xref: /freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtilFuchsia.cpp (revision 68d75eff68281c1b445e3010bb975eae07aac225)
10b57cec5SDimitry Andric //===- FuzzerUtilFuchsia.cpp - Misc utils for Fuchsia. --------------------===//
20b57cec5SDimitry Andric //
30b57cec5SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
40b57cec5SDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
50b57cec5SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
60b57cec5SDimitry Andric //
70b57cec5SDimitry Andric //===----------------------------------------------------------------------===//
80b57cec5SDimitry Andric // Misc utils implementation using Fuchsia/Zircon APIs.
90b57cec5SDimitry Andric //===----------------------------------------------------------------------===//
100b57cec5SDimitry Andric #include "FuzzerDefs.h"
110b57cec5SDimitry Andric 
120b57cec5SDimitry Andric #if LIBFUZZER_FUCHSIA
130b57cec5SDimitry Andric 
140b57cec5SDimitry Andric #include "FuzzerInternal.h"
150b57cec5SDimitry Andric #include "FuzzerUtil.h"
160b57cec5SDimitry Andric #include <cassert>
170b57cec5SDimitry Andric #include <cerrno>
180b57cec5SDimitry Andric #include <cinttypes>
190b57cec5SDimitry Andric #include <cstdint>
200b57cec5SDimitry Andric #include <fcntl.h>
210b57cec5SDimitry Andric #include <lib/fdio/spawn.h>
220b57cec5SDimitry Andric #include <string>
230b57cec5SDimitry Andric #include <sys/select.h>
240b57cec5SDimitry Andric #include <thread>
250b57cec5SDimitry Andric #include <unistd.h>
260b57cec5SDimitry Andric #include <zircon/errors.h>
270b57cec5SDimitry Andric #include <zircon/process.h>
280b57cec5SDimitry Andric #include <zircon/sanitizer.h>
290b57cec5SDimitry Andric #include <zircon/status.h>
300b57cec5SDimitry Andric #include <zircon/syscalls.h>
310b57cec5SDimitry Andric #include <zircon/syscalls/debug.h>
320b57cec5SDimitry Andric #include <zircon/syscalls/exception.h>
330b57cec5SDimitry Andric #include <zircon/syscalls/object.h>
340b57cec5SDimitry Andric #include <zircon/types.h>
350b57cec5SDimitry Andric 
360b57cec5SDimitry Andric namespace fuzzer {
370b57cec5SDimitry Andric 
380b57cec5SDimitry Andric // Given that Fuchsia doesn't have the POSIX signals that libFuzzer was written
390b57cec5SDimitry Andric // around, the general approach is to spin up dedicated threads to watch for
400b57cec5SDimitry Andric // each requested condition (alarm, interrupt, crash).  Of these, the crash
410b57cec5SDimitry Andric // handler is the most involved, as it requires resuming the crashed thread in
420b57cec5SDimitry Andric // order to invoke the sanitizers to get the needed state.
430b57cec5SDimitry Andric 
440b57cec5SDimitry Andric // Forward declaration of assembly trampoline needed to resume crashed threads.
450b57cec5SDimitry Andric // This appears to have external linkage to  C++, which is why it's not in the
460b57cec5SDimitry Andric // anonymous namespace.  The assembly definition inside MakeTrampoline()
470b57cec5SDimitry Andric // actually defines the symbol with internal linkage only.
480b57cec5SDimitry Andric void CrashTrampolineAsm() __asm__("CrashTrampolineAsm");
490b57cec5SDimitry Andric 
500b57cec5SDimitry Andric namespace {
510b57cec5SDimitry Andric 
520b57cec5SDimitry Andric // Helper function to handle Zircon syscall failures.
530b57cec5SDimitry Andric void ExitOnErr(zx_status_t Status, const char *Syscall) {
540b57cec5SDimitry Andric   if (Status != ZX_OK) {
550b57cec5SDimitry Andric     Printf("libFuzzer: %s failed: %s\n", Syscall,
560b57cec5SDimitry Andric            _zx_status_get_string(Status));
570b57cec5SDimitry Andric     exit(1);
580b57cec5SDimitry Andric   }
590b57cec5SDimitry Andric }
600b57cec5SDimitry Andric 
610b57cec5SDimitry Andric void AlarmHandler(int Seconds) {
620b57cec5SDimitry Andric   while (true) {
630b57cec5SDimitry Andric     SleepSeconds(Seconds);
640b57cec5SDimitry Andric     Fuzzer::StaticAlarmCallback();
650b57cec5SDimitry Andric   }
660b57cec5SDimitry Andric }
670b57cec5SDimitry Andric 
680b57cec5SDimitry Andric void InterruptHandler() {
690b57cec5SDimitry Andric   fd_set readfds;
700b57cec5SDimitry Andric   // Ctrl-C sends ETX in Zircon.
