Path: blob/main/contrib/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtilPosix.cpp
35262 views
//===- FuzzerUtilPosix.cpp - Misc utils for Posix. ------------------------===//1//2// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.3// See https://llvm.org/LICENSE.txt for license information.4// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception5//6//===----------------------------------------------------------------------===//7// Misc utils implementation using Posix API.8//===----------------------------------------------------------------------===//9#include "FuzzerPlatform.h"10#if LIBFUZZER_POSIX11#include "FuzzerIO.h"12#include "FuzzerInternal.h"13#include "FuzzerTracePC.h"14#include <cassert>15#include <chrono>16#include <cstring>17#include <errno.h>18#include <iomanip>19#include <signal.h>20#include <stdio.h>21#include <sys/mman.h>22#include <sys/resource.h>23#include <sys/syscall.h>24#include <sys/time.h>25#include <sys/types.h>26#include <thread>27#include <unistd.h>2829namespace fuzzer {3031static void AlarmHandler(int, siginfo_t *, void *) {32Fuzzer::StaticAlarmCallback();33}3435static void (*upstream_segv_handler)(int, siginfo_t *, void *);3637static void SegvHandler(int sig, siginfo_t *si, void *ucontext) {38assert(si->si_signo == SIGSEGV);39if (upstream_segv_handler)40return upstream_segv_handler(sig, si, ucontext);41Fuzzer::StaticCrashSignalCallback();42}4344static void CrashHandler(int, siginfo_t *, void *) {45Fuzzer::StaticCrashSignalCallback();46}4748static void InterruptHandler(int, siginfo_t *, void *) {49Fuzzer::StaticInterruptCallback();50}5152static void GracefulExitHandler(int, siginfo_t *, void *) {53Fuzzer::StaticGracefulExitCallback();54}5556static void FileSizeExceedHandler(int, siginfo_t *, void *) {57Fuzzer::StaticFileSizeExceedCallback();58}5960static void SetSigaction(int signum,61void (*callback)(int, siginfo_t *, void *)) {62struct sigaction sigact = {};63if (sigaction(signum, nullptr, &sigact)) {64Printf("libFuzzer: sigaction failed with %d\n", errno);65exit(1);66}67if (sigact.sa_flags & SA_SIGINFO) {68if (sigact.sa_sigaction) {69if (signum != SIGSEGV)70return;71upstream_segv_handler = sigact.sa_sigaction;72}73} else {74if (sigact.sa_handler != SIG_DFL && sigact.sa_handler != SIG_IGN &&75sigact.sa_handler != SIG_ERR)76return;77}7879struct sigaction new_sigact = {};80// Address sanitizer needs SA_ONSTACK (causing the signal handler to run on a81// dedicated stack) in order to be able to detect stack overflows; keep the82// flag if it's set.83new_sigact.sa_flags = SA_SIGINFO | (sigact.sa_flags & SA_ONSTACK);84new_sigact.sa_sigaction = callback;85if (sigaction(signum, &new_sigact, nullptr)) {86Printf("libFuzzer: sigaction failed with %d\n", errno);87exit(1);88}89}9091// Return true on success, false otherwise.92bool ExecuteCommand(const Command &Cmd, std::string *CmdOutput) {93FILE *Pipe = popen(Cmd.toString().c_str(), "r");94if (!Pipe)95return false;9697if (CmdOutput) {98char TmpBuffer[128];99while (fgets(TmpBuffer, sizeof(TmpBuffer), Pipe))100CmdOutput->append(TmpBuffer);101}102return pclose(Pipe) == 0;103}104105void SetTimer(int Seconds) {106struct itimerval T {107{Seconds, 0}, { Seconds, 0 }108};109if (setitimer(ITIMER_REAL, &T, nullptr)) {110Printf("libFuzzer: setitimer failed with %d\n", errno);111exit(1);112}113SetSigaction(SIGALRM, AlarmHandler);114}115116void SetSignalHandler(const FuzzingOptions& Options) {117// setitimer is not implemented in emscripten.118if (Options.HandleAlrm && Options.UnitTimeoutSec > 0 && !LIBFUZZER_EMSCRIPTEN)119SetTimer(Options.UnitTimeoutSec / 2 + 1);120if (Options.HandleInt)121SetSigaction(SIGINT, InterruptHandler);122if (Options.HandleTerm)123SetSigaction(SIGTERM, InterruptHandler);124if (Options.HandleSegv)125SetSigaction(SIGSEGV, SegvHandler);126if (Options.HandleBus)127SetSigaction(SIGBUS, CrashHandler);128if (Options.HandleAbrt)129SetSigaction(SIGABRT, CrashHandler);130if (Options.HandleIll)131SetSigaction(SIGILL, CrashHandler);132if (Options.HandleFpe)133SetSigaction(SIGFPE, CrashHandler);134if (Options.HandleXfsz)135SetSigaction(SIGXFSZ, FileSizeExceedHandler);136if (Options.HandleUsr1)137SetSigaction(SIGUSR1, GracefulExitHandler);138if (Options.HandleUsr2)139SetSigaction(SIGUSR2, GracefulExitHandler);140}141142void SleepSeconds(int Seconds) {143sleep(Seconds); // Use C API to avoid coverage from instrumented libc++.144}145146unsigned long GetPid() { return (unsigned long)getpid(); }147148size_t GetPeakRSSMb() {149struct rusage usage;150if (getrusage(RUSAGE_SELF, &usage))151return 0;152if (LIBFUZZER_LINUX || LIBFUZZER_FREEBSD || LIBFUZZER_NETBSD ||153LIBFUZZER_EMSCRIPTEN) {154// ru_maxrss is in KiB155return usage.ru_maxrss >> 10;156} else if (LIBFUZZER_APPLE) {157// ru_maxrss is in bytes158return usage.ru_maxrss >> 20;159}160assert(0 && "GetPeakRSSMb() is not implemented for your platform");161return 0;162}163164FILE *OpenProcessPipe(const char *Command, const char *Mode) {165return popen(Command, Mode);166}167168int CloseProcessPipe(FILE *F) {169return pclose(F);170}171172const void *SearchMemory(const void *Data, size_t DataLen, const void *Patt,173size_t PattLen) {174return memmem(Data, DataLen, Patt, PattLen);175}176177std::string DisassembleCmd(const std::string &FileName) {178return "objdump -d " + FileName;179}180181std::string SearchRegexCmd(const std::string &Regex) {182return "grep '" + Regex + "'";183}184185size_t PageSize() {186static size_t PageSizeCached = sysconf(_SC_PAGESIZE);187return PageSizeCached;188}189190} // namespace fuzzer191192#endif // LIBFUZZER_POSIX193194195