1*0b57cec5SDimitry Andric //===- FuzzerUtilFuchsia.cpp - Misc utils for Fuchsia. --------------------===// 2*0b57cec5SDimitry Andric // 3*0b57cec5SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4*0b57cec5SDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 5*0b57cec5SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6*0b57cec5SDimitry Andric // 7*0b57cec5SDimitry Andric //===----------------------------------------------------------------------===// 8*0b57cec5SDimitry Andric // Misc utils implementation using Fuchsia/Zircon APIs. 9*0b57cec5SDimitry Andric //===----------------------------------------------------------------------===// 10*0b57cec5SDimitry Andric #include "FuzzerDefs.h" 11*0b57cec5SDimitry Andric 12*0b57cec5SDimitry Andric #if LIBFUZZER_FUCHSIA 13*0b57cec5SDimitry Andric 14*0b57cec5SDimitry Andric #include "FuzzerInternal.h" 15*0b57cec5SDimitry Andric #include "FuzzerUtil.h" 16*0b57cec5SDimitry Andric #include <cassert> 17*0b57cec5SDimitry Andric #include <cerrno> 18*0b57cec5SDimitry Andric #include <cinttypes> 19*0b57cec5SDimitry Andric #include <cstdint> 20*0b57cec5SDimitry Andric #include <fcntl.h> 21*0b57cec5SDimitry Andric #include <lib/fdio/spawn.h> 22*0b57cec5SDimitry Andric #include <string> 23*0b57cec5SDimitry Andric #include <sys/select.h> 24*0b57cec5SDimitry Andric #include <thread> 25*0b57cec5SDimitry Andric #include <unistd.h> 26*0b57cec5SDimitry Andric #include <zircon/errors.h> 27*0b57cec5SDimitry Andric #include <zircon/process.h> 28*0b57cec5SDimitry Andric #include <zircon/sanitizer.h> 29*0b57cec5SDimitry Andric #include <zircon/status.h> 30*0b57cec5SDimitry Andric #include <zircon/syscalls.h> 31*0b57cec5SDimitry Andric #include <zircon/syscalls/debug.h> 32*0b57cec5SDimitry Andric #include <zircon/syscalls/exception.h> 33*0b57cec5SDimitry Andric #include <zircon/syscalls/object.h> 34*0b57cec5SDimitry Andric #include <zircon/types.h> 35*0b57cec5SDimitry Andric 36*0b57cec5SDimitry Andric namespace fuzzer { 37*0b57cec5SDimitry Andric 38*0b57cec5SDimitry Andric // Given that Fuchsia doesn't have the POSIX signals that libFuzzer was written 39*0b57cec5SDimitry Andric // around, the general approach is to spin up dedicated threads to watch for 40*0b57cec5SDimitry Andric // each requested condition (alarm, interrupt, crash). Of these, the crash 41*0b57cec5SDimitry Andric // handler is the most involved, as it requires resuming the crashed thread in 42*0b57cec5SDimitry Andric // order to invoke the sanitizers to get the needed state. 43*0b57cec5SDimitry Andric 44*0b57cec5SDimitry Andric // Forward declaration of assembly trampoline needed to resume crashed threads. 45*0b57cec5SDimitry Andric // This appears to have external linkage to C++, which is why it's not in the 46*0b57cec5SDimitry Andric // anonymous namespace. The assembly definition inside MakeTrampoline() 47*0b57cec5SDimitry Andric // actually defines the symbol with internal linkage only. 48*0b57cec5SDimitry Andric void CrashTrampolineAsm() __asm__("CrashTrampolineAsm"); 49*0b57cec5SDimitry Andric 50*0b57cec5SDimitry Andric namespace { 51*0b57cec5SDimitry Andric 52*0b57cec5SDimitry Andric // Helper function to handle Zircon syscall failures. 