710b57cec5SDimitry Andric   do {
720b57cec5SDimitry Andric     FD_ZERO(&readfds);
730b57cec5SDimitry Andric     FD_SET(STDIN_FILENO, &readfds);
740b57cec5SDimitry Andric     select(STDIN_FILENO + 1, &readfds, nullptr, nullptr, nullptr);
750b57cec5SDimitry Andric   } while(!FD_ISSET(STDIN_FILENO, &readfds) || getchar() != 0x03);
760b57cec5SDimitry Andric   Fuzzer::StaticInterruptCallback();
770b57cec5SDimitry Andric }
780b57cec5SDimitry Andric 
790b57cec5SDimitry Andric // For the crash handler, we need to call Fuzzer::StaticCrashSignalCallback
800b57cec5SDimitry Andric // without POSIX signal handlers.  To achieve this, we use an assembly function
810b57cec5SDimitry Andric // to add the necessary CFI unwinding information and a C function to bridge
820b57cec5SDimitry Andric // from that back into C++.
830b57cec5SDimitry Andric 
840b57cec5SDimitry Andric // FIXME: This works as a short-term solution, but this code really shouldn't be
850b57cec5SDimitry Andric // architecture dependent. A better long term solution is to implement remote
860b57cec5SDimitry Andric // unwinding and expose the necessary APIs through sanitizer_common and/or ASAN
870b57cec5SDimitry Andric // to allow the exception handling thread to gather the crash state directly.
880b57cec5SDimitry Andric //
890b57cec5SDimitry Andric // Alternatively, Fuchsia may in future actually implement basic signal
900b57cec5SDimitry Andric // handling for the machine trap signals.
910b57cec5SDimitry Andric #if defined(__x86_64__)
920b57cec5SDimitry Andric #define FOREACH_REGISTER(OP_REG, OP_NUM) \
930b57cec5SDimitry Andric   OP_REG(rax)                            \
940b57cec5SDimitry Andric   OP_REG(rbx)                            \
950b57cec5SDimitry Andric   OP_REG(rcx)                            \
960b57cec5SDimitry Andric   OP_REG(rdx)                            \
970b57cec5SDimitry Andric   OP_REG(rsi)                            \
980b57cec5SDimitry Andric   OP_REG(rdi)                            \
990b57cec5SDimitry Andric   OP_REG(rbp)                            \
1000b57cec5SDimitry Andric   OP_REG(rsp)                            \
1010b57cec5SDimitry Andric   OP_REG(r8)                             \
1020b57cec5SDimitry Andric   OP_REG(r9)                             \
1030b57cec5SDimitry Andric   OP_REG(r10)                            \
1040b57cec5SDimitry Andric   OP_REG(r11)                            \
1050b57cec5SDimitry Andric   OP_REG(r12)                            \
1060b57cec5SDimitry Andric   OP_REG(r13)                            \
1070b57cec5SDimitry Andric   OP_REG(r14)                            \
1080b57cec5SDimitry Andric   OP_REG(r15)                            \
1090b57cec5SDimitry Andric   OP_REG(rip)
1100b57cec5SDimitry Andric 
1110b57cec5SDimitry Andric #elif defined(__aarch64__)
1120b57cec5SDimitry Andric #define FOREACH_REGISTER(OP_REG, OP_NUM) \
1130b57cec5SDimitry Andric   OP_NUM(0)                              \
1140b57cec5SDimitry Andric   OP_NUM(1)                              \
1150b57cec5SDimitry Andric   OP_NUM(2)                              \
1160b57cec5SDimitry Andric   OP_NUM(3)                              \
1170b57cec5SDimitry Andric   OP_NUM(4)                              \
1180b57cec5SDimitry Andric   OP_NUM(5)                              \
1190b57cec5SDimitry Andric   OP_NUM(6)                              \
1200b57cec5SDimitry Andric   OP_NUM(7)                              \
1210b57cec5SDimitry Andric   OP_NUM(8)                              \
1220b57cec5SDimitry Andric   OP_NUM(9)                              \
1230b57cec5SDimitry Andric   OP_NUM(10)                             \
1240b57cec5SDimitry Andric   OP_NUM(11)                             \
1250b57cec5SDimitry Andric   OP_NUM(12)                             \
1260b57cec5SDimitry Andric   OP_NUM(13)                             \
1270b57cec5SDimitry Andric   OP_NUM(14)                             \
1280b57cec5SDimitry Andric   OP_NUM(15)                             \
1290b57cec5SDimitry Andric   OP_NUM(16)                             \
1300b57cec5SDimitry Andric   OP_NUM(17)                             \
1310b57cec5SDimitry Andric   OP_NUM(18)                             \
1320b57cec5SDimitry Andric   OP_NUM(19)                             \
1330b57cec5SDimitry Andric   OP_NUM(20)                             \
1340b57cec5SDimitry Andric   OP_NUM(21)                             \
1350b57cec5SDimitry Andric   OP_NUM(22)                             \
1360b57cec5SDimitry Andric   OP_NUM(23)                             \
1370b57cec5SDimitry Andric   OP_NUM(24)                             \
1380b57cec5SDimitry Andric   OP_NUM(25)                             \
1390b57cec5SDimitry Andric   OP_NUM(26)                             \
1400b57cec5SDimitry Andric   OP_NUM(27)                             \
1410b57cec5SDimitry Andric   OP_NUM(28)                             \
1420b57cec5SDimitry Andric   OP_NUM(29)                             \
1430b57cec5SDimitry Andric   OP_NUM(30)                             \
1440b57cec5SDimitry Andric   OP_REG(sp)
1450b57cec5SDimitry Andric 
1460b57cec5SDimitry Andric #else
1470b57cec5SDimitry Andric #error "Unsupported architecture for fuzzing on Fuchsia"
1480b57cec5SDimitry Andric #endif
1490b57cec5SDimitry Andric 
1500b57cec5SDimitry Andric // Produces a CFI directive for the named or numbered register.
