/* * * honggfuzz - the main file * ----------------------------------------- * * Authors: Robert Swiecki * Felix Gröbert * * Copyright 2010-2019 by Google Inc. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); you may * not use this file except in compliance with the License. You may obtain * a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or * implied. See the License for the specific language governing * permissions and limitations under the License. * */ #include #include #include #include #include #include #include #include #include #include #include #include #include "cmdline.h" #include "display.h" #include "fuzz.h" #include "input.h" #include "libhfcommon/common.h" #include "libhfcommon/files.h" #include "libhfcommon/log.h" #include "libhfcommon/util.h" #include "socketfuzzer.h" #include "subproc.h" static int sigReceived = 0; /* * CygWin/MinGW incorrectly copies stack during fork(), so we need to keep some * structures in the data section */ honggfuzz_t hfuzz; static void exitWithMsg(const char* msg, int exit_code) { HF_ATTR_UNUSED ssize_t sz = write(STDERR_FILENO, msg, strlen(msg)); for (;;) { exit(exit_code); _exit(exit_code); abort(); __builtin_trap(); } } static void sigHandler(int sig) { /* We should not terminate upon SIGALRM delivery */ if (sig == SIGALRM) { if (fuzz_shouldTerminate()) { exitWithMsg("Terminating forcefully\n", EXIT_FAILURE); } return; } /* Do nothing with pings from the main thread */ if (sig == SIGUSR1) { return; } /* It's handled in the signal thread */ if (sig == SIGCHLD) { return; } if (ATOMIC_GET(sigReceived) != 0) { exitWithMsg("Repeated termination signal caugth\n", EXIT_FAILURE); } ATOMIC_SET(sigReceived, sig); } static void setupRLimits(void) { struct rlimit rlim; if (getrlimit(RLIMIT_NOFILE, &rlim) == -1) { PLOG_W("getrlimit(RLIMIT_NOFILE)"); return; } if (rlim.rlim_cur >= 1024) { return; } if (rlim.rlim_max < 1024) { LOG_E("RLIMIT_NOFILE max limit < 1024 (%zu). Expect troubles!", (size_t)rlim.rlim_max); return; } rlim.rlim_cur = MIN(1024, rlim.rlim_max); // we don't need more if (setrlimit(RLIMIT_NOFILE, &rlim) == -1) { PLOG_E("Couldn't setrlimit(RLIMIT_NOFILE, cur=%zu/max=%zu)", (size_t)rlim.rlim_cur, (size_t)rlim.rlim_max); } } static void setupMainThreadTimer(void) { const struct itimerval it = { .it_value = { .tv_sec = 1, .tv_usec = 0, }, .it_interval = { .tv_sec = 0, .tv_usec = 1000ULL * 200ULL, }, }; if (setitimer(ITIMER_REAL, &it, NULL) == -1) { PLOG_F("setitimer(ITIMER_REAL)"); } } static void setupSignalsPreThreads(void) { /* Block signals which should be handled or blocked in the main thread */ sigset_t ss; sigemptyset(&ss); sigaddset(&ss, SIGTERM); sigaddset(&ss, SIGINT); sigaddset(&ss, SIGQUIT); sigaddset(&ss, SIGALRM); sigaddset(&ss, SIGPIPE); /* Linux/arch uses it to discover events from persistent fuzzing processes */ sigaddset(&ss, SIGIO); /* Let the signal thread catch SIGCHLD */ sigaddset(&ss, SIGCHLD); /* This is checked for via sigwaitinfo/sigtimedwait */ sigaddset(&ss, SIGUSR1); if (sigprocmask(SIG_SETMASK, &ss, NULL) != 0) { PLOG_F("sigprocmask(SIG_SETMASK)"); } struct sigaction sa = { .sa_handler = sigHandler, .sa_flags = 0, }; sigemptyset(&sa.sa_mask); if (sigaction(SIGTERM, &sa, NULL) == -1) { PLOG_F("sigaction(SIGTERM) failed"); } if (sigaction(SIGINT, &sa, NULL) == -1) { PLOG_F("sigaction(SIGINT) failed"); } if (sigaction(SIGQUIT, &sa, NULL) == -1) { PLOG_F("sigaction(SIGQUIT) failed"); } if (sigaction(SIGALRM, &sa, NULL) == -1) { PLOG_F("sigaction(SIGQUIT) failed"); } if (sigaction(SIGUSR1, &sa, NULL) == -1) { PLOG_F("sigaction(SIGUSR1) failed"); } if (sigaction(SIGCHLD, &sa, NULL) == -1) { PLOG_F("sigaction(SIGCHLD) failed"); } } static void setupSignalsMainThread(void) { /* Unblock signals which should be handled by the main thread */ sigset_t ss; sigemptyset(&ss); sigaddset(&ss, SIGTERM); sigaddset(&ss, SIGINT); sigaddset(&ss, SIGQUIT); sigaddset(&ss, SIGALRM); if (pthread_sigmask(SIG_UNBLOCK, &ss, NULL) != 0) { PLOG_F("pthread_sigmask(SIG_UNBLOCK)"); } } static void printSummary(honggfuzz_t* hfuzz) { uint64_t