53*0b57cec5SDimitry Andric void ExitOnErr(zx_status_t Status, const char *Syscall) { 54*0b57cec5SDimitry Andric if (Status != ZX_OK) { 55*0b57cec5SDimitry Andric Printf("libFuzzer: %s failed: %s\n", Syscall, 56*0b57cec5SDimitry Andric _zx_status_get_string(Status)); 57*0b57cec5SDimitry Andric exit(1); 58*0b57cec5SDimitry Andric } 59*0b57cec5SDimitry Andric } 60*0b57cec5SDimitry Andric 61*0b57cec5SDimitry Andric void AlarmHandler(int Seconds) { 62*0b57cec5SDimitry Andric while (true) { 63*0b57cec5SDimitry Andric SleepSeconds(Seconds); 64*0b57cec5SDimitry Andric Fuzzer::StaticAlarmCallback(); 65*0b57cec5SDimitry Andric } 66*0b57cec5SDimitry Andric } 67*0b57cec5SDimitry Andric 68*0b57cec5SDimitry Andric void InterruptHandler() { 69*0b57cec5SDimitry Andric fd_set readfds; 70*0b57cec5SDimitry Andric // Ctrl-C sends ETX in Zircon. 71*0b57cec5SDimitry Andric do { 72*0b57cec5SDimitry Andric FD_ZERO(&readfds); 73*0b57cec5SDimitry Andric FD_SET(STDIN_FILENO, &readfds); 74*0b57cec5SDimitry Andric select(STDIN_FILENO + 1, &readfds, nullptr, nullptr, nullptr); 75*0b57cec5SDimitry Andric } while(!FD_ISSET(STDIN_FILENO, &readfds) || getchar() != 0x03); 76*0b57cec5SDimitry Andric Fuzzer::StaticInterruptCallback(); 77*0b57cec5SDimitry Andric } 78*0b57cec5SDimitry Andric 79*0b57cec5SDimitry Andric // For the crash handler, we need to call Fuzzer::StaticCrashSignalCallback 80*0b57cec5SDimitry Andric // without POSIX signal handlers. To achieve this, we use an assembly function 81*0b57cec5SDimitry Andric // to add the necessary CFI unwinding information and a C function to bridge 82*0b57cec5SDimitry Andric // from that back into C++. 83*0b57cec5SDimitry Andric 84*0b57cec5SDimitry Andric // FIXME: This works as a short-term solution, but this code really shouldn't be 85*0b57cec5SDimitry Andric // architecture dependent. A better long term solution is to implement remote 86*0b57cec5SDimitry Andric // unwinding and expose the necessary APIs through sanitizer_common and/or ASAN 87*0b57cec5SDimitry Andric // to allow the exception handling thread to gather the crash state directly. 88*0b57cec5SDimitry Andric // 89*0b57cec5SDimitry Andric // Alternatively, Fuchsia may in future actually implement basic signal 90*0b57cec5SDimitry Andric // handling for the machine trap signals. 91*0b57cec5SDimitry Andric #if defined(__x86_64__) 92*0b57cec5SDimitry Andric #define FOREACH_REGISTER(OP_REG, OP_NUM) \ 93*0b57cec5SDimitry Andric OP_REG(rax) \ 94*0b57cec5SDimitry Andric OP_REG(rbx) \ 95*0b57cec5SDimitry Andric OP_REG(rcx) \ 96*0b57cec5SDimitry Andric OP_REG(rdx) \ 97*0b57cec5SDimitry Andric OP_REG(rsi) \ 98*0b57cec5SDimitry Andric OP_REG(rdi) \ 99*0b57cec5SDimitry Andric OP_REG(rbp) \ 100*0b57cec5SDimitry Andric OP_REG(rsp) \ 101*0b57cec5SDimitry Andric OP_REG(r8) \ 102*0b57cec5SDimitry Andric OP_REG(r9) \ 103*0b57cec5SDimitry Andric OP_REG(r10) \ 104*0b57cec5SDimitry Andric OP_REG(r11) \ 105*0b57cec5SDimitry Andric OP_REG(r12) \ 106*0b57cec5SDimitry Andric OP_REG(r13) \ 107*0b57cec5SDimitry Andric OP_REG(r14) \ 108*0b57cec5SDimitry Andric OP_REG(r15) \ 109*0b57cec5SDimitry Andric OP_REG(rip) 110*0b57cec5SDimitry Andric 111*0b57cec5SDimitry Andric #elif defined(__aarch64__) 112*0b57cec5SDimitry Andric #define FOREACH_REGISTER(OP_REG, OP_NUM) \ 113*0b57cec5SDimitry Andric OP_NUM(0) \ 114*0b57cec5SDimitry Andric OP_NUM(1) \ 115*0b57cec5SDimitry Andric OP_NUM(2) \ 116*0b57cec5SDimitry Andric OP_NUM(3) \ 117*0b57cec5SDimitry Andric OP_NUM(4) \ 118*0b57cec5SDimitry Andric OP_NUM(5) \ 119*0b57cec5SDimitry Andric OP_NUM(6) \ 120*0b57cec5SDimitry Andric OP_NUM(7) \ 121*0b57cec5SDimitry Andric OP_NUM(8) \ 122*0b57cec5SDimitry Andric OP_NUM(9) \ 123*0b57cec5SDimitry Andric OP_NUM(10) \ 124*0b57cec5SDimitry Andric OP_NUM(11) \ 125*0b57cec5SDimitry