1510b57cec5SDimitry Andric #define CFI_OFFSET_REG(reg) ".cfi_offset " #reg ", %c[" #reg "]\n"
1520b57cec5SDimitry Andric #define CFI_OFFSET_NUM(num) CFI_OFFSET_REG(r##num)
1530b57cec5SDimitry Andric 
1540b57cec5SDimitry Andric // Produces an assembler input operand for the named or numbered register.
1550b57cec5SDimitry Andric #define ASM_OPERAND_REG(reg) \
1560b57cec5SDimitry Andric   [reg] "i"(offsetof(zx_thread_state_general_regs_t, reg)),
1570b57cec5SDimitry Andric #define ASM_OPERAND_NUM(num)                                 \
1580b57cec5SDimitry Andric   [r##num] "i"(offsetof(zx_thread_state_general_regs_t, r[num])),
1590b57cec5SDimitry Andric 
1600b57cec5SDimitry Andric // Trampoline to bridge from the assembly below to the static C++ crash
1610b57cec5SDimitry Andric // callback.
1620b57cec5SDimitry Andric __attribute__((noreturn))
1630b57cec5SDimitry Andric static void StaticCrashHandler() {
1640b57cec5SDimitry Andric   Fuzzer::StaticCrashSignalCallback();
1650b57cec5SDimitry Andric   for (;;) {
1660b57cec5SDimitry Andric     _Exit(1);
1670b57cec5SDimitry Andric   }
1680b57cec5SDimitry Andric }
1690b57cec5SDimitry Andric 
1700b57cec5SDimitry Andric // Creates the trampoline with the necessary CFI information to unwind through
1710b57cec5SDimitry Andric // to the crashing call stack.  The attribute is necessary because the function
1720b57cec5SDimitry Andric // is never called; it's just a container around the assembly to allow it to
1730b57cec5SDimitry Andric // use operands for compile-time computed constants.
1740b57cec5SDimitry Andric __attribute__((used))
1750b57cec5SDimitry Andric void MakeTrampoline() {
1760b57cec5SDimitry Andric   __asm__(".cfi_endproc\n"
1770b57cec5SDimitry Andric     ".pushsection .text.CrashTrampolineAsm\n"
1780b57cec5SDimitry Andric     ".type CrashTrampolineAsm,STT_FUNC\n"
1790b57cec5SDimitry Andric "CrashTrampolineAsm:\n"
1800b57cec5SDimitry Andric     ".cfi_startproc simple\n"
1810b57cec5SDimitry Andric     ".cfi_signal_frame\n"
1820b57cec5SDimitry Andric #if defined(__x86_64__)
1830b57cec5SDimitry Andric     ".cfi_return_column rip\n"
1840b57cec5SDimitry Andric     ".cfi_def_cfa rsp, 0\n"
1850b57cec5SDimitry Andric     FOREACH_REGISTER(CFI_OFFSET_REG, CFI_OFFSET_NUM)
1860b57cec5SDimitry Andric     "call %c[StaticCrashHandler]\n"
1870b57cec5SDimitry Andric     "ud2\n"
1880b57cec5SDimitry Andric #elif defined(__aarch64__)
1890b57cec5SDimitry Andric     ".cfi_return_column 33\n"
1900b57cec5SDimitry Andric     ".cfi_def_cfa sp, 0\n"
1910b57cec5SDimitry Andric     ".cfi_offset 33, %c[pc]\n"
1920b57cec5SDimitry Andric     FOREACH_REGISTER(CFI_OFFSET_REG, CFI_OFFSET_NUM)
1930b57cec5SDimitry Andric     "bl %[StaticCrashHandler]\n"
1940b57cec5SDimitry Andric #else
1950b57cec5SDimitry Andric #error "Unsupported architecture for fuzzing on Fuchsia"
1960b57cec5SDimitry Andric #endif
1970b57cec5SDimitry Andric     ".cfi_endproc\n"
1980b57cec5SDimitry Andric     ".size CrashTrampolineAsm, . - CrashTrampolineAsm\n"
1990b57cec5SDimitry Andric     ".popsection\n"
2000b57cec5SDimitry Andric     ".cfi_startproc\n"
2010b57cec5SDimitry Andric     : // No outputs
2020b57cec5SDimitry Andric     : FOREACH_REGISTER(ASM_OPERAND_REG, ASM_OPERAND_NUM)
2030b57cec5SDimitry Andric #if defined(__aarch64__)
2040b57cec5SDimitry Andric       ASM_OPERAND_REG(pc)
2050b57cec5SDimitry Andric #endif
2060b57cec5SDimitry Andric       [StaticCrashHandler] "i" (StaticCrashHandler));
2070b57cec5SDimitry Andric }
2080b57cec5SDimitry Andric 
2090b57cec5SDimitry Andric void CrashHandler(zx_handle_t *Event) {
2100b57cec5SDimitry Andric   // This structure is used to ensure we close handles to objects we create in
2110b57cec5SDimitry Andric   // this handler.