exec_per_sec = 0; uint64_t elapsed_sec = time(NULL) - hfuzz->timing.timeStart; if (elapsed_sec) { exec_per_sec = hfuzz->cnts.mutationsCnt / elapsed_sec; } LOG_I("Summary iterations:%zu time:%" PRIu64 " speed:%" PRIu64, hfuzz->cnts.mutationsCnt, elapsed_sec, exec_per_sec); } static void pingThreads(honggfuzz_t* hfuzz) { for (size_t i = 0; i < hfuzz->threads.threadsMax; i++) { if (pthread_kill(hfuzz->threads.threads[i], SIGUSR1) != 0 && errno != EINTR) { PLOG_W("pthread_kill(thread=%zu, SIGUSR1)", i); } } } static void* signalThread(void* arg) { honggfuzz_t* hfuzz = (honggfuzz_t*)arg; sigset_t ss; sigemptyset(&ss); sigaddset(&ss, SIGCHLD); if (pthread_sigmask(SIG_UNBLOCK, &ss, NULL) != 0) { PLOG_F("Couldn't unblock SIGCHLD in the signal thread"); } for (;;) { int sig; if (sigwait(&ss, &sig) != 0 && errno != EINTR) { PLOG_F("sigwait(SIGCHLD)"); } if (fuzz_isTerminating()) { break; } if (sig == SIGCHLD) { pingThreads(hfuzz); } } return NULL; } int main(int argc, char** argv) { /* * Work around CygWin/MinGW */ char** myargs = (char**)util_Malloc(sizeof(char*) * (argc + 1)); defer { free(myargs); }; int i; for (i = 0U; i < argc; i++) { myargs[i] = argv[i]; } myargs[i] = NULL; if (cmdlineParse(argc, myargs, &hfuzz) == false) { LOG_F("Parsing of the cmd-line arguments failed"); } if (hfuzz.display.useScreen) { display_init(); } if (hfuzz.socketFuzzer.enabled) { LOG_I("No input file corpus loaded, the external socket_fuzzer is responsible for " "creating the fuzz data"); setupSocketFuzzer(&hfuzz); } else if (!input_init(&hfuzz)) { LOG_F("Couldn't load input corpus"); exit(EXIT_FAILURE); } if (hfuzz.mutate.dictionaryFile && (input_parseDictionary(&hfuzz) == false)) { LOG_F("Couldn't parse dictionary file ('%s')", hfuzz.mutate.dictionaryFile); } if (hfuzz.feedback.blacklistFile && (input_parseBlacklist(&hfuzz) == false)) { LOG_F("Couldn't parse stackhash blacklist file ('%s')", hfuzz.feedback.blacklistFile); } #define hfuzzl hfuzz.linux if (hfuzzl.symsBlFile && ((hfuzzl.symsBlCnt = files_parseSymbolFilter(hfuzzl.symsBlFile, &hfuzzl.symsBl)) == 0)) { LOG_F("Couldn't parse symbols blacklist file ('%s')", hfuzzl.symsBlFile); } if (hfuzzl.symsWlFile && ((hfuzzl.symsWlCnt = files_parseSymbolFilter(hfuzzl.symsWlFile, &hfuzzl.symsWl)) == 0)) { LOG_F("Couldn't parse symbols whitelist file ('%s')", hfuzzl.symsWlFile); } if (hfuzz.feedback.dynFileMethod != _HF_DYNFILE_NONE) { if (!(hfuzz.feedback.feedbackMap = files_mapSharedMem( sizeof(feedback_t), &hfuzz.feedback.bbFd, "hfuzz-feedback", hfuzz.io.workDir))) { LOG_F("files_mapSharedMem(sz=%zu, dir='%s') failed", sizeof(feedback_t), hfuzz.io.workDir); } } setupRLimits(); setupSignalsPreThreads(); fuzz_threadsStart(&hfuzz); pthread_t sigthread; if (!subproc_runThread(&hfuzz, &sigthread, signalThread, /* joinable= */ false)) { LOG_F("Couldn't start the signal thread"); } setupSignalsMainThread(); setupMainThreadTimer(); for (;;) { if (hfuzz.display.useScreen) { display_display(&hfuzz); } if (ATOMIC_GET(sigReceived) > 0) { LOG_I("Signal %d (%s) received, terminating", ATOMIC_GET(sigReceived), strsignal(ATOMIC_GET(sigReceived))); break; } if (ATOMIC_GET(hfuzz.threads.threadsFinished) >= hfuzz.threads.threadsMax) { break; } if (hfuzz.timing.runEndTime > 0 && (time(NULL) > hfuzz.timing.runEndTime)) { LOG_I("Maximum run time reached, terminating"); break; } pingThreads(&hfuzz); pause(); } fuzz_setTerminating(); for (;;) { if (ATOMIC_GET(hfuzz.threads.threadsFinished) >= hfuzz.threads.threadsMax) { break; } pingThreads(&hfuzz); util_sleepForMSec(50); /* 50ms */ } /* Clean-up global buffers */ if (hfuzz.feedback.blacklist) { free(hfuzz.feedback.blacklist); } #if defined(_HF_ARCH_LINUX) if (hfuzz.linux.symsBl) { free(hfuzz.linux.symsBl); } if (hfuzz.linux.symsWl) { free(hfuzz.linux.symsWl); } #elif defined(_HF_ARCH_NETBSD) if (hfuzz.netbsd.symsBl) { free(hfuzz.netbsd.symsBl); } if (hfuzz.netbsd.symsWl) { free(hfuzz.netbsd.symsWl); } #endif if (hfuzz.socketFuzzer.enabled) { cleanupSocketFuzzer(); } printSummary(&hfuzz); return EXIT_SUCCESS; }