Andric OP_NUM(12) \ 126*0b57cec5SDimitry Andric OP_NUM(13) \ 127*0b57cec5SDimitry Andric OP_NUM(14) \ 128*0b57cec5SDimitry Andric OP_NUM(15) \ 129*0b57cec5SDimitry Andric OP_NUM(16) \ 130*0b57cec5SDimitry Andric OP_NUM(17) \ 131*0b57cec5SDimitry Andric OP_NUM(18) \ 132*0b57cec5SDimitry Andric OP_NUM(19) \ 133*0b57cec5SDimitry Andric OP_NUM(20) \ 134*0b57cec5SDimitry Andric OP_NUM(21) \ 135*0b57cec5SDimitry Andric OP_NUM(22) \ 136*0b57cec5SDimitry Andric OP_NUM(23) \ 137*0b57cec5SDimitry Andric OP_NUM(24) \ 138*0b57cec5SDimitry Andric OP_NUM(25) \ 139*0b57cec5SDimitry Andric OP_NUM(26) \ 140*0b57cec5SDimitry Andric OP_NUM(27) \ 141*0b57cec5SDimitry Andric OP_NUM(28) \ 142*0b57cec5SDimitry Andric OP_NUM(29) \ 143*0b57cec5SDimitry Andric OP_NUM(30) \ 144*0b57cec5SDimitry Andric OP_REG(sp) 145*0b57cec5SDimitry Andric 146*0b57cec5SDimitry Andric #else 147*0b57cec5SDimitry Andric #error "Unsupported architecture for fuzzing on Fuchsia" 148*0b57cec5SDimitry Andric #endif 149*0b57cec5SDimitry Andric 150*0b57cec5SDimitry Andric // Produces a CFI directive for the named or numbered register. 151*0b57cec5SDimitry Andric #define CFI_OFFSET_REG(reg) ".cfi_offset " #reg ", %c[" #reg "]\n" 152*0b57cec5SDimitry Andric #define CFI_OFFSET_NUM(num) CFI_OFFSET_REG(r##num) 153*0b57cec5SDimitry Andric 154*0b57cec5SDimitry Andric // Produces an assembler input operand for the named or numbered register. 155*0b57cec5SDimitry Andric #define ASM_OPERAND_REG(reg) \ 156*0b57cec5SDimitry Andric [reg] "i"(offsetof(zx_thread_state_general_regs_t, reg)), 157*0b57cec5SDimitry Andric #define ASM_OPERAND_NUM(num) \ 158*0b57cec5SDimitry Andric [r##num] "i"(offsetof(zx_thread_state_general_regs_t, r[num])), 159*0b57cec5SDimitry Andric 160*0b57cec5SDimitry Andric // Trampoline to bridge from the assembly below to the static C++ crash 161*0b57cec5SDimitry Andric // callback. 162*0b57cec5SDimitry Andric __attribute__((noreturn)) 163*0b57cec5SDimitry Andric static void StaticCrashHandler() { 164*0b57cec5SDimitry Andric Fuzzer::StaticCrashSignalCallback(); 165*0b57cec5SDimitry Andric for (;;) { 166*0b57cec5SDimitry Andric _Exit(1); 167*0b57cec5SDimitry Andric } 168*0b57cec5SDimitry Andric } 169*0b57cec5SDimitry Andric 170*0b57cec5SDimitry Andric // Creates the trampoline with the necessary CFI information to unwind through 171*0b57cec5SDimitry Andric // to the crashing call stack. The attribute is necessary because the function 172*0b57cec5SDimitry Andric // is never called; it's just a container around the assembly to allow it to 173*0b57cec5SDimitry Andric // use operands for compile-time computed constants. 174*0b57cec5SDimitry Andric __attribute__((used)) 175*0b57cec5SDimitry Andric void MakeTrampoline() { 176*0b57cec5SDimitry Andric __asm__(".cfi_endproc\n" 177*0b57cec5SDimitry Andric ".pushsection .text.CrashTrampolineAsm\n" 178*0b57cec5SDimitry Andric ".type CrashTrampolineAsm,STT_FUNC\n" 179*0b57cec5SDimitry Andric "CrashTrampolineAsm:\n" 180*0b57cec5SDimitry Andric ".cfi_startproc simple\n" 181*0b57cec5SDimitry Andric ".cfi_signal_frame\n" 182*0b57cec5SDimitry Andric #if defined(__x86_64__) 183*0b57cec5SDimitry Andric ".cfi_return_column rip\n" 184*0b57cec5SDimitry Andric ".cfi_def_cfa rsp, 0\n" 185*0b57cec5SDimitry Andric FOREACH_REGISTER(CFI_OFFSET_REG, CFI_OFFSET_NUM) 186*0b57cec5SDimitry Andric "call %c[StaticCrashHandler]\n" 187*0b57cec5SDimitry Andric "ud2\n" 188*0b57cec5SDimitry Andric #elif defined(__aarch64__) 189*0b57cec5SDimitry Andric ".cfi_return_column 33\n" 190*0b57cec5SDimitry Andric ".cfi_def_cfa sp, 0\n" 191*0b57cec5SDimitry Andric ".cfi_offset 33, %c[pc]\n" 192*0b57cec5SDimitry Andric FOREACH_REGISTER(CFI_OFFSET_REG, CFI_OFFSET_NUM) 193*0b57cec5SDimitry Andric "bl %[StaticCrashHandler]\n" 194*0b57cec5SDimitry Andric #else 195*0b57cec5SDimitry Andric #error "Unsupported architecture for fuzzing on Fuchsia" 196*0b57cec5SDimitry Andric #endif 197*0b57cec5SDimitry Andric ".cfi_endproc\n" 198*0b57cec5SDimitry Andric ".size CrashTrampolineAsm, . - CrashTrampolineAsm\n" 199*0b57cec5SDimitry Andric ".popsection\n" 200*0b57cec5SDimitry Andric ".cfi_startproc\n" 201*0b57cec5SDimitry Andric : // No outputs 202*0b57cec5SDimitry Andric : FOREACH_REGISTER(ASM_OPERAND_REG, ASM_OPERAND_NUM) 203*0b57cec5SDimitry Andric #if defined(__aarch64__) 204*0b57cec5SDimitry Andric ASM_OPERAND_REG(pc) 205*0b57cec5SDimitry Andric #endif 206*0b57cec5SDimitry Andric [StaticCrashHandler] "i" (StaticCrashHandler)); 207*0b57cec5SDimitry Andric } 208*0b57cec5SDimitry Andric 209*0b57cec5SDimitry Andric void CrashHandler(zx_handle_t *Event) { 210*0b57cec5SDimitry Andric // This structure is used to ensure we close handles to objects we create in 211*0b57cec5SDimitry Andric // this handler. 212*0b57cec5SDimitry Andric struct ScopedHandle { 213*0b57cec5SDimitry Andric ~ScopedHandle() { _zx_handle_close(Handle); } 214*0b57cec5SDimitry Andric zx_handle_t Handle = ZX_HANDLE_INVALID; 215*0b57cec5SDimitry Andric }; 216*0b57cec5SDimitry Andric 217*0b57cec5SDimitry Andric // Create the exception channel. We need to claim to be a "debugger" so the 218*0b57cec5SDimitry Andric // kernel will allow us to modify and resume dying threads (see below). Once 219*0b57cec5SDimitry Andric // the channel is set, we can signal the main thread to continue and wait 220*0b57cec5SDimitry Andric // for the exception to arrive. 221*0b57cec5SDimitry Andric ScopedHandle Channel; 222*0b57cec5SDimitry Andric zx_handle_t Self = _zx_process_self(); 223*0b57cec5SDimitry Andric ExitOnErr(_zx_task_create_exception_channel( 224*0b57cec5SDimitry Andric Self, ZX_EXCEPTION_CHANNEL_DEBUGGER, &Channel.Handle), 225*0b57cec5SDimitry Andric "_zx_task_create_exception_channel"); 226*0b57cec5SDimitry Andric 227*0b57cec5SDimitry Andric ExitOnErr(_zx_object_signal(*Event, 0, ZX_USER_SIGNAL_0), 228*0b57cec5SDimitry Andric "_zx_object_signal"); 229*0b57cec5SDimitry Andric 230*0b57cec5SDimitry Andric // This thread lives as long as the process in order to keep handling 231*0b57cec5SDimitry Andric // crashes. In practice, the first crashed thread to reach the end of the 232*0b57cec5SDimitry Andric // StaticCrashHandler will end the process. 233*0b57cec5SDimitry Andric while (true) { 234*0b57cec5SDimitry Andric ExitOnErr(_zx_object_wait_one(Channel.Handle, ZX_CHANNEL_READABLE, 235*0b57cec5SDimitry Andric ZX_TIME_INFINITE, nullptr), 236*0b57cec5SDimitry Andric "_zx_object_wait_one"); 237*0b57cec5SDimitry Andric 238*0b57cec5SDimitry Andric zx_exception_info_t ExceptionInfo; 239*0b57cec5SDimitry Andric ScopedHandle Exception; 240*0b57cec5SDimitry Andric ExitOnErr(_zx_channel_read(Channel.Handle, 0, &ExceptionInfo, 241*0b57cec5SDimitry Andric &Exception.Handle, sizeof(ExceptionInfo), 1, 242*0b57cec5SDimitry Andric nullptr, nullptr), 243*0b57cec5SDimitry Andric "_zx_channel_read"); 244*0b57cec5SDimitry Andric 245*0b57cec5SDimitry Andric // Ignore informational synthetic exceptions. 