2120b57cec5SDimitry Andric   struct ScopedHandle {
2130b57cec5SDimitry Andric     ~ScopedHandle() { _zx_handle_close(Handle); }
2140b57cec5SDimitry Andric     zx_handle_t Handle = ZX_HANDLE_INVALID;
2150b57cec5SDimitry Andric   };
2160b57cec5SDimitry Andric 
2170b57cec5SDimitry Andric   // Create the exception channel.  We need to claim to be a "debugger" so the
2180b57cec5SDimitry Andric   // kernel will allow us to modify and resume dying threads (see below). Once
2190b57cec5SDimitry Andric   // the channel is set, we can signal the main thread to continue and wait
2200b57cec5SDimitry Andric   // for the exception to arrive.
2210b57cec5SDimitry Andric   ScopedHandle Channel;
2220b57cec5SDimitry Andric   zx_handle_t Self = _zx_process_self();
2230b57cec5SDimitry Andric   ExitOnErr(_zx_task_create_exception_channel(
2240b57cec5SDimitry Andric                 Self, ZX_EXCEPTION_CHANNEL_DEBUGGER, &Channel.Handle),
2250b57cec5SDimitry Andric             "_zx_task_create_exception_channel");
2260b57cec5SDimitry Andric 
2270b57cec5SDimitry Andric   ExitOnErr(_zx_object_signal(*Event, 0, ZX_USER_SIGNAL_0),
2280b57cec5SDimitry Andric             "_zx_object_signal");
2290b57cec5SDimitry Andric 
2300b57cec5SDimitry Andric   // This thread lives as long as the process in order to keep handling
2310b57cec5SDimitry Andric   // crashes.  In practice, the first crashed thread to reach the end of the
2320b57cec5SDimitry Andric   // StaticCrashHandler will end the process.
2330b57cec5SDimitry Andric   while (true) {
2340b57cec5SDimitry Andric     ExitOnErr(_zx_object_wait_one(Channel.Handle, ZX_CHANNEL_READABLE,
2350b57cec5SDimitry Andric                                   ZX_TIME_INFINITE, nullptr),
2360b57cec5SDimitry Andric               "_zx_object_wait_one");
2370b57cec5SDimitry Andric 
2380b57cec5SDimitry Andric     zx_exception_info_t ExceptionInfo;
2390b57cec5SDimitry Andric     ScopedHandle Exception;
2400b57cec5SDimitry Andric     ExitOnErr(_zx_channel_read(Channel.Handle, 0, &ExceptionInfo,
2410b57cec5SDimitry Andric                                &Exception.Handle, sizeof(ExceptionInfo), 1,
2420b57cec5SDimitry Andric                                nullptr, nullptr),
2430b57cec5SDimitry Andric               "_zx_channel_read");
2440b57cec5SDimitry Andric 
2450b57cec5SDimitry Andric     // Ignore informational synthetic exceptions.
2460b57cec5SDimitry Andric     if (ZX_EXCP_THREAD_STARTING == ExceptionInfo.type ||
2470b57cec5SDimitry Andric         ZX_EXCP_THREAD_EXITING == ExceptionInfo.type ||
2480b57cec5SDimitry Andric         ZX_EXCP_PROCESS_STARTING == ExceptionInfo.type) {
2490b57cec5SDimitry Andric       continue;
2500b57cec5SDimitry Andric     }
2510b57cec5SDimitry Andric 
2520b57cec5SDimitry Andric     // At this point, we want to get the state of the crashing thread, but
2530b57cec5SDimitry Andric     // libFuzzer and the sanitizers assume this will happen from that same
2540b57cec5SDimitry Andric     // thread via a POSIX signal handler. "Resurrecting" the thread in the
2550b57cec5SDimitry Andric     // middle of the appropriate callback is as simple as forcibly setting the
2560b57cec5SDimitry Andric     // instruction pointer/program counter, provided we NEVER EVER return from
2570b57cec5SDimitry Andric     // that function (since otherwise our stack will not be valid).
