry Andric 
985ffd83dbSDimitry Andric   if (CmdOutput) {
995ffd83dbSDimitry Andric     char TmpBuffer[128];
1005ffd83dbSDimitry Andric     while (fgets(TmpBuffer, sizeof(TmpBuffer), Pipe))
1015ffd83dbSDimitry Andric       CmdOutput->append(TmpBuffer);
1025ffd83dbSDimitry Andric   }
1035ffd83dbSDimitry Andric   return pclose(Pipe) == 0;
1045ffd83dbSDimitry Andric }
1055ffd83dbSDimitry Andric 
SetTimer(int Seconds)1060b57cec5SDimitry Andric void SetTimer(int Seconds) {
1070b57cec5SDimitry Andric   struct itimerval T {
1080b57cec5SDimitry Andric     {Seconds, 0}, { Seconds, 0 }
1090b57cec5SDimitry Andric   };
1100b57cec5SDimitry Andric   if (setitimer(ITIMER_REAL, &T, nullptr)) {
1110b57cec5SDimitry Andric     Printf("libFuzzer: setitimer failed with %d\n", errno);
1120b57cec5SDimitry Andric     exit(1);
1130b57cec5SDimitry Andric   }
1140b57cec5SDimitry Andric   SetSigaction(SIGALRM, AlarmHandler);
1150b57cec5SDimitry Andric }
1160b57cec5SDimitry Andric 
SetSignalHandler(const FuzzingOptions & Options)1170b57cec5SDimitry Andric void SetSignalHandler(const FuzzingOptions& Options) {
118480093f4SDimitry Andric   // setitimer is not implemented in emscripten.
119e8d8bef9SDimitry Andric   if (Options.HandleAlrm && Options.UnitTimeoutSec > 0 && !LIBFUZZER_EMSCRIPTEN)
1200b57cec5SDimitry Andric     SetTimer(Options.UnitTimeoutSec / 2 + 1);
1210b57cec5SDimitry Andric   if (Options.HandleInt)
1220b57cec5SDimitry Andric     SetSigaction(SIGINT, InterruptHandler);
1230b57cec5SDimitry Andric   if (Options.HandleTerm)
1240b57cec5SDimitry Andric     SetSigaction(SIGTERM, InterruptHandler);
1250b57cec5SDimitry Andric   if (Options.HandleSegv)
1260b57cec5SDimitry Andric     SetSigaction(SIGSEGV, SegvHandler);
1270b57cec5SDimitry Andric   if (Options.HandleBus)
1280b57cec5SDimitry Andric     SetSigaction(SIGBUS, CrashHandler);
1290b57cec5SDimitry Andric   if (Options.HandleAbrt)
1300b57cec5SDimitry Andric     SetSigaction(SIGABRT, CrashHandler);
1310b57cec5SDimitry Andric   if (Options.HandleIll)
1320b57cec5SDimitry Andric     SetSigaction(SIGILL, CrashHandler);
1330b57cec5SDimitry Andric   if (Options.HandleFpe)
1340b57cec5SDimitry Andric     SetSigaction(SIGFPE, CrashHandler);
1350b57cec5SDimitry Andric   if (Options.HandleXfsz)
1360b57cec5SDimitry Andric     SetSigaction(SIGXFSZ, FileSizeExceedHandler);
1370b57cec5SDimitry Andric   if (Options.HandleUsr1)
1380b57cec5SDimitry Andric     SetSigaction(SIGUSR1, GracefulExitHandler);
1390b57cec5SDimitry Andric   if (Options.HandleUsr2)
1400b57cec5SDimitry Andric     SetSigaction(SIGUSR2, GracefulExitHandler);
1410b57cec5SDimitry Andric }
1420b57cec5SDimitry Andric 
SleepSeconds(int Seconds)1430b57cec5SDimitry Andric void SleepSeconds(int Seconds) {
1440b57cec5SDimitry Andric   sleep(Seconds); // Use C API to avoid coverage from instrumented libc++.
1450b57cec5SDimitry Andric }
1460b57cec5SDimitry Andric 
GetPid()1470b57cec5SDimitry Andric unsigned long GetPid() { return (unsigned long)getpid(); }
1480b57cec5SDimitry Andric 
GetPeakRSSMb()1490b57cec5SDimitry Andric size_t GetPeakRSSMb() {
1500b57cec5SDimitry Andric   struct rusage usage;
1510b57cec5SDimitry Andric   if (getrusage(RUSAGE_SELF, &usage))
1520b57cec5SDimitry Andric     return 0;
1530b57cec5SDimitry Andric   if (LIBFUZZER_LINUX || LIBFUZZER_FREEBSD || LIBFUZZER_NETBSD ||
154e8d8bef9SDimitry Andric       LIBFUZZER_EMSCRIPTEN) {
1550b57cec5SDimitry Andric     // ru_maxrss is in KiB
1560b57cec5SDimitry Andric     return usage.ru_maxrss >> 10;
1570b57cec5SDimitry Andric   } else if (LIBFUZZER_APPLE) {
1580b57cec5SDimitry Andric     // ru_maxrss is in bytes
1590b57cec5SDimitry Andric     return usage.ru_maxrss >> 20;
1600b57cec5SDimitry Andric   }
1610b57cec5SDimitry Andric   assert(0 && "GetPeakRSSMb() is not implemented for your platform");
1620b57cec5SDimitry Andric   return 0;
1630b57cec5SDimitry Andric }
1640b57cec5SDimitry Andric 
OpenProcessPipe(const char * Command,const char * Mode)1650b57cec5SDimitry Andric FILE *OpenProcessPipe(const char *Command, const char *Mode) {
1660b57cec5SDimitry Andric   return popen(Command, Mode);
1670b57cec5SDimitry Andric }
1680b57cec5SDimitry Andric 
CloseProcessPipe(FILE * F)1695ffd83dbSDimitry Andric int CloseProcessPipe(FILE *F) {
1705ffd83dbSDimitry Andric   return pclose(F);
1715ffd83dbSDimitry Andric }
1725ffd83dbSDimitry Andric 
SearchMemory(const void * Data,size_t DataLen,const void * Patt,size_t PattLen)1730b57cec5SDimitry Andric const void *SearchMemory(const void *Data, size_t DataLen, const void *Patt,
1740b57cec5SDimitry Andric                          size_t PattLen) {
1750b57cec5SDimitry Andric   return memmem(Data, DataLen, Patt, PattLen);
1760b57cec5SDimitry Andric }
1770b57cec5SDimitry Andric 
DisassembleCmd(const std::string & FileName)1780b57cec5SDimitry Andric std::string DisassembleCmd(const std::string &FileName) {
1790b57cec5SDimitry Andric   return "objdump -d " + FileName;
1800b57cec5SDimitry Andric }
1810b57cec5SDimitry Andric 
SearchRegexCmd(const std::string & Regex)1820b57cec5SDimitry Andric std::string SearchRegexCmd(const std::string &Regex) {
1830b57cec5SDimitry Andric   return "grep '" + Regex + "'";
1840b57cec5SDimitry Andric }
1850b57cec5SDimitry Andric 
PageSize()186*06c3fb27SDimitry Andric size_t PageSize() {
187*06c3fb27SDimitry Andric   static size_t PageSizeCached = sysconf(_SC_PAGESIZE);
188*06c3fb27SDimitry Andric   return PageSizeCached;
189*06c3fb27SDimitry Andric }
190*06c3fb27SDimitry Andric 
1910b57cec5SDimitry Andric }  // namespace fuzzer
1920b57cec5SDimitry Andric 
1930b57cec5SDimitry Andric #endif // LIBFUZZER_POSIX
194