246*0b57cec5SDimitry Andric if (ZX_EXCP_THREAD_STARTING == ExceptionInfo.type || 247*0b57cec5SDimitry Andric ZX_EXCP_THREAD_EXITING == ExceptionInfo.type || 248*0b57cec5SDimitry Andric ZX_EXCP_PROCESS_STARTING == ExceptionInfo.type) { 249*0b57cec5SDimitry Andric continue; 250*0b57cec5SDimitry Andric } 251*0b57cec5SDimitry Andric 252*0b57cec5SDimitry Andric // At this point, we want to get the state of the crashing thread, but 253*0b57cec5SDimitry Andric // libFuzzer and the sanitizers assume this will happen from that same 254*0b57cec5SDimitry Andric // thread via a POSIX signal handler. "Resurrecting" the thread in the 255*0b57cec5SDimitry Andric // middle of the appropriate callback is as simple as forcibly setting the 256*0b57cec5SDimitry Andric // instruction pointer/program counter, provided we NEVER EVER return from 257*0b57cec5SDimitry Andric // that function (since otherwise our stack will not be valid). 258*0b57cec5SDimitry Andric ScopedHandle Thread; 259*0b57cec5SDimitry Andric ExitOnErr(_zx_exception_get_thread(Exception.Handle, &Thread.Handle), 260*0b57cec5SDimitry Andric "_zx_exception_get_thread"); 261*0b57cec5SDimitry Andric 262*0b57cec5SDimitry Andric zx_thread_state_general_regs_t GeneralRegisters; 263*0b57cec5SDimitry Andric ExitOnErr(_zx_thread_read_state(Thread.Handle, ZX_THREAD_STATE_GENERAL_REGS, 264*0b57cec5SDimitry Andric &GeneralRegisters, 265*0b57cec5SDimitry Andric sizeof(GeneralRegisters)), 266*0b57cec5SDimitry Andric "_zx_thread_read_state"); 267*0b57cec5SDimitry Andric 268*0b57cec5SDimitry Andric // To unwind properly, we need to push the crashing thread's register state 269*0b57cec5SDimitry Andric // onto the stack and jump into a trampoline with CFI instructions on how 270*0b57cec5SDimitry Andric // to restore it. 271*0b57cec5SDimitry Andric #if defined(__x86_64__) 272*0b57cec5SDimitry Andric uintptr_t StackPtr = 273*0b57cec5SDimitry Andric (GeneralRegisters.rsp - (128 + sizeof(GeneralRegisters))) & 274*0b57cec5SDimitry Andric -(uintptr_t)16; 275*0b57cec5SDimitry Andric __unsanitized_memcpy(reinterpret_cast<void *>(StackPtr), &GeneralRegisters, 276*0b57cec5SDimitry Andric sizeof(GeneralRegisters)); 277*0b57cec5SDimitry Andric GeneralRegisters.rsp = StackPtr; 278*0b57cec5SDimitry Andric GeneralRegisters.rip = reinterpret_cast<zx_vaddr_t>(CrashTrampolineAsm); 279*0b57cec5SDimitry Andric 280*0b57cec5SDimitry Andric #elif defined(__aarch64__) 281*0b57cec5SDimitry Andric uintptr_t StackPtr = 282*0b57cec5SDimitry Andric (GeneralRegisters.sp - sizeof(GeneralRegisters)) & -(uintptr_t)16; 283*0b57cec5SDimitry Andric __unsanitized_memcpy(reinterpret_cast<void *>(StackPtr), &GeneralRegisters, 284*0b57cec5SDimitry Andric sizeof(GeneralRegisters)); 285*0b57cec5SDimitry Andric GeneralRegisters.sp = StackPtr; 286*0b57cec5SDimitry Andric GeneralRegisters.pc = reinterpret_cast<zx_vaddr_t>(CrashTrampolineAsm); 287*0b57cec5SDimitry Andric 288*0b57cec5SDimitry Andric #else 289*0b57cec5SDimitry Andric #error "Unsupported architecture for fuzzing on Fuchsia" 290*0b57cec5SDimitry Andric #endif 291*0b57cec5SDimitry Andric 292*0b57cec5SDimitry Andric // Now force the crashing thread's state. 293*0b57cec5SDimitry Andric ExitOnErr( 294*0b57cec5SDimitry Andric _zx_thread_write_state(Thread.Handle, ZX_THREAD_STATE_GENERAL_REGS, 295*0b57cec5SDimitry Andric &GeneralRegisters, sizeof(GeneralRegisters)), 296*0b57cec5SDimitry Andric "_zx_thread_write_state"); 297*0b57cec5SDimitry Andric 298*0b57cec5SDimitry Andric // Set the exception to HANDLED so it resumes the thread on close. 