2580b57cec5SDimitry Andric     ScopedHandle Thread;
2590b57cec5SDimitry Andric     ExitOnErr(_zx_exception_get_thread(Exception.Handle, &Thread.Handle),
2600b57cec5SDimitry Andric               "_zx_exception_get_thread");
2610b57cec5SDimitry Andric 
2620b57cec5SDimitry Andric     zx_thread_state_general_regs_t GeneralRegisters;
2630b57cec5SDimitry Andric     ExitOnErr(_zx_thread_read_state(Thread.Handle, ZX_THREAD_STATE_GENERAL_REGS,
2640b57cec5SDimitry Andric                                     &GeneralRegisters,
2650b57cec5SDimitry Andric                                     sizeof(GeneralRegisters)),
2660b57cec5SDimitry Andric               "_zx_thread_read_state");
2670b57cec5SDimitry Andric 
2680b57cec5SDimitry Andric     // To unwind properly, we need to push the crashing thread's register state
2690b57cec5SDimitry Andric     // onto the stack and jump into a trampoline with CFI instructions on how
2700b57cec5SDimitry Andric     // to restore it.
2710b57cec5SDimitry Andric #if defined(__x86_64__)
2720b57cec5SDimitry Andric     uintptr_t StackPtr =
2730b57cec5SDimitry Andric         (GeneralRegisters.rsp - (128 + sizeof(GeneralRegisters))) &
2740b57cec5SDimitry Andric         -(uintptr_t)16;
2750b57cec5SDimitry Andric     __unsanitized_memcpy(reinterpret_cast<void *>(StackPtr), &GeneralRegisters,
2760b57cec5SDimitry Andric                          sizeof(GeneralRegisters));
2770b57cec5SDimitry Andric     GeneralRegisters.rsp = StackPtr;
2780b57cec5SDimitry Andric     GeneralRegisters.rip = reinterpret_cast<zx_vaddr_t>(CrashTrampolineAsm);
2790b57cec5SDimitry Andric 
2800b57cec5SDimitry Andric #elif defined(__aarch64__)
2810b57cec5SDimitry Andric     uintptr_t StackPtr =
2820b57cec5SDimitry Andric         (GeneralRegisters.sp - sizeof(GeneralRegisters)) & -(uintptr_t)16;
2830b57cec5SDimitry Andric     __unsanitized_memcpy(reinterpret_cast<void *>(StackPtr), &GeneralRegisters,
2840b57cec5SDimitry Andric                          sizeof(GeneralRegisters));
2850b57cec5SDimitry Andric     GeneralRegisters.sp = StackPtr;
2860b57cec5SDimitry Andric     GeneralRegisters.pc = reinterpret_cast<zx_vaddr_t>(CrashTrampolineAsm);
2870b57cec5SDimitry Andric 
2880b57cec5SDimitry Andric #else
2890b57cec5SDimitry Andric #error "Unsupported architecture for fuzzing on Fuchsia"
2900b57cec5SDimitry Andric #endif
2910b57cec5SDimitry Andric 
2920b57cec5SDimitry Andric     // Now force the crashing thread's state.
2930b57cec5SDimitry Andric     ExitOnErr(
2940b57cec5SDimitry Andric         _zx_thread_write_state(Thread.Handle, ZX_THREAD_STATE_GENERAL_REGS,
2950b57cec5SDimitry Andric                                &GeneralRegisters, sizeof(GeneralRegisters)),
2960b57cec5SDimitry Andric         "_zx_thread_write_state");
2970b57cec5SDimitry Andric 
2980b57cec5SDimitry Andric     // Set the exception to HANDLED so it resumes the thread on close.
2990b57cec5SDimitry Andric     uint32_t ExceptionState = ZX_EXCEPTION_STATE_HANDLED;
3000b57cec5SDimitry Andric     ExitOnErr(_zx_object_set_property(Exception.Handle, ZX_PROP_EXCEPTION_STATE,
3010b57cec5SDimitry Andric                                       &ExceptionState, sizeof(ExceptionState)),
3020b57cec5SDimitry Andric               "zx_object_set_property");
3030b57cec5SDimitry Andric   }
3040b57cec5SDimitry Andric }
3050b57cec5SDimitry Andric 
3060b57cec5SDimitry Andric } // namespace
3070b57cec5SDimitry Andric 
3080b57cec5SDimitry Andric // Platform specific functions.
3090b57cec5SDimitry Andric void SetSignalHandler(const FuzzingOptions &Options) {
310*68d75effSDimitry Andric   // Make sure information from libFuzzer and the sanitizers are easy to
311*68d75effSDimitry Andric   // reassemble. `__sanitizer_log_write` has the added benefit of ensuring the
312*68d75effSDimitry Andric   // DSO map is always available for the symbolizer.