299*0b57cec5SDimitry Andric uint32_t ExceptionState = ZX_EXCEPTION_STATE_HANDLED; 300*0b57cec5SDimitry Andric ExitOnErr(_zx_object_set_property(Exception.Handle, ZX_PROP_EXCEPTION_STATE, 301*0b57cec5SDimitry Andric &ExceptionState, sizeof(ExceptionState)), 302*0b57cec5SDimitry Andric "zx_object_set_property"); 303*0b57cec5SDimitry Andric } 304*0b57cec5SDimitry Andric } 305*0b57cec5SDimitry Andric 306*0b57cec5SDimitry Andric } // namespace 307*0b57cec5SDimitry Andric 308*0b57cec5SDimitry Andric bool Mprotect(void *Ptr, size_t Size, bool AllowReadWrite) { 309*0b57cec5SDimitry Andric return false; // UNIMPLEMENTED 310*0b57cec5SDimitry Andric } 311*0b57cec5SDimitry Andric 312*0b57cec5SDimitry Andric // Platform specific functions. 313*0b57cec5SDimitry Andric void SetSignalHandler(const FuzzingOptions &Options) { 314*0b57cec5SDimitry Andric // Set up alarm handler if needed. 315*0b57cec5SDimitry Andric if (Options.UnitTimeoutSec > 0) { 316*0b57cec5SDimitry Andric std::thread T(AlarmHandler, Options.UnitTimeoutSec / 2 + 1); 317*0b57cec5SDimitry Andric T.detach(); 318*0b57cec5SDimitry Andric } 319*0b57cec5SDimitry Andric 320*0b57cec5SDimitry Andric // Set up interrupt handler if needed. 321*0b57cec5SDimitry Andric if (Options.HandleInt || Options.HandleTerm) { 322*0b57cec5SDimitry Andric std::thread T(InterruptHandler); 323*0b57cec5SDimitry Andric T.detach(); 324*0b57cec5SDimitry Andric } 325*0b57cec5SDimitry Andric 326*0b57cec5SDimitry Andric // Early exit if no crash handler needed. 327*0b57cec5SDimitry Andric if (!Options.HandleSegv && !Options.HandleBus && !Options.HandleIll && 328*0b57cec5SDimitry Andric !Options.HandleFpe && !Options.HandleAbrt) 329*0b57cec5SDimitry Andric return; 330*0b57cec5SDimitry Andric 331*0b57cec5SDimitry Andric // Set up the crash handler and wait until it is ready before proceeding. 332*0b57cec5SDimitry Andric zx_handle_t Event; 333*0b57cec5SDimitry Andric ExitOnErr(_zx_event_create(0, &Event), "_zx_event_create"); 334*0b57cec5SDimitry Andric 335*0b57cec5SDimitry Andric std::thread T(CrashHandler, &Event); 336*0b57cec5SDimitry Andric zx_status_t Status = 337*0b57cec5SDimitry Andric _zx_object_wait_one(Event, ZX_USER_SIGNAL_0, ZX_TIME_INFINITE, nullptr); 338*0b57cec5SDimitry Andric _zx_handle_close(Event); 339*0b57cec5SDimitry Andric ExitOnErr(Status, "_zx_object_wait_one"); 340*0b57cec5SDimitry Andric 341*0b57cec5SDimitry Andric T.detach(); 342*0b57cec5SDimitry Andric } 343*0b57cec5SDimitry Andric 344*0b57cec5SDimitry Andric void SleepSeconds(int Seconds) { 345*0b57cec5SDimitry Andric _zx_nanosleep(_zx_deadline_after(ZX_SEC(Seconds))); 346*0b57cec5SDimitry Andric } 347*0b57cec5SDimitry Andric 348*0b57cec5SDimitry Andric unsigned long GetPid() { 349*0b57cec5SDimitry Andric zx_status_t rc; 350*0b57cec5SDimitry Andric zx_info_handle_basic_t Info; 351*0b57cec5SDimitry Andric if ((rc = _zx_object_get_info(_zx_process_self(), ZX_INFO_HANDLE_BASIC, &Info, 352*0b57cec5SDimitry Andric sizeof(Info), NULL, NULL)) != ZX_OK) { 353*0b57cec5SDimitry Andric Printf("libFuzzer: unable to get info about self: %s\n", 354*0b57cec5SDimitry Andric _zx_status_get_string(rc)); 355*0b57cec5SDimitry Andric exit(1); 356*0b57cec5SDimitry Andric } 357*0b57cec5SDimitry Andric return Info.koid; 358*0b57cec5SDimitry Andric } 359*0b57cec5SDimitry Andric 360*0b57cec5SDimitry Andric size_t GetPeakRSSMb() { 361*0b57cec5SDimitry Andric zx_status_t rc; 362*0b57cec5SDimitry Andric zx_info_task_stats_t Info; 363*0b57cec5SDimitry Andric if ((rc = _zx_object_get_info(_zx_process_self(), ZX_INFO_TASK_STATS, &Info, 364*0b57cec5SDimitry Andric sizeof(Info), NULL, NULL)) != ZX_OK) { 365*0b57cec5SDimitry Andric Printf("libFuzzer: unable to get info about self: %s\n", 366*0b57cec5SDimitry Andric _zx_status_get_string(rc)); 367*0b57cec5SDimitry Andric exit(1); 368*0b57cec5SDimitry Andric } 369*0b57cec5SDimitry Andric return (Info.mem_private_bytes + Info.mem_shared_bytes) >> 20; 370*0b57cec5SDimitry Andric } 371*0b57cec5SDimitry Andric 372*0b57cec5SDimitry Andric template <typename Fn> 373*0b57cec5SDimitry Andric class RunOnDestruction { 374*0b57cec5SDimitry Andric public: 375*0b57cec5SDimitry Andric explicit RunOnDestruction(Fn fn) : fn_(fn) {} 376*0b57cec5SDimitry Andric ~RunOnDestruction() { fn_(); } 377*0b57cec5SDimitry Andric 378*0b57cec5SDimitry Andric private: 379*0b57cec5SDimitry Andric Fn fn_; 380*0b57cec5SDimitry Andric }; 381*0b57cec5SDimitry Andric 382*0b57cec5SDimitry Andric template <typename Fn> 383*0b57cec5SDimitry Andric RunOnDestruction<Fn> at_scope_exit(Fn fn) { 384*0b57cec5SDimitry Andric return RunOnDestruction<Fn>(fn); 385*0b57cec5SDimitry Andric } 386*0b57cec5SDimitry Andric 387*0b57cec5SDimitry Andric int ExecuteCommand(const Command &Cmd) { 388*0b57cec5SDimitry Andric zx_status_t rc; 389*0b57cec5SDimitry Andric 390*0b57cec5SDimitry Andric // Convert arguments to C array 391*0b57cec5SDimitry Andric auto Args = Cmd.getArguments(); 392*0b57cec5SDimitry Andric size_t Argc = Args.size(); 393*0b57cec5SDimitry Andric assert(Argc != 0); 394*0b57cec5SDimitry Andric std::unique_ptr<const char *[]> Argv(new const char *[Argc + 1]); 395*0b57cec5SDimitry Andric for (size_t i = 0; i < Argc; ++i) 396*0b57cec5SDimitry Andric Argv[i] = Args[i].c_str(); 397*0b57cec5SDimitry Andric Argv[Argc] = nullptr; 398*0b57cec5SDimitry Andric 399*0b57cec5SDimitry Andric // Determine output. On Fuchsia, the fuzzer is typically run as a component 400*0b57cec5SDimitry Andric // that lacks a mutable working directory. Fortunately, when this is the case 401*0b57cec5SDimitry Andric // a mutable output directory must be specified using "-artifact_prefix=...", 402*0b57cec5SDimitry Andric // so write the log file(s) there. 403*0b57cec5SDimitry Andric int FdOut = STDOUT_FILENO; 404*0b57cec5SDimitry Andric if (Cmd.hasOutputFile()) { 405*0b57cec5SDimitry Andric std::string Path; 406*0b57cec5SDimitry Andric if (Cmd.hasFlag("artifact_prefix")) 407*0b57cec5SDimitry Andric Path = Cmd.getFlagValue("artifact_prefix") + "/" + Cmd.getOutputFile(); 408*0b57cec5SDimitry Andric else 409*0b57cec5SDimitry Andric Path = Cmd.getOutputFile(); 410*0b57cec5SDimitry Andric FdOut = open(Path.c_str(), O_WRONLY | O_CREAT | O_TRUNC, 0); 411*0b57cec5SDimitry Andric if (FdOut == -1) { 412*0b57cec5SDimitry Andric Printf("libFuzzer: failed to open %s: %s\n", Path.c_str(), 413*0b57cec5SDimitry Andric strerror(errno)); 414*0b57cec5SDimitry Andric return ZX_ERR_IO; 415*0b57cec5SDimitry Andric } 416*0b57cec5SDimitry Andric } 417*0b57cec5SDimitry Andric auto CloseFdOut = at_scope_exit([FdOut]() { 418*0b57cec5SDimitry Andric if (FdOut != STDOUT_FILENO) 419*0b57cec5SDimitry Andric close(FdOut); 420*0b57cec5SDimitry Andric }); 421*0b57cec5SDimitry Andric 422*0b57cec5SDimitry Andric // Determine stderr 423*0b57cec5SDimitry Andric int FdErr = STDERR_FILENO; 424*0b57cec5SDimitry Andric if (Cmd.isOutAndErrCombined()) 425*0b57cec5SDimitry Andric FdErr = FdOut; 426*0b57cec5SDimitry Andric 427*0b57cec5SDimitry Andric // Clone