313*68d75effSDimitry Andric   // A uint64_t fits in 20 chars, so 64 is plenty.
314*68d75effSDimitry Andric   char Buf[64];
315*68d75effSDimitry Andric   memset(Buf, 0, sizeof(Buf));
316*68d75effSDimitry Andric   snprintf(Buf, sizeof(Buf), "==%lu== INFO: libFuzzer starting.\n", GetPid());
317*68d75effSDimitry Andric   if (EF->__sanitizer_log_write)
318*68d75effSDimitry Andric     __sanitizer_log_write(Buf, sizeof(Buf));
319*68d75effSDimitry Andric   Printf("%s", Buf);
320*68d75effSDimitry Andric 
3210b57cec5SDimitry Andric   // Set up alarm handler if needed.
3220b57cec5SDimitry Andric   if (Options.UnitTimeoutSec > 0) {
3230b57cec5SDimitry Andric     std::thread T(AlarmHandler, Options.UnitTimeoutSec / 2 + 1);
3240b57cec5SDimitry Andric     T.detach();
3250b57cec5SDimitry Andric   }
3260b57cec5SDimitry Andric 
3270b57cec5SDimitry Andric   // Set up interrupt handler if needed.
3280b57cec5SDimitry Andric   if (Options.HandleInt || Options.HandleTerm) {
3290b57cec5SDimitry Andric     std::thread T(InterruptHandler);
3300b57cec5SDimitry Andric     T.detach();
3310b57cec5SDimitry Andric   }
3320b57cec5SDimitry Andric 
3330b57cec5SDimitry Andric   // Early exit if no crash handler needed.
3340b57cec5SDimitry Andric   if (!Options.HandleSegv && !Options.HandleBus && !Options.HandleIll &&
3350b57cec5SDimitry Andric       !Options.HandleFpe && !Options.HandleAbrt)
3360b57cec5SDimitry Andric     return;
3370b57cec5SDimitry Andric 
3380b57cec5SDimitry Andric   // Set up the crash handler and wait until it is ready before proceeding.
3390b57cec5SDimitry Andric   zx_handle_t Event;
3400b57cec5SDimitry Andric   ExitOnErr(_zx_event_create(0, &Event), "_zx_event_create");
3410b57cec5SDimitry Andric 
3420b57cec5SDimitry Andric   std::thread T(CrashHandler, &Event);
3430b57cec5SDimitry Andric   zx_status_t Status =
3440b57cec5SDimitry Andric       _zx_object_wait_one(Event, ZX_USER_SIGNAL_0, ZX_TIME_INFINITE, nullptr);
3450b57cec5SDimitry Andric   _zx_handle_close(Event);
3460b57cec5SDimitry Andric   ExitOnErr(Status, "_zx_object_wait_one");
3470b57cec5SDimitry Andric 
3480b57cec5SDimitry Andric   T.detach();
3490b57cec5SDimitry Andric }
3500b57cec5SDimitry Andric 
3510b57cec5SDimitry Andric void SleepSeconds(int Seconds) {
3520b57cec5SDimitry Andric   _zx_nanosleep(_zx_deadline_after(ZX_SEC(Seconds)));
3530b57cec5SDimitry Andric }
3540b57cec5SDimitry Andric 
3550b57cec5SDimitry Andric unsigned long GetPid() {
3560b57cec5SDimitry Andric   zx_status_t rc;
3570b57cec5SDimitry Andric   zx_info_handle_basic_t Info;
3580b57cec5SDimitry Andric   if ((rc = _zx_object_get_info(_zx_process_self(), ZX_INFO_HANDLE_BASIC, &Info,
3590b57cec5SDimitry Andric                                 sizeof(Info), NULL, NULL)) != ZX_OK) {
3600b57cec5SDimitry Andric     Printf("libFuzzer: unable to get info about self: %s\n",
3610b57cec5SDimitry Andric            _zx_status_get_string(rc));
3620b57cec5SDimitry Andric     exit(1);
3630b57cec5SDimitry Andric   }
3640b57cec5SDimitry Andric   return Info.koid;
3650b57cec5SDimitry Andric }
3660b57cec5SDimitry Andric 
3670b57cec5SDimitry Andric size_t GetPeakRSSMb() {
3680b57cec5SDimitry Andric   zx_status_t rc;
3690b57cec5SDimitry Andric   zx_info_task_stats_t Info;
3700b57cec5SDimitry Andric   if ((rc = _zx_object_get_info(_zx_process_self(), ZX_INFO_TASK_STATS, &Info,
3710b57cec5SDimitry Andric                                 sizeof(Info), NULL, NULL)) != ZX_OK) {
3720b57cec5SDimitry Andric     Printf("libFuzzer: unable to get info about self: %s\n",
3730b57cec5SDimitry Andric            _zx_status_get_string(rc));
3740b57cec5SDimitry Andric     exit(1);
3750b57cec5SDimitry Andric   }
3760b57cec5SDimitry Andric   return (Info.mem_private_bytes + Info.mem_shared_bytes) >> 20;
3770b57cec5SDimitry Andric }
3780b57cec5SDimitry Andric 
3790b57cec5SDimitry Andric template <typename Fn>
3800b57cec5SDimitry Andric class RunOnDestruction {
3810b57cec5SDimitry Andric  public:
3820b57cec5SDimitry Andric   explicit RunOnDestruction(Fn fn) : fn_(fn) {}
3830b57cec5SDimitry Andric   ~RunOnDestruction() { fn_(); }
3840b57cec5SDimitry Andric 
3850b57cec5SDimitry Andric  private:
3860b57cec5SDimitry Andric   Fn fn_;
3870b57cec5SDimitry Andric };
3880b57cec5SDimitry Andric 
3890b57cec5SDimitry Andric template <typename Fn>
3900b57cec5SDimitry Andric RunOnDestruction<Fn> at_scope_exit(Fn fn) {
3910b57cec5SDimitry Andric   return RunOnDestruction<Fn>(fn);
3920b57cec5SDimitry Andric }
3930b57cec5SDimitry Andric 
3940b57cec5SDimitry Andric int ExecuteCommand(const Command &Cmd) {
3950b57cec5SDimitry Andric   zx_status_t rc;
3960b57cec5SDimitry Andric 
3970b57cec5SDimitry Andric   // Convert arguments to C array
3980b57cec5SDimitry Andric   auto Args = Cmd.getArguments();
3990b57cec5SDimitry Andric   size_t Argc = Args.size();
4000b57cec5SDimitry Andric   assert(Argc != 0);
4010b57cec5SDimitry Andric   std::unique_ptr<const char *[]> Argv(new const char *[Argc + 1]);
4020b57cec5SDimitry Andric   for (size_t i = 0; i < Argc; ++i)
4030b57cec5SDimitry Andric     Argv[i] = Args[i].c_str();
4040b57cec5SDimitry Andric   Argv[Argc] = nullptr;
4050b57cec5SDimitry Andric 
4060b57cec5SDimitry Andric   // Determine output.  On Fuchsia, the fuzzer is typically run as a component
4070b57cec5SDimitry Andric   // that lacks a mutable working directory. Fortunately, when this is the case
4080b57cec5SDimitry Andric   // a mutable output directory must be specified using "-artifact_prefix=...",
4090b57cec5SDimitry Andric   // so write the log file(s) there.
410*68d75effSDimitry Andric   // However, we don't want to apply this logic for absolute paths.
4110b57cec5SDimitry Andric   int FdOut = STDOUT_FILENO;
4120b57cec5SDimitry Andric   if (Cmd.hasOutputFile()) {
413*68d75effSDimitry Andric     std::string Path = Cmd.getOutputFile();
414*68d75effSDimitry Andric     bool IsAbsolutePath = Path.length() > 1 && Path[0] == '/';
415*68d75effSDimitry Andric     if (!IsAbsolutePath && Cmd.hasFlag("artifact_prefix"))
416*68d75effSDimitry Andric       Path = Cmd.getFlagValue("artifact_prefix") + "/" + Path;
417*68d75effSDimitry Andric 
4180b57cec5SDimitry Andric     FdOut = open(Path.c_str(), O_WRONLY | O_CREAT | O_TRUNC, 0);
4190b57cec5SDimitry Andric     if (FdOut == -1) {
4200b57cec5SDimitry Andric       Printf("libFuzzer: failed to open %s: %s\n", Path.c_str(),
4210b57cec5SDimitry Andric              strerror(errno));
4220b57cec5SDimitry Andric       return ZX_ERR_IO;
4230b57cec5SDimitry Andric     }
4240b57cec5SDimitry Andric   }
4250b57cec5SDimitry Andric   auto CloseFdOut = at_scope_exit([FdOut]() {
4260b57cec5SDimitry Andric     if (FdOut != STDOUT_FILENO)
4270b57cec5SDimitry Andric       close(FdOut);
4280b57cec5SDimitry Andric   });
4290b57cec5SDimitry Andric 
4300b57cec5SDimitry Andric   // Determine stderr
4310b57cec5SDimitry Andric   int FdErr = STDERR_FILENO;
4320b57cec5SDimitry Andric   if (Cmd.isOutAndErrCombined())
4330b57cec5SDimitry Andric     FdErr = FdOut;
4340b57cec5SDimitry Andric 
4350b57cec5SDimitry Andric   // Clone the file descriptors into the new process
4360b57cec5SDimitry Andric   fdio_spawn_action_t SpawnAction[] = {
4370b57cec5SDimitry Andric       {
4380b57cec5SDimitry Andric           .action = FDIO_SPAWN_ACTION_CLONE_FD,
4390b57cec5SDimitry Andric           .fd =