the file descriptors into the new process 428*0b57cec5SDimitry Andric fdio_spawn_action_t SpawnAction[] = { 429*0b57cec5SDimitry Andric { 430*0b57cec5SDimitry Andric .action = FDIO_SPAWN_ACTION_CLONE_FD, 431*0b57cec5SDimitry Andric .fd = 432*0b57cec5SDimitry Andric { 433*0b57cec5SDimitry Andric .local_fd = STDIN_FILENO, 434*0b57cec5SDimitry Andric .target_fd = STDIN_FILENO, 435*0b57cec5SDimitry Andric }, 436*0b57cec5SDimitry Andric }, 437*0b57cec5SDimitry Andric { 438*0b57cec5SDimitry Andric .action = FDIO_SPAWN_ACTION_CLONE_FD, 439*0b57cec5SDimitry Andric .fd = 440*0b57cec5SDimitry Andric { 441*0b57cec5SDimitry Andric .local_fd = FdOut, 442*0b57cec5SDimitry Andric .target_fd = STDOUT_FILENO, 443*0b57cec5SDimitry Andric }, 444*0b57cec5SDimitry Andric }, 445*0b57cec5SDimitry Andric { 446*0b57cec5SDimitry Andric .action = FDIO_SPAWN_ACTION_CLONE_FD, 447*0b57cec5SDimitry Andric .fd = 448*0b57cec5SDimitry Andric { 449*0b57cec5SDimitry Andric .local_fd = FdErr, 450*0b57cec5SDimitry Andric .target_fd = STDERR_FILENO, 451*0b57cec5SDimitry Andric }, 452*0b57cec5SDimitry Andric }, 453*0b57cec5SDimitry Andric }; 454*0b57cec5SDimitry Andric 455*0b57cec5SDimitry Andric // Start the process. 456*0b57cec5SDimitry Andric char ErrorMsg[FDIO_SPAWN_ERR_MSG_MAX_LENGTH]; 457*0b57cec5SDimitry Andric zx_handle_t ProcessHandle = ZX_HANDLE_INVALID; 458*0b57cec5SDimitry Andric rc = fdio_spawn_etc( 459*0b57cec5SDimitry Andric ZX_HANDLE_INVALID, FDIO_SPAWN_CLONE_ALL & (~FDIO_SPAWN_CLONE_STDIO), 460*0b57cec5SDimitry Andric Argv[0], Argv.get(), nullptr, 3, SpawnAction, &ProcessHandle, ErrorMsg); 461*0b57cec5SDimitry Andric if (rc != ZX_OK) { 462*0b57cec5SDimitry Andric Printf("libFuzzer: failed to launch '%s': %s, %s\n", Argv[0], ErrorMsg, 463*0b57cec5SDimitry Andric _zx_status_get_string(rc)); 464*0b57cec5SDimitry Andric return rc; 465*0b57cec5SDimitry Andric } 466*0b57cec5SDimitry Andric auto CloseHandle = at_scope_exit([&]() { _zx_handle_close(ProcessHandle); }); 467*0b57cec5SDimitry Andric 468*0b57cec5SDimitry Andric // Now join the process and return the exit status. 469*0b57cec5SDimitry Andric if ((rc = _zx_object_wait_one(ProcessHandle, ZX_PROCESS_TERMINATED, 470*0b57cec5SDimitry Andric ZX_TIME_INFINITE, nullptr)) != ZX_OK) { 471*0b57cec5SDimitry Andric Printf("libFuzzer: failed to join '%s': %s\n", Argv[0], 472*0b57cec5SDimitry Andric _zx_status_get_string(rc)); 473*0b57cec5SDimitry Andric return rc; 474*0b57cec5SDimitry Andric } 475*0b57cec5SDimitry Andric 476*0b57cec5SDimitry Andric zx_info_process_t Info; 477*0b57cec5SDimitry Andric if ((rc = _zx_object_get_info(ProcessHandle, ZX_INFO_PROCESS, &Info, 478*0b57cec5SDimitry Andric sizeof(Info), nullptr, nullptr)) != ZX_OK) { 479*0b57cec5SDimitry Andric Printf("libFuzzer: unable to get return code from '%s': %s\n", Argv[0], 480*0b57cec5SDimitry Andric _zx_status_get_string(rc)); 481*0b57cec5SDimitry Andric return rc; 482*0b57cec5SDimitry Andric } 483*0b57cec5SDimitry Andric 484*0b57cec5SDimitry Andric return Info.return_code; 485*0b57cec5SDimitry Andric } 486*0b57cec5SDimitry Andric 487*0b57cec5SDimitry Andric const void *SearchMemory(const void *Data, size_t DataLen, const void *Patt, 488*0b57cec5SDimitry Andric size_t PattLen) { 489*0b57cec5SDimitry Andric return memmem(Data, DataLen, Patt, PattLen); 490*0b57cec5SDimitry Andric } 491*0b57cec5SDimitry Andric 492*0b57cec5SDimitry Andric } // namespace fuzzer 493*0b57cec5SDimitry Andric 494*0b57cec5SDimitry Andric #endif // LIBFUZZER_FUCHSIA 495