4400b57cec5SDimitry Andric               {
4410b57cec5SDimitry Andric                   .local_fd = STDIN_FILENO,
4420b57cec5SDimitry Andric                   .target_fd = STDIN_FILENO,
4430b57cec5SDimitry Andric               },
4440b57cec5SDimitry Andric       },
4450b57cec5SDimitry Andric       {
4460b57cec5SDimitry Andric           .action = FDIO_SPAWN_ACTION_CLONE_FD,
4470b57cec5SDimitry Andric           .fd =
4480b57cec5SDimitry Andric               {
4490b57cec5SDimitry Andric                   .local_fd = FdOut,
4500b57cec5SDimitry Andric                   .target_fd = STDOUT_FILENO,
4510b57cec5SDimitry Andric               },
4520b57cec5SDimitry Andric       },
4530b57cec5SDimitry Andric       {
4540b57cec5SDimitry Andric           .action = FDIO_SPAWN_ACTION_CLONE_FD,
4550b57cec5SDimitry Andric           .fd =
4560b57cec5SDimitry Andric               {
4570b57cec5SDimitry Andric                   .local_fd = FdErr,
4580b57cec5SDimitry Andric                   .target_fd = STDERR_FILENO,
4590b57cec5SDimitry Andric               },
4600b57cec5SDimitry Andric       },
4610b57cec5SDimitry Andric   };
4620b57cec5SDimitry Andric 
4630b57cec5SDimitry Andric   // Start the process.
4640b57cec5SDimitry Andric   char ErrorMsg[FDIO_SPAWN_ERR_MSG_MAX_LENGTH];
4650b57cec5SDimitry Andric   zx_handle_t ProcessHandle = ZX_HANDLE_INVALID;
4660b57cec5SDimitry Andric   rc = fdio_spawn_etc(
4670b57cec5SDimitry Andric       ZX_HANDLE_INVALID, FDIO_SPAWN_CLONE_ALL & (~FDIO_SPAWN_CLONE_STDIO),
4680b57cec5SDimitry Andric       Argv[0], Argv.get(), nullptr, 3, SpawnAction, &ProcessHandle, ErrorMsg);
4690b57cec5SDimitry Andric   if (rc != ZX_OK) {
4700b57cec5SDimitry Andric     Printf("libFuzzer: failed to launch '%s': %s, %s\n", Argv[0], ErrorMsg,
4710b57cec5SDimitry Andric            _zx_status_get_string(rc));
4720b57cec5SDimitry Andric     return rc;
4730b57cec5SDimitry Andric   }
4740b57cec5SDimitry Andric   auto CloseHandle = at_scope_exit([&]() { _zx_handle_close(ProcessHandle); });
4750b57cec5SDimitry Andric 
4760b57cec5SDimitry Andric   // Now join the process and return the exit status.
4770b57cec5SDimitry Andric   if ((rc = _zx_object_wait_one(ProcessHandle, ZX_PROCESS_TERMINATED,
4780b57cec5SDimitry Andric                                 ZX_TIME_INFINITE, nullptr)) != ZX_OK) {
4790b57cec5SDimitry Andric     Printf("libFuzzer: failed to join '%s': %s\n", Argv[0],
4800b57cec5SDimitry Andric            _zx_status_get_string(rc));
4810b57cec5SDimitry Andric     return rc;
4820b57cec5SDimitry Andric   }
4830b57cec5SDimitry Andric 
4840b57cec5SDimitry Andric   zx_info_process_t Info;
4850b57cec5SDimitry Andric   if ((rc = _zx_object_get_info(ProcessHandle, ZX_INFO_PROCESS, &Info,
4860b57cec5SDimitry Andric                                 sizeof(Info), nullptr, nullptr)) != ZX_OK) {
4870b57cec5SDimitry Andric     Printf("libFuzzer: unable to get return code from '%s': %s\n", Argv[0],
4880b57cec5SDimitry Andric            _zx_status_get_string(rc));
4890b57cec5SDimitry Andric     return rc;
4900b57cec5SDimitry Andric   }
4910b57cec5SDimitry Andric 
4920b57cec5SDimitry Andric   return Info.return_code;
4930b57cec5SDimitry Andric }
4940b57cec5SDimitry Andric 
4950b57cec5SDimitry Andric const void *SearchMemory(const void *Data, size_t DataLen, const void *Patt,
4960b57cec5SDimitry Andric                          size_t PattLen) {
4970b57cec5SDimitry Andric   return memmem(Data, DataLen, Patt, PattLen);
4980b57cec5SDimitry Andric }
4990b57cec5SDimitry Andric 
5000b57cec5SDimitry Andric } // namespace fuzzer
5010b57cec5SDimitry Andric 
5020b57cec5SDimitry Andric #endif // LIBFUZZER_